ANSWERS GUARANTEE A+
✔✔Devices that present the following management challenges: - ✔✔-Mobile devices
that connect to unsecured networks.
-Mobile devices that intermittently connect to organizational networks.
-Lost or stolen devices.
-Compromised devices that connect to the internal network
-User-owned mobile devices.
✔✔Conditional access - ✔✔makes sure that only trusted users can access your
organizational resources on trusted devices using trusted apps.
✔✔Remote actions - ✔✔give you management controls on the device without
interfering with personal data of your users.
✔✔Which of the following is NOT part of Enterprise Mobility + Security?
-Azure AD Premium
-Azure Information Protection
-Cloud App Security
-Configuration Manager
-Microsoft Intune
-Unified Endpoint Management - ✔✔Unified Endpoint Management
✔✔T/F: All EMS products are offered in all Microsoft 365 subscriptions. - ✔✔False
✔✔True or false: Configuration Manager is for managing on-premises infrastructure, but
it has a 'co-management' function that works with Intune to manage cloud-based
functions. - ✔✔True
✔✔Which technology is the foundation of this co-management, allowing Configuration
Manager and Intune to work together?
-Azure Multi-Factor Authentication (MFA)
-Azure Information Protection
-Azure AD Premium
-Azure Advanced Threat Protection (ATP) - ✔✔Azure AD Premium
✔✔True or false: Microsoft Intune enables you to manage centrally across all of these
operating systems: Windows 10, iOS, Android, and macOS. - ✔✔True
✔✔Two-factor verification - ✔✔The standard verification method, where one of the
factors is your password. After you sign in to a device, app, or site using your username
and password,
, ✔✔Phone sign-in - ✔✔A version of two-factor verification that lets you sign in without
requiring a password, using your username and your mobile device with your
fingerprint, face, or PIN.
✔✔Which of the following is NOT critical to the security of every computer system?
-Identity and access management
-Threat protection
-Cloud and remote access security
-Information protection
-Security management - ✔✔Cloud and remote access security
✔✔Conditional access, secure authentication, and identity protection are parts of which
security pillar?
Identity and access management
Threat protection
Information protection
Security management - ✔✔Identity and access management
✔✔True or false: The Microsoft Information Protection solutions in Microsoft 365 help
you protect sensitive data throughout its lifecycle - across devices, apps, cloud services,
and on-premises locations. - ✔✔True
✔✔True or false: Privileged Access Management grants global admin rights to
individuals in your organization. - ✔✔False
✔✔Health Insurance Portability and Accountability Act (HIPAA)
Federal Information Security Modernization Act (FISMA)
General Data Protection Regulation (GDPR) and Safe Harbor Framework
The Family Educational Rights and Privacy Act (FERPA)
The Personal Information Protection and Electronic Documents Act (PIPEDA)
The Gramm-Leach-Bliley Act (GLBA) - ✔✔Examples of regulation that are enforced for
compliance
✔✔Managing compliance can be thought of in three phrases: - ✔✔Assess
Protect
Respond
✔✔Complaince Manager - ✔✔your dashboard to standards, regulations, and
assessments.
✔✔Trust documents. - ✔✔Audit reports, data protection info about how Microsoft
operates Azure, Dynamics 365, and Office 365, Azure Security and Compliance
Blueprint.