Practice Free MD-102 Exam Online Questions
How do you define an interface that performs path parameter substitution for a dynamic path?
- A . See the Explanation.
How do you define an interface that performs path parameter substitution for a dynamic path?
- A . See the Explanation.
You have a Microsoft 365 subscription that contains 500 computers that run Windows 11. The computers are Azure AD joined and are enrolled in Microsoft Intune.
You plan to manage Microsoft Defender Antivirus on the computers.
You need to prevent users from disabling Microsoft Defender for Endpoint.
What should you do?
- A . From the Microsoft Intune admin center, create an attack surface reduction (ASR) policy.
- B . From the Microsoft 365 Defender portal, enable tamper protection.
- C . From the Microsoft Intune admin center, create an account protection policy.
- D . From the Microsoft Entra admin center, create a Conditional Access policy.
You have an Azure AD tenant named contoso.com.
You have a workgroup computer named Computer1 that runs Windows 11.
You need to add Computer1 to contoso.com.
What should you use?
- A . dsregcmd.exe
- B . Computer Management
- C . netdom.exe
- D . the Settings app
You have 100 computers that run Windows 10 and connect to an Azure Log Analytics workspace.
Which three types of data can you collect from the computers by using Log Analytics? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . failure events from the Security log
- B . the list of processes and their execution times
- C . the average processor utilization
- D . error events from the System log
- E . third-party application logs stored as text files
You have 100 computers that run Windows 10 and connect to an Azure Log Analytics workspace.
Which three types of data can you collect from the computers by using Log Analytics? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . failure events from the Security log
- B . the list of processes and their execution times
- C . the average processor utilization
- D . error events from the System log
- E . third-party application logs stored as text files
You have 100 computers that run Windows 10 and connect to an Azure Log Analytics workspace.
Which three types of data can you collect from the computers by using Log Analytics? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . failure events from the Security log
- B . the list of processes and their execution times
- C . the average processor utilization
- D . error events from the System log
- E . third-party application logs stored as text files
DRAG DROP
Your on-premises network contains an Active Directory Domain Services (AD DS) domain.
You have an Azure subscription that contains a virtual network named VNet1. VNet1 contains five virtual machines and is NOT connected to the on-premises network.
You have a Microsoft 365 subscription that uses Microsoft Intune Suite.
You purchase Windows 365 Enterprise licenses.
You need to deploy Cloud PC. The solution must meet the following requirements:
• All users must be able to access their Cloud PC at any time without any restrictions.
• The users must be able to connect to the virtual machines on VNet1.
How should you configure the provisioning policy for Windows 365? To answer, drag the appropriate options to the correct settings. Each option may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.
HOTSPOT
You have a Microsoft 365 E5 subscription that contains two devices named Device1 and Device2.
You manage the devices by using Microsoft Intune.
You need to use Device query to meet the following requirements:
• Identify the Windows build on a device.
• Validate whether a folder exists on the C drive of a device.
Which table should you target for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
HOTSPOT
You have a Microsoft 365 subscription.
Users have iOS devices that are not enrolled in Microsoft Intune.
You create an app protection policy for the Microsoft Outlook app as shown in the exhibit. (Click the Exhibit tab.)
You need to configure the policy to meet the following requirements:
Prevent the users from using the Outlook app if the operating system version is less than 12.0.0.
Require the users to use an alphanumeric passcode to access the Outlook app.
What should you configure in an app protection policy for each requirement? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.