Course Hero Logo

Android devices ios devices windows devices correct

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 117 - 120 out of 179 pages.

Android devices.iOS devices.Windows devices.(Correct)ExplanationCorrect answers:Security baseline settings are used only on devices running Windows 10 version 1809 orlater.Incorrect answers:Security baselines cannot be used on Android devices or on iOS devices at this time.Reference:
-intune/3-intuneQuestion 31:CorrectA new admin has joined the team and needs to be able to access the Microsoft 365Compliance Center. Which of the following roles could the admin use to access theCompliance Center?Compliance Administrator role(Correct)Help desk Administrator roleUser Administrator roleExplanationCorrect answer:Compliance administrator role:This is one of the multiple roles you can use to access theCompliance Center.Incorrect answers:Help desk admin:This role is used to manage service requests and monitor service health.Instead use the global administrator role, which is one of the multiple roles you can use toaccess the Compliance Center.User admin:This role is used to add, remove, and manage users. Instead use the globaladministrator role, which is one of the multiple roles you can use to access the ComplianceCenter.Reference:-capabilities-microsoft/3-describe-compliance-centerQuestion 32:CorrectYour organization uses Microsoft Teams to collaborate on all projects. The compliance adminwants to prevent users from accidentally sharing sensitive information in a Microsoft Teamschat session. What capability can address this requirement?Use data loss prevention policies(Correct)Use Records Management capabilities
Use retention policiesExplanationWithdata loss prevention policies, administrators can now define policies that can preventusers from sharing sensitive information in a Microsoft Teams chat session or Teams channel,whether this information is in a message, or in a file.Records Management or Retention policieswon't let you do thisReference:-capabilities-microsoft-365/5-describe-data-loss-preventionQuestion 33:CorrectThe compliance admin for the organization wants to ensure that users can access theresources they need, but not accidentally delete resources. Which Azure resource lock levelcan the admin set to ensure that users can read and modify a resource, but can't delete theresource?ReadOnlyCanNotDelete(Correct)UpdateAndDeleteExplanationThis lock will ensure users can still read and modify the resource, without being able todelete it.Users can't modify the resource with this lock level. Update & delete isn't valid for Azureresource locks eitherReference:-azure/2-describe-use-azure-resource-locksQuestion 34:CorrectA new admin has joined the compliance team and needs access to Core e-Discovery to beable to add and remove members, create and edit searches, and export content from a case. Towhich role should the admin be assigned?

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 179 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags
Computer Security, IP address, Two factor authentication, Azure Blueprints

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture