You are configuring security baseline policies. Which setting should be adjusted to prevent users from installing software?
AUser Account Control
BWindows Defender
CGroup Policy Objects
DSoftware Restriction Policies
Explanation
Software Restriction Policies manage installation permissions; others relate to security or functionality but not installations.
Q112
Which service can be used for centralized logging in Azure?
AAzure Monitor
BAzure AD
CAzure Storage
DAzure Firewall
Explanation
Azure Monitor is designed for monitoring and logging; the other services serve different purposes.
Q113
A company needs to deploy a Windows application to users' devices without user intervention. What should be used?
AUser-initiated installation
BWindows Autopilot
CSCCM Task Sequence
DManual installation process
Explanation
SCCM Task Sequence can automate deployments; the other options require user involvement.
Q114
You are configuring Windows Defender for Endpoint. What happens when you enable 'Automatic Sample Submission'?
AMalware samples are submitted for review
BUser receives malware alerts only
CAll files are deleted automatically
DUser passwords are recorded
Explanation
'Automatic Sample Submission' sends samples to Microsoft for analysis, while other options are incorrect.
Q115
Which service provides centralized management of devices in Azure?
AAzure Active Directory
BMicrosoft Endpoint Manager
CAzure Security Center
DAzure Monitor
Explanation
Microsoft Endpoint Manager integrates Microsoft Intune and Configuration Manager to manage devices.
Q116
A company needs to enforce conditional access policies for specific user groups. What should they use?
AConditional access in Azure AD
BNetwork Security Groups
CRole-Based Access Control
DAzure Firewall
Explanation
Conditional access in Azure AD is designed to enforce access policies based on user and device conditions.
Q117
You are configuring Microsoft Defender for Endpoint. What happens if the device doesn't report to the service regularly?
AIt becomes non-compliant automatically
BIt will still receive alerts
CIt gets deleted from the directory
DIt continues normal operations effortlessly
Explanation
A device that fails to report regularly may be considered non-compliant and at risk.
Q118
Which Azure service primarily handles identity management?
AAzure Active Directory
BAzure Blob Storage
CAzure Kubernetes Service
DAzure Functions
Explanation
Azure Active Directory manages user identities, while the others serve different purposes like storage, orchestration, or serverless compute.
Q119
A company needs to deploy updates to devices at scale. Which feature should they use?
AWindows Autopilot
BGroup Policy
CWindows Update for Business
DMicrosoft Endpoint Manager
Explanation
Microsoft Endpoint Manager is designed for managing updates and deployments to multiple devices efficiently.
Q120
What happens when you enable BitLocker on a Windows device?
AData is compressed automatically
BDevice performance is significantly improved
CData is encrypted to protect it
DWindows Firewall is disabled
Explanation
BitLocker encrypts data on the disk to protect it from unauthorized access, while other options do not accurately describe its function.