HOTSPOT
-
You have a Microsoft 365 tenant that uses Microsoft Intune and contains the devices shown in the following table.
In Microsoft Intune Endpoint security, you need to configure a disk encryption policy for each device.
Which encryption type should you use for each device, and which role-based access control (RBAC) role in Intune should you use to manage the encryption keys? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
IcE
Highly Voted 1 year, 3 months agoCezt
9 months agoking001
1 year, 3 months agoMR_Eliot
Most Recent 1 year, 1 month agoMerrybob
1 year, 3 months agoNoursBear
1 year, 3 months agomp34
1 year, 3 months agoyosry
1 year, 4 months agoJN_311
1 year, 4 months agosh123df
1 year, 5 months agoLiamAzure
1 year, 5 months agoh38jhd38k
1 year, 6 months ago