exam questions

Exam MS-101 All Questions

View all questions & answers for the MS-101 exam

Exam MS-101 topic 2 question 75 discussion

Actual exam question from Microsoft's MS-101
Question #: 75
Topic #: 2
[All MS-101 Questions]

You have a Microsoft 365 E5 subscription that has Microsoft Defender for Endpoint integrated with Microsoft Endpoint Manager.
Devices are onboarded by using Microsoft Defender for Endpoint.
You plan to block devices based on the results of the machine risk score calculated by Microsoft Defender for Endpoint.
What should you create first?

  • A. a device configuration policy
  • B. a device compliance policy
  • C. a conditional access policy
  • D. an endpoint detection and response policy
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
maikel87
Highly Voted 3 years, 6 months ago
Important, "What should you create first" Begin with device compliance policy, after that conditional access to block high risk devices.
upvoted 16 times
...
Johnnien
Highly Voted 3 years, 7 months ago
To configure integration of Microsoft Defender for Endpoint with Intune. Configuration includes the following general steps: Enable Microsoft Defender for Endpoint for your tenant Onboard devices that run Android, iOS/iPadOS, and Windows 10/11 Use compliance policies to set device risk levels Use conditional access policies to block devices that exceed your expected risk levels Android and iOS/iPadOS, use app protection policies that set device risk levels. App protection polices work with both enrolled and unenrolled devices.
upvoted 6 times
...
Amir1909
Most Recent 1 year, 4 months ago
B is correct
upvoted 1 times
...
MEG
2 years, 4 months ago
Selected Answer: B
Use compliance policies to set device risk levels
upvoted 1 times
...
Darisha
3 years, 6 months ago
Selected Answer: B
https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection-configure in this article there is stated "Use conditional access policies to block devices that exceed your expected risk levels"
upvoted 3 times
Darisha
3 years, 6 months ago
So wrong, I thought for C, it's definitely conditional access.
upvoted 1 times
[Removed]
3 years, 6 months ago
FIRST a compliance policy, then a confitional access policy
upvoted 3 times
...
...
...
Goena
3 years, 6 months ago
Selected Answer: B
compliance policy
upvoted 5 times
...
AlexBa
3 years, 6 months ago
B Create and assign compliance policy to set device risk level For Android, iOS/iPadOS, and Windows devices, the compliance policy determines the level of risk that you consider as acceptable for a device.
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...