exam questions

Exam MD-102 All Questions

View all questions & answers for the MD-102 exam

Exam MD-102 topic 1 question 130 discussion

Actual exam question from Microsoft's MD-102
Question #: 130
Topic #: 1
[All MD-102 Questions]

You have computers that run Windows 10 and are managed by using Microsoft Intune.

Users store their files in a folder named D:\Folder1.

You need to ensure that only a trusted list of applications is granted write access to D:\Folder1.

What should you configure in the device configuration profile?

  • A. Microsoft Defender Exploit Guard
  • B. Microsoft Defender Application Guard
  • C. Microsoft Defender SmartScreen
  • D. Microsoft Defender Application Control
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
02dc19c
1 month, 1 week ago
Selected Answer: D
While A. Microsoft Defender Exploit Guard is also available in Intune and provides features like folder protection, it does not specifically restrict write access based on a trusted list of applications—its focus is more on mitigating exploit techniques and protecting files broadly. On the other hand, MDAC is designed to explicitly control which applications are trusted to interact with specific files or folders, making it the right choice for this scenario.
upvoted 1 times
...
Tr619899
5 months, 1 week ago
Selected Answer: A
We should configure Controlled Folder Access under Microsoft Defender Exploit Guard. Controlled Folder Access is a feature of Microsoft Defender for Endpoint that protects sensitive folders from unauthorized changes by malicious or untrusted applications.
upvoted 1 times
...
93831b0
8 months, 3 weeks ago
Selected Answer: A
Configure Controlled Folder Access: In the Endpoint protection profile, go to Microsoft Defender Exploit Guard. Under Controlled folder access, enable the setting. Specify D:\Folder1 as the folder that you want to protect. Define the list of trusted applications that are allowed to write to the folder by specifying the file paths of these apps under the Allow apps to access protected folders section.
upvoted 3 times
...
Cezt
9 months, 2 weeks ago
Selected Answer: A
you need to add the folder tobe protected
upvoted 1 times
...
ergacharsk
9 months, 2 weeks ago
Selected Answer: A
A is correct, trust me
upvoted 1 times
...
oopspruu
9 months, 3 weeks ago
Selected Answer: A
Windows > Configuration > Administrative Templates > Windows Components > MS Defender AV > MS Defender Exploit Guard > Controlled Folder Access. This is why A is correct.
upvoted 1 times
...
CJL324
11 months, 3 weeks ago
D Microsoft Defender Application Control (formerly known as Windows Defender Application Control) allows you to control which applications are allowed to run on your devices based on defined policies. By configuring Application Control policies in the device configuration profile, you can restrict write access to the D:\Folder1 directory to only trusted applications, thereby ensuring the security of the folder's contents.
upvoted 1 times
...
mail2bala3011
1 year, 1 month ago
Selected Answer: A
Tested. option A
upvoted 2 times
...
OyYaGotta
1 year, 1 month ago
Devil is in the detail. "Managed using Intune". Microsoft Defender Application Control is set up through The defender Portal, therefor answer is A because it need sto be set up "managing" via Intune.
upvoted 1 times
...
MR_Eliot
1 year, 2 months ago
Selected Answer: A
https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/create-deploy-exploit-guard-policy
upvoted 2 times
...
Pasado
1 year, 3 months ago
ChatGPT: To ensure that only a trusted list of applications is granted write access to the folder D:\Folder1 on Windows 10 computers managed by Microsoft Intune, you should configure **Microsoft Defender Application Control** (option D) in the device configuration profile. Microsoft Defender Application Control allows you to control which applications are allowed to run on the device, thereby ensuring that only trusted applications have access to the specified folder.
upvoted 2 times
...
Merrybob
1 year, 3 months ago
Selected Answer: A
A. Microsoft Defender Exploit Guard This is an ASR rule which is part of Exploit Guard Ref: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-controlled-folders?view=o365-worldwide#microsoft-intune Ref: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-implement?view=o365-worldwide
upvoted 3 times
...
NoursBear
1 year, 3 months ago
Some of you are mixing up what WDAC is all about: https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/deployment/deploy-wdac-policies-using-intune Given answer A is correct
upvoted 2 times
...
yosry
1 year, 4 months ago
Selected Answer: A
https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/create-deploy-exploit-guard-policy#create-an-exploit-guard-policy:~:text=Controlled%20folder%20access%3A%20Configure%20blocking%20or%20auditing%2C%20and%20then%20add%20Apps%20that%20can%20bypass%20this%20policy.%20You%20can%20also%20specify%20additional%20folders%20that%20are%20not%20protected%20by%20default.
upvoted 2 times
...
7ab89e0
1 year, 4 months ago
Selected Answer: A
Answer is A.
upvoted 2 times
...
7ab89e0
1 year, 4 months ago
Selected Answer: A
Answer is A.
upvoted 2 times
...
kay000001
1 year, 5 months ago
Selected Answer: A
Answer is A: https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/create-deploy-exploit-guard-policy You can configure and deploy Configuration Manager policies that manage all four components of Windows Defender Exploit Guard. These components include: Attack Surface Reduction Controlled folder access Exploit protection Network protection
upvoted 3 times
St_Ives
1 year, 3 months ago
Microsoft Configuration Manager ??? The question states that the devices are Intune managed...
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago