exam questions

Exam MS-102 All Questions

View all questions & answers for the MS-102 exam

Exam MS-102 topic 1 question 261 discussion

Actual exam question from Microsoft's MS-102
Question #: 261
Topic #: 1
[All MS-102 Questions]

You have a Microsoft 365 E5 subscription that has Microsoft Defender for Endpoint integrated with Microsoft Intune.

Devices are enrolled to Microsoft Intune and onboarded by using Microsoft Defender for Endpoint.

You plan to block devices based on the results of the machine risk score calculated by Microsoft Defender for Endpoint.

What should you create first?

  • A. a device configuration policy
  • B. an endpoint detection and response policy
  • C. a device compliance policy
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
sergioandreslq
Highly Voted 1 year, 5 months ago
C: Correct Configure a Device compliance policy that takes into consideration the Defender for endpoint to define if device is compliant or not compliant https://learn.microsoft.com/en-us/mem/intune/protect/compliance-policy-create-windows#microsoft-defender-for-endpoint-rules
upvoted 5 times
...
Crille
Most Recent 5 months, 1 week ago
first you need to create an device configuration policy that you connect to complaince policy So in that case i should say Correct answer A must be done first
upvoted 1 times
...
Khanbaba43
8 months ago
Selected Answer: C
This is a repeat question. Answer C
upvoted 3 times
...
Khattak3143
8 months, 2 weeks ago
Selected Answer: C
Answer: C i.e. Device Compliance Policy To block devices based on the machine risk score calculated by Microsoft Defender for Endpoint, you should first create a device compliance policy. B: Device Configuration Policy: This is used to configure settings and features on devices, but it is not used for evaluating or acting on risk scores. C. Endpoint Detection and Response (EDR) Policy: This policy deals with detection and response capabilities, such as monitoring and investigating threats, rather than enforcing compliance based on risk scores.
upvoted 3 times
...
Leon1969
10 months, 1 week ago
C: Correct Step3: https://learn.microsoft.com/en-us/defender-endpoint/configure-conditional-access
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago