Microsoft Azure

Endpoint Administrator

MD-102

Demonstrate your skills as an Endpoint Administrator with the MD-102 exam.

150 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 111–120 of 150

Q111

You are configuring security baseline policies. Which setting should be adjusted to prevent users from installing software?

  • A User Account Control
  • B Windows Defender
  • C Group Policy Objects
  • D Software Restriction Policies
Explanation Software Restriction Policies manage installation permissions; others relate to security or functionality but not installations.
Q112

Which service can be used for centralized logging in Azure?

  • A Azure Monitor
  • B Azure AD
  • C Azure Storage
  • D Azure Firewall
Explanation Azure Monitor is designed for monitoring and logging; the other services serve different purposes.
Q113

A company needs to deploy a Windows application to users' devices without user intervention. What should be used?

  • A User-initiated installation
  • B Windows Autopilot
  • C SCCM Task Sequence
  • D Manual installation process
Explanation SCCM Task Sequence can automate deployments; the other options require user involvement.
Q114

You are configuring Windows Defender for Endpoint. What happens when you enable 'Automatic Sample Submission'?

  • A Malware samples are submitted for review
  • B User receives malware alerts only
  • C All files are deleted automatically
  • D User passwords are recorded
Explanation 'Automatic Sample Submission' sends samples to Microsoft for analysis, while other options are incorrect.
Q115

Which service provides centralized management of devices in Azure?

  • A Azure Active Directory
  • B Microsoft Endpoint Manager
  • C Azure Security Center
  • D Azure Monitor
Explanation Microsoft Endpoint Manager integrates Microsoft Intune and Configuration Manager to manage devices.
Q116

A company needs to enforce conditional access policies for specific user groups. What should they use?

  • A Conditional access in Azure AD
  • B Network Security Groups
  • C Role-Based Access Control
  • D Azure Firewall
Explanation Conditional access in Azure AD is designed to enforce access policies based on user and device conditions.
Q117

You are configuring Microsoft Defender for Endpoint. What happens if the device doesn't report to the service regularly?

  • A It becomes non-compliant automatically
  • B It will still receive alerts
  • C It gets deleted from the directory
  • D It continues normal operations effortlessly
Explanation A device that fails to report regularly may be considered non-compliant and at risk.
Q118

Which Azure service primarily handles identity management?

  • A Azure Active Directory
  • B Azure Blob Storage
  • C Azure Kubernetes Service
  • D Azure Functions
Explanation Azure Active Directory manages user identities, while the others serve different purposes like storage, orchestration, or serverless compute.
Q119

A company needs to deploy updates to devices at scale. Which feature should they use?

  • A Windows Autopilot
  • B Group Policy
  • C Windows Update for Business
  • D Microsoft Endpoint Manager
Explanation Microsoft Endpoint Manager is designed for managing updates and deployments to multiple devices efficiently.
Q120

What happens when you enable BitLocker on a Windows device?

  • A Data is compressed automatically
  • B Device performance is significantly improved
  • C Data is encrypted to protect it
  • D Windows Firewall is disabled
Explanation BitLocker encrypts data on the disk to protect it from unauthorized access, while other options do not accurately describe its function.