{"id":90994,"date":"2023-09-27T06:12:33","date_gmt":"2023-09-27T11:42:33","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=90994"},"modified":"2023-09-29T04:23:16","modified_gmt":"2023-09-29T09:53:16","slug":"md-102-practice-test-questions","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/md-102-practice-test-questions\/","title":{"rendered":"20+ Free MD-102 Exam Questions on Microsoft Endpoint Administrator"},"content":{"rendered":"<p><a href=\"https:\/\/www.whizlabs.com\/md-102-endpoint-administrator\/\" target=\"_blank\" rel=\"noopener\"><strong>Microsoft Endpoint Administrator (MD-102) certification<\/strong> <\/a>is designed mainly for IT professionals who are responsible for managing and deploying Windows 10 and other Microsoft 365 technologies within an organization.<\/p>\n<p class=\"LC20lb MBeuO DKV0Md\">Microsoft MD-102 Exam assesses your expertise in deploying, configuring, protecting, managing, and monitoring devices and applications of the client in a Microsoft 365 environment.<\/p>\n<p>In this blog, we&#8217;ll provide you with valuable resources such as free MD-102 practice exam questions, allowing you to sharpen your skills and boost your confidence. Moreover, you can take advantage of our online Microsoft MD-102 practice test to assess your readiness before undertaking the actual MD-102 exam questions.<\/p>\n<h3>Top MD-102 Practice Test Exam Questions &amp; Answers<\/h3>\n<p>Passing the <a href=\"https:\/\/learn.microsoft.com\/en-us\/credentials\/certifications\/exams\/md-102\/\" target=\"_blank\" rel=\"nofollow noopener\">MD-102 Certification exam<\/a> can help you attain the Microsoft 365 Certified: Endpoint Administrator Associate distinction.<\/p>\n<p>You can prepare for the <strong>Endpoint Administrator (beta) certification<\/strong> with MD-102 exam questions and answers crafted by our experts. Relying on the Microsoft MD-102 exam practice test online before appearing for the actual MD-102 exam can help to determine your preparation level.<\/p>\n<p>Here, we have compiled the top 25 Microsoft&#8217;s MD-102 actual exam questions for you:<\/p>\n<h4><b>Domain: <\/b><b>Manage identity and compliance<\/b><\/h4>\n<p><strong>Question 1: Which of the following commands can be used for restricting to a specific resource group on a specific subscription?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>&#8220;\/subscriptions\/{sub-id}\/resourceGroups\/{rg-name}&#8221;<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>&#8220;\/subscriptions\/{sub-id}&#8221;<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>&#8220;\/subscriptions\/{sub-id}\/resourceGroups\/{rg-name}\/{resource-name}&#8221;<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>&#8220;\/subscriptions\/{sub-id}&#8221;, &#8220;\/subscriptions\/{sub-id}&#8221;<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option A<\/b> <b>is correct <\/b><span style=\"font-weight: 400;\">&#8211; Restrict to a specific resource group on a specific subscription.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Command for Restrict to a subscription.<\/span><\/p>\n<p><b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">\u00a0&#8211; Command for Restrict to a specific resource.<\/span><\/p>\n<p><b>Option D is incorrect <\/b><span style=\"font-weight: 400;\">&#8211; Command for Make a role available for assignment in two subscriptions.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-90997\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-1.webp\" alt=\"\" width=\"638\" height=\"57\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-1.webp 638w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-1-300x27.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-1-150x13.webp 150w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-users-and-groups-in-aad\/5-manage-aad-roles\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-users-and-groups-in-aad\/5-manage-aad-roles<\/span><\/a><\/p>\n<h4><b>Domain: <\/b><b>Manage identity and compliance<\/b><\/h4>\n<p><strong>Question 2: The forest root domain contains objects that don&#8217;t exist in other domains in the forest.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>True<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>False<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option A<\/b> <b>is correct<\/b><span style=\"font-weight: 400;\"> because you always create these objects on the first domain controller, a forest can consist of as few as one domain with a single domain controller, or it can consist of several domains across multiple domain trees.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/introduction-to-ad-ds\/4-define-forests-domains\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/introduction-to-ad-ds\/4-define-forests-domains<\/span><\/a><\/p>\n<h4><b>Domain: <\/b><b>Manage identity and compliance<\/b><\/h4>\n<p><strong>Question 3: Global Infotech has appointed you as a Desktop Administrator who needs your help on setting up conditional access policies to provide granular access for accessing company data irrespective of the device and location due to work from home policy. Please select the most secure way of accessing the data from the following.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Activate MFA for the employees to use the corporate application on their personal devices<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Automatically update the device to the latest version for accessing the company\u2019s data<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Ask the employees to visit any nearby office with a secured network<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>User Exchange ActiveSync to enable access for the employees using their home network<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\"> &#8211; We should need better protection and Conditional access allows you to add a layer of protection for them by requiring MFA when users access them.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Conditional access will not have any functions on initiating any steps instead, it will set criteria for access.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Employees will not prefer going to the office due to work from home setup.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Exchange ActiveSync (EAS) is an Exchange synchronization protocol that&#8217;s optimized to work together with high-latency and low-bandwidth networks which can\u2019t be used to create policies.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-device-compliance-policies\/5-explore-conditional-access\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-device-compliance-policies\/5-explore-conditional-access<\/span><\/a><\/p>\n<h4><b>Domain: <\/b><b>Manage identity and compliance<\/b><\/h4>\n<p><strong>Question 4: What are some of the more commonly used device compliance settings? Choose 2 Options<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Restrict internet service providers<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Perform factory reset including deleting personal data<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Maximum OS version allowed<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Record the private conversation on any 3rd party messenger<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Whether the device is jail-broken or rooted<\/span><\/p>\n<p><b>Correct Answers: C and E<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Options C and E are correct<\/b><span style=\"font-weight: 400;\"> &#8211; Maximum OS version allowed, Whether the device is jail-broken or rooted, Local data encryption, and requires the device to be at, or under the Mobile Threat Defense level are some of the more commonly used device compliance settings. Some of the more commonly used device compliance settings include, require a password to access devices, local data encryption, whether the device is jail-broken or rooted, minimum OS version required, maximum OS version allowed, require the device to be at, or under the Mobile Threat Defense level.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Internet Service Provider (ISP) can\u2019t be restricted using compliance policies.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Deleting personal data will be against the data protection policy but we can encrypt data.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; We can restrict the usage of applications that can be installed on a device but we don&#8217;t have access to record conversations on 3rd party messenger applications.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-device-compliance\/2-plan-for\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-device-compliance\/2-plan-for<\/span><\/a><\/p>\n<h4><b>Domain: Manage identity and compliance<\/b><\/h4>\n<p><b>Question 5: <\/b><strong>You are assigned a task to restrict access for Android Smartphones from accessing Organizational data. You should find and restrict the access for smartphones that don\u2019t have the latest version of the security patch and can give a maximum 90 days of grace period for the users to update their smartphones. Which of the following can be used to achieve this task?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Notify end users through email<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Google Play Protect<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Encryption of data<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Mark device non-compliant<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option D is correct<\/b><span style=\"font-weight: 400;\"> &#8211; Organizations can grant a grace period for users to update the device to make it compliant. Devices that aren&#8217;t updated in that grace period are marked as noncompliant.<\/span><\/p>\n<p><b>Option A is incorrect <\/b><span style=\"font-weight: 400;\">&#8211; Notifying end-users via email can just alert them with a customized email notification before sending it to the end-user.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Google Play Protect is an android specific app that checks your apps and devices for harmful behavior.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Only encryption of data will not restrict the user access using device compliance.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-device-compliance\/2-plan-for\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-device-compliance\/2-plan-for<\/span><\/a><\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 6: <\/b><strong>A restaurant named Pizzamania wants to digitize their orders so they decide to give new iPhones to their waiters. Which Apple option can deploy an enrollment profile \u201cover the air\u201d to bring devices into management?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Company Portal<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Device Enrollment Program (DEP)<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Enterprise work profile<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Configurator for iPhone<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option B is correct<\/b><span style=\"font-weight: 400;\"> &#8211; Organizations can purchase iOS devices through Apple&#8217;s Device Enrollment Program (DEP). DEP lets you deploy an enrollment profile \u201cover the air\u201d to bring devices into management.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Company Portal is the app that lets you, as an employee of your company, securely access those resources.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Enterprise work profile devices to ensure work and personal information are separate.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Configurator for iPhone enables you to add any Mac that has the T2 Security Chip or Apple silicon to your organization in Apple Business Manager or Apple School Manager so that you can use Automated Device Enrollment.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/enroll-devices-use-microsoft-intune\/8-enroll-ios-devices-intune\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/enroll-devices-use-microsoft-intune\/8-enroll-ios-devices-intune<\/span><\/a><\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><strong>Question 7: In Azure AD, If you\u2019re in a federated domain, you\u2019re redirected to your on-premises Secure Token Service (STS) server.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>True<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>False<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\"> &#8211; Federated domain in Azure AD will redirect to the on-premises STS server by locating a matching tenant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, Active Directory Federation Services (AD FS), authenticates users with their usernames and password. Users can access certain applications without being prompted to provide login credentials repeatedly.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-device-authentication\/4-join-devices-azure-active-directory\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/manage-device-authentication\/4-join-devices-azure-active-directory<\/span><\/a><\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 8: <\/b><strong>Which of the following statements NOT true about policy sets?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Used for group objects that need to be assigned together<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>It can be assigned as cross-platform<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>The default restrictions and ESP cannot be added to a policy set<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Policy sets will replace existing concepts or objects<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option D<\/b> <b>is correct<\/b><span style=\"font-weight: 400;\"> &#8211; Policy sets do not replace existing concepts or objects. You can continue to assign individual objects and you can also reference individual objects as part of a policy set. Therefore, any changes to those individual objects will be reflected in the policy set.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; One of the usages of policy sets is to Group objects that need to be assigned together.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Policy sets support Windows, Android, macOS, and iOS\/iPadOS settings, and can be assigned cross-platform.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; In Policy sets, the default restrictions and ESP cannot be added to a policy set and which is one of the enrollment restrictions and Enrollment Status Page (ESP) issues.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/mem\/intune\/fundamentals\/policy-sets\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/mem\/intune\/fundamentals\/policy-sets<\/span><\/a><\/p>\n<h4><b>Domain: <\/b><b>Manage applications<\/b><\/h4>\n<p><b>Question 9: <\/b><strong>You are required to deploy a Win32 application using Microsoft Endpoint Manager (MEM). While deploying, your employer asks you to add the name of the person who will be the point of contact for this app. Which of the following will be the most suitable field to add this information?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Publisher<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Developer<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Name<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Owner<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option D<\/b> <b>is correct<\/b><span style=\"font-weight: 400;\"> &#8211; Under the App information page, the Owner field is used to indicate the name of the person in your organization who manages to license or the point of contact for this app.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; The name of the developer or company that distributes the app.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; The name of the developer or company that distributes the app.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; This name will be visible in the Intune apps list and to users in the Company Portal.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/education-deploy-applications\/deploy-win32-applications\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/education-deploy-applications\/deploy-win32-applications<\/span><\/a><\/p>\n<h4><b>Domain: <\/b><b>Manage applications<\/b><\/h4>\n<p><strong>Question 10: Which of the following values used to define the location of the Office installation files in the Office Deployment Tool?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>UpdatePath=&#8221;\\\\Server\\Share&#8221;<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>OfficeClientEdition=&#8221;32&#8243;<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>SourcePath=&#8221;\\\\server\\share&#8221;<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>DownloadPath=&#8221;\\\\server\\share&#8221;<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option C is correct<\/b><span style=\"font-weight: 400;\"> &#8211; SourcePath=&#8221;\\\\server\\share&#8221; &#8211; The SourcePath value should not include the \/Office part or the name of the folder on which Office Data has been downloaded.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Office checks for updates at &#8220;\\server\\share&#8221; on your network.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Downloads and installs the 32-bit edition of Office.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Office downloads the package at &#8220;\\server\\share&#8221; on your network.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/deployoffice\/office-deployment-tool-configuration-options\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/deployoffice\/office-deployment-tool-configuration-options<\/span><\/a><\/p>\n<h4><b>Domain: Manage applications<\/b><\/h4>\n<p><b>Question 11:<\/b><strong> __________ monitors reliability and performance metrics and provides custom guidance to help optimize and troubleshoot Microsoft 365 Apps on your client devices.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Inventory<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Microsoft 365 Apps health<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Security update status<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Servicing profile<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option B<\/b> <b>is correct<\/b><span style=\"font-weight: 400;\"> &#8211; Microsoft 365 Apps health monitors reliability and performance metrics and provides custom guidance to help optimize and troubleshoot Microsoft 365 Apps on your client devices.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; You can use the inventory page to see information about the devices in your organization, including hardware, operating system, and the Office software running on that device.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; You can use the security update status page in the Microsoft 365 Apps admin center to see which devices have installed the latest security updates for Office.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; With servicing profiles, you can automatically deliver monthly Office updates for specific users or groups.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/deployoffice\/admincenter\/overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/deployoffice\/admincenter\/overview<\/span><\/a><\/p>\n<h4><strong>Domain: Deploy Windows client<\/strong><\/h4>\n<p><strong>Question 12: An organization manually deploys Enterprise or Education edition images for thousands of FAT machines, enters the Key Management services or Multiple Activation Key, and restarts the device. This causes a huge hit on SLA as they are unable to meet clients\u2019 requirements due to this tedious process. How can they implement a change to improve this situation?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Use Inherited Activation<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Use MAK<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Use Subscription Activation<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Use CSP program<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option C is correct<\/b><span style=\"font-weight: 400;\">: The Subscription Activation feature eliminates the need to manually deploy Enterprise or Education edition images on each target device, then later relying upon on-premises key management services such as KMS or MAK based activation, entering Generic Volume License Keys (GVLKs), and subsequently rebooting client devices.<\/span><\/p>\n<p><b>Option A is incorrect:<\/b><span style=\"font-weight: 400;\"> Inherited Activation is a new feature available in Windows 10, version 1803 or later (Windows 11) that allows Windows 10\/11 virtual machines to inherit activation state from their Windows 10\/11 host. This will be applicable only when Virtual Machines activations are involved.<\/span><\/p>\n<p><b>Option B is incorrect:<\/b><span style=\"font-weight: 400;\"> Multiple Activation Key (MAK) activation is used for one-time activation through Microsoft-hosted activation services, either via the internet or by telephone. However, without Subscription activation, the IT Department needs to rely on the traditional method of rebooting the device.<\/span><\/p>\n<p><b>Option D is incorrect:<\/b><span style=\"font-weight: 400;\"> CSP (Cloud Solution Provider) is similar to the Subscription Activation feature but on a smaller scale.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/windows-10-subscription-activation\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/windows-10-subscription-activation<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage identity and compliance<\/b><\/h4>\n<p><b>Question 13: <\/b><strong>An user was unable to log in to Azure Active Directory(AD) even though they have valid credentials, but they were able to log in when they are connected to the corporate network. What could be the issue?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>AD user account was created before federated authentication<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Password hash was not synchronized to the cloud<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Legacy password hashes for NTLM + Kerberos authentication are required<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>The hashing algorithm has failed<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">: Azure AD user accounts created before federation authentication services might have an old password hash, so this doesn&#8217;t match a hash of their on-premises password. Hence, Azure Active Directory Domain Services (Azure AD DS) won&#8217;t be able to validate a user&#8217;s credentials.<\/span><\/p>\n<p><b>Option B is incorrect:<\/b><span style=\"font-weight: 400;\"> The password hash synchronization process runs every 2 minutes and it is streamlined to the cloud which cannot cause the issue.<\/span><\/p>\n<p><b>Option C is incorrect:<\/b><span style=\"font-weight: 400;\"> The user already accessed the AD while on-premises so the Legacy password hashes for NTLM (New Technology LAN Manager) + Kerberos authentication are already enabled and accessed.<\/span><\/p>\n<p><b>Option D is incorrect:<\/b><span style=\"font-weight: 400;\"> the hashing algorithm is automated and cannot be modified or reverted. Once the password is entered while on-premises, the existing password in the cloud is overwritten.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory-domain-services\/compare-identity-solutions\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory-domain-services\/compare-identity-solutions<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage identity and compliance<\/b><\/h4>\n<p><b>Question 14: <\/b><strong>Markle is a Law Firm located in New Jersey and you recently joined the firm as Desktop Administrator. One of the top executives forgot the password and used the self-service password reset functionality of Azure AD. What are the alternative methods of authentication for users that have forgotten their passwords?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Security questions, Office phone, Mobile Phone, Alternative email address<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Mobile phone, Alternative email address, Security questions, Biometric thumbprint<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Office phone, Mobile phone, Text message to any phone number, Security questions<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Challenge Handshake Authentication Protocol, or CHAP, Office phone, Mobile Phone, Alternative email address<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option A is correct &#8211; <\/b><span style=\"font-weight: 400;\">This functionality can be enabled for all users or a group of users.<\/span><\/p>\n<p><b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; A biometric thumbprint is not yet available for Azure AD.<\/span><\/p>\n<p><b>Option C is incorrect &#8211;<\/b><span style=\"font-weight: 400;\"> Text Message or One Time Password is sent only to a registered number.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Challenge Handshake Authentication Protocol or CHAP is not a part of Azure AD.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/protect-identities-azure-active-directory\/6-manage-self-service-password-reset-azure-active-directory\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/protect-identities-azure-active-directory\/6-manage-self-service-password-reset-azure-active-directory<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage identity and compliance<\/b><\/h4>\n<p><b>Question 15:<\/b><strong> As an Enterprise Admin in Gagle\u2019s IT Department, you are assigned a task to configure a mobile device setting or policy that specifies whether Gagle allows or blocks access to Exchange mail for devices that aren\u2019t supported by Basic Mobility and Security. Which of the following mobile device settings or policies should you use to make this requirement possible?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Device Compliance Policies<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Organization-Wide Device Access Settings<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Device Security Policies<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Conditional Access<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option B is correct &#8211;<\/b><span style=\"font-weight: 400;\"> Organization-wide device access settings enable an organization to specify whether it wants to allow or block access to Exchange mail for devices that aren&#8217;t supported by Basic Mobility and Security and which security groups should be excluded from access control.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Device compliance policies are an Intune feature that defines the rules and settings that users and managed devices must meet to be compliant.<\/span><\/p>\n<p><b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Organizations can use device security policies to protect their devices from unauthorized access.<\/span><\/p>\n<p><b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> &#8211; Conditional Access policies are enforced after first-factor authentication is completed. Conditional Access isn&#8217;t intended to be an organization&#8217;s first line of defense<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/mem\/intune\/fundamentals\/policy-map-between-basic-mobility-security-intune\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/mem\/intune\/fundamentals\/policy-map-between-basic-mobility-security-intune<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 16: <\/b><strong>Whizlabs want to restrict specific content for the users due to security reasons. However, they are worried about line-of-business applications since many line-of-business applications are written with limited security concerns. How can an organization deploy attack surface reduction rules without affecting the productivity of its users?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Enable Notification and alerts<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Enable Block mode<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Enable Warn mode<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Enable Audit mode<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option D is correct &#8211;<\/b><span style=\"font-weight: 400;\"> Organizations should use audit mode to evaluate how attack surface reduction rules would affect them if enabled. They should also run all rules in audit mode first so they can understand how the rules affect their line-of-business applications. Many line-of-business applications are written with limited security concerns. As such, they may perform tasks in ways that seem similar to malware. By monitoring audit data and adding exclusions for necessary applications, organizations can deploy attack surface reduction rules without reducing productivity.<\/span><\/p>\n<p><b>Option A is incorrect &#8211;<\/b><span style=\"font-weight: 400;\"> Whenever an attack surface reduction rule is triggered, a notification and an optional alert are displayed on the device but it doesn&#8217;t prevent users from accessing the restricted contents.<\/span><\/p>\n<p><b>Option B is incorrect &#8211;<\/b><span style=\"font-weight: 400;\"> Enabling the block mode directly will result in affecting the line-of-business apps and can affect their day to day tasks of the users.<\/span><\/p>\n<p><b>Option C is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">With the introduction of warn mode, whenever the content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content, which may lead to exposing the restricted content to the users.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-security-microsoft-intune\/7-implement-attack-surface-reduction-rules\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-security-microsoft-intune\/7-implement-attack-surface-reduction-rules<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 17:<\/b><strong> Which of the following is a cloud protection service and enhances standard real-time protection, providing arguably the best antivirus defense on the cloud?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Microsoft Sentinel<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Microsoft Defender for Cloud<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Microsoft Advanced Protection Service (MAPS)<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Microsoft Defender for Identity<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option C is correct &#8211; <\/b><span style=\"font-weight: 400;\">Microsoft Defender Antivirus works seamlessly with Microsoft cloud services. These cloud protection services, also referred to as Microsoft Advanced Protection Service (MAPS), enhance standard real-time protection, providing arguably the best antivirus defense. Cloud protection is critical to preventing breaches from malware and a critical component of attack surface reduction rules.<\/span><\/p>\n<p><b>Option A is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise. With Microsoft Sentinel, you get a single solution for attack detection, threat visibility, proactive hunting, and threat response.<\/span><\/p>\n<p><b>Option B is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">\u00a0Defender for Cloud helps you limit exposure to brute force attacks. By reducing access to virtual machine ports, using the just-in-time VM access, you can harden your network by preventing unnecessary access. You can set secure access policies on selected ports, for only authorized users, allowed source IP address ranges or IP addresses, and for a limited amount of time.<\/span><\/p>\n<p><b>Option D is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Microsoft Defender for Identity (formerly Azure Advanced Threat Protection, also known as Azure ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.<\/span><\/p>\n<p><b>References: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-security-microsoft-intune\/7-implement-attack-surface-reduction-rules\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-security-microsoft-intune\/7-implement-attack-surface-reduction-rules<\/span><\/a>, <a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/overview\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/overview<\/span><\/a>, <a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-cloud-introduction\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-cloud-introduction<\/span><\/a>, <a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/defender-for-identity\/what-is\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/defender-for-identity\/what-is<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 18<\/b><strong>: What are the factors that Threat and Vulnerability Management prioritize vulnerabilities in Microsoft Defender for Endpoint?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>The Threat landscape<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Non-Sensitive information<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Detections in your organization<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Business context<\/span><\/p>\n<p><b>Correct Answers: A, C and D<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Options A, C and D are correct &#8211; <\/b><span style=\"font-weight: 400;\">The Threat and Vulnerability Management module serves as an infrastructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience. It uses sensors to discover vulnerabilities and misconfigurations in real-time. This discovery is completed without the need for agents or periodic scans. Threat and Vulnerability Management prioritizes vulnerabilities based on:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">the threat landscape<\/span><\/li>\n<li><span style=\"font-weight: 400;\">detections in your organization<\/span><\/li>\n<li><span style=\"font-weight: 400;\">sensitive information on vulnerable devices<\/span><\/li>\n<li><span style=\"font-weight: 400;\">business context<\/span><\/li>\n<\/ul>\n<p><b>Option B is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Non-sensitive information is often considered as public data and won&#8217;t be a security threat to an organization.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-protection-use-microsoft-defender\/5-manage-endpoint-threats-vulnerabilities\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-protection-use-microsoft-defender\/5-manage-endpoint-threats-vulnerabilities<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 19: <\/b><strong>As a system administrator, you are running the Threat and vulnerability management exposure score, followed by Microsoft Secure Store for Devices for investigation purposes. You found out that one of the devices which is not active for nearly 90 days has not been factored in the exposure score run by you. Can you please provide an explanation on why the specific device was not factored?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>The device was considered an exposed device<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Analysis has found software vulnerability in that device<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Device must be active in the last 30 days to be factored<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Device has been marked for remediation activities which refrain itself from the evaluation<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option C is correct &#8211; <\/b><span style=\"font-weight: 400;\">Devices must be active in the last 30 days to be factored in on the data that reflects an organization&#8217;s threat and vulnerability management exposure score and Microsoft Secure Score for Devices.<\/span><\/p>\n<p><b>Option A is incorrect &#8211;<\/b><span style=\"font-weight: 400;\"> Even though marked as an exposed device, the device should be factored in during the evaluation.<\/span><\/p>\n<p><b>Option B is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Only after the evaluation is performed by the threat and Vulnerability Management capability in the Microsoft 365 Defender, we can find out whether the device has software vulnerability.<\/span><\/p>\n<p><b>Option D is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Device marked for remediation activities will not be refraining itself from the threat and vulnerability management exposure score and Microsoft Secure Score for Devices.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-protection-use-microsoft-defender\/5-manage-endpoint-threats-vulnerabilities\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/implement-endpoint-protection-use-microsoft-defender\/5-manage-endpoint-threats-vulnerabilities<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 20: <\/b><strong>Each architecture type has a selection of tools to use for onboarding devices to Microsoft Defender for Endpoint. Please drag and drop to match tools based on the architecture.<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Cloud-native<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Microsoft Endpoint Manager, Configuration Manager<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Co-management<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Configuration Manager, Group Policy<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">On-premises<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Microsoft Endpoint Manager<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b>Correct Answer: 1-C, 2-A and 3-B<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cloud-native<\/b><\/li>\n<\/ul>\n<p><b>Microsoft Endpoint Manager<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Co-management<\/b><\/li>\n<\/ul>\n<p><b>Microsoft Endpoint Manager, Configuration Manager<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>On-premises<\/b><\/li>\n<\/ul>\n<p><b>Configuration Manager, Group Policy<\/b><\/p>\n<p><span style=\"font-weight: 400;\">You can use Microsoft Defender for Endpoint in your environment in different ways to meet your needs. The first step is to classify how your company is structured. Choose the architecture that best maps to your needs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud-native &#8211; You should choose a cloud-native architecture if your organization&#8217;s devices are based in the cloud. For example, if all devices are managed by Microsoft Endpoint Manager, or if your organization would like to move to them in the future to be managed by Microsoft Endpoint Manager.<img decoding=\"async\" class=\"aligncenter size-full wp-image-90998\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.1.webp\" alt=\"\" width=\"949\" height=\"569\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.1.webp 949w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.1-300x180.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.1-768x460.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.1-150x90.webp 150w\" sizes=\"(max-width: 949px) 100vw, 949px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Co-management &#8211; Choose co-management if you have a blended architecture, with devices managed by Microsoft Endpoint Manager and an on-premises configuration management solution.<img decoding=\"async\" class=\"aligncenter size-full wp-image-90999\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.2.webp\" alt=\"\" width=\"981\" height=\"597\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.2.webp 981w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.2-300x183.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.2-768x467.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.2-150x91.webp 150w\" sizes=\"(max-width: 981px) 100vw, 981px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">On-premises &#8211; Choose an on-premises architecture if all your devices are using either Configuration Manager or Active Directory Domain Services. Your organization can still benefit from using the power of the cloud-based Microsoft Defender for Endpoint.<img decoding=\"async\" class=\"aligncenter size-full wp-image-91000\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.3.webp\" alt=\"\" width=\"978\" height=\"591\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.3.webp 978w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.3-300x181.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.3-768x464.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-20.3-150x91.webp 150w\" sizes=\"(max-width: 978px) 100vw, 978px\" \/><\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/plan\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/plan<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 21: <\/b><strong>What are the Microsoft recommended deployment ring structure to use with Microsoft Defender for Endpoint?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Pilot<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Evaluate<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Full Deployment<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Exit Criteria<\/span><\/p>\n<p><b>Correct Answers: A, B and C<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option A, B and C are correct &#8211;\u00a0 <\/b><span style=\"font-weight: 400;\">You need to define deployment rings. Using deployment rings, you onboard a set number of devices first, look for potential issues and then address those issues before you go to the next set of devices. This is useful for your scenario because you don&#8217;t want to onboard all your devices in one go.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Evaluate &#8211;<\/b><span style=\"font-weight: 400;\"> You choose a relatively small number of test devices (up to 50) to onboard. You test the devices in this ring to ensure that they meet your exit criteria before you move to the next ring. Exit criteria can include confirming whether the devices show up in the devices list and whether alerts are showing up in the dashboard.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Pilot &#8211; <\/b><span style=\"font-weight: 400;\">If the devices have passed the evaluation ring, you can then move up to this deployment ring. You choose more devices to onboard (between 50 to 100 devices). Then if the devices pass your exit criteria, you proceed to the next deployment ring.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Full deployment &#8211;<\/b><span style=\"font-weight: 400;\"> If the devices have passed the pilot ring, you can move to this final ring, where you onboard the rest of your devices in increments. Use the deployment link in the Learn more section to access best practice material on how to do this.<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-91001\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-21.webp\" alt=\"\" width=\"998\" height=\"501\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-21.webp 998w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-21-300x151.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-21-768x386.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/MD-21-150x75.webp 150w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/p>\n<p><b>Option D is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Exit criteria is already a part of the evaluation process so you don&#8217;t need to define it separately to consider it as one of the deployment ring structures.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/plan\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/plan<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 22: <\/b><strong>Since you are a new recruit as an Enterprise Administrator, you are being questioned by your seniors to test your knowledge on Microsoft Defender for Endpoint. They asked you to evaluate the devices and block sophisticated threats and malwares which can be a security concern for an organization. Also, they have requested you to configure the device to stop any malicious activity from installed applications. How will you fulfill their requirement by using one of the below components of Microsoft Defender for Endpoint?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Threat and vulnerability management<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Next generation protection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Attack surface reduction<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Microsoft Threat Experts<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option B is correct &#8211; <\/b><span style=\"font-weight: 400;\">You can use Microsoft Defender for Endpoint&#8217;s next generation protection to block sophisticated threats and malware. With it, you can leverage a combination of both client-based and cloud-based protection engines and machine learning. You&#8217;re able to use behavior-based real-time protection, block file-based, and fileless malware, and stop malicious activity from applications.<\/span><\/p>\n<p><b>Option A is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Threat and vulnerability management uses a risk-based based approach that can help you discover, prioritize, and remediate endpoint vulnerabilities and misconfigurations.<\/span><\/p>\n<p><b>Option C is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Attack surface reduction eliminates risks by ensuring device settings are correctly configured with capabilities such as hardware-based isolation, application control, network and web protection, and more. You can use granular controls through rules that target certain software behaviors to keep your organization safe.<\/span><\/p>\n<p><b>Option D is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">Microsoft Threat Experts is a managed service to get access to security experts. You can use it to get access to insights that you can use to better understand threats and take appropriate action. This is a separate service, so it&#8217;s not a direct capability of Microsoft Defender for Endpoint.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/prepare\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/prepare<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 23: <\/b><strong>What are the right steps that are involved in the deployment process for device onboarding to Microsoft Defender using Microsoft Endpoint Manager?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Configure Microsoft Defender for Endpoint capabilities, create a group, then verify config policies have been applied<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Configure capabilities, verify config policies have been applied, then create a group<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Create a group, configure Microsoft Defender for Endpoint capabilities, then verify config policies have been applied<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Verify config policies, create a group, then configure Microsoft Defender for Endpoint capabilities<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option C is correct &#8211;<\/b><span style=\"font-weight: 400;\"> The deployment process using Microsoft Endpoint Manager consists of the following steps:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Create a group in Microsoft Endpoint Manager to assign configurations to target devices or users<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Configure Microsoft Defender for Endpoint capabilities that you&#8217;ll need using Microsoft Endpoint Manager.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Verify that your configuration policies for capabilities have been applied.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>Options A, B and D are incorrect &#8211; <\/b><span style=\"font-weight: 400;\">These are not the correct sequence of steps that are involved in the deployment process.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/set-up-onboard-devices\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/m365-get-started-defender-endpoint\/set-up-onboard-devices<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 24: <\/b><strong>Please select the correct sequence from the below steps for creating a device group in Microsoft Defender for Endpoint.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Preview several devices that will be matched by this rule. If you&#8217;re satisfied with the rule, select the User access tab<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>In the navigation pane, select Settings, select Endpoints and then under Permissions select Device groups and select + Add device group<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Assign the user groups that can access the device group you created. You can only grant access to Azure AD user groups that have been assigned to RBAC roles and select Close<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Enter the group name and automation settings and specify the matching rule that determines which devices belong to the group. See How the automated investigation starts<\/span><\/p>\n<p><b>Correct Answers: B, D, A and C<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the navigation pane, select <\/span><b>Settings<\/b><span style=\"font-weight: 400;\">, select <\/span><b>Endpoints, <\/b><span style=\"font-weight: 400;\">and then under <\/span><b>Permissions <\/b><span style=\"font-weight: 400;\">select <\/span><b>Device groups<\/b><span style=\"font-weight: 400;\"> and select <\/span><b>+ Add device group<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enter the group name and automation settings and specify the matching rule that determines which devices belong to the group. See How the automated investigation starts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Preview several devices that will be matched by this rule. If you&#8217;re satisfied with the rule, select the <\/span><b>User access tab<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assign the user groups that can access the device group you created. You can only grant access to Azure AD user groups that have been assigned to RBAC roles and select Close.<\/span><\/li>\n<\/ul>\n<p><b>Statement &#8211; <\/b><span style=\"font-weight: 400;\">In Microsoft Defender for Endpoint, you can create device groups in the context of role-based access (RBAC) to control who can take specific action or see information by assigning the device group(s) to a user group. and use them to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Limit access to related alerts and data to specific Azure AD user groups with assigned RBAC roles<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Configure different auto-remediation settings for different sets of devices<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assign specific remediation levels to apply during automated investigations<\/span><\/li>\n<\/ul>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/deploy-microsoft-defender-for-endpoints-environment\/7-configure-device-groups\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/deploy-microsoft-defender-for-endpoints-environment\/7-configure-device-groups<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Domain: Manage, maintain, and protect devices<\/b><\/h4>\n<p><b>Question 25: <\/b><strong>By enabling me, I can help you in cyber attacks by locking your security settings from being changed through apps and methods and I am exclusively available when you use Microsoft Defender Antivirus and Cloud-based protection is enabled. Can you find my name from the below-advanced features available in Microsoft Defender for Endpoint?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Endpoint detection and response (EDR) in block mode<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Microsoft Threat Experts &#8211; Targeted Attack Notifications<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Office 365 Threat Intelligence connection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Tamper protection<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation<\/b><\/p>\n<p><b>Option D is correct &#8211; <\/b><span style=\"font-weight: 400;\">During some kinds of cyber attacks, hackers can try to disable security features, such as anti-virus protection, on your machines. Hackers like to disable your security features to get easier access to your data, install malware, or otherwise exploit your data, identity, and devices. Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods.<\/span><\/p>\n<p><b>Option A is incorrect &#8211;<\/b><span style=\"font-weight: 400;\"> Endpoint detection and response (EDR) in block mode work behind the scenes to remediate malicious artifacts that are detected post-breach and provides protection from malicious artifacts, even when Microsoft Defender Antivirus is running in passive mode. When turned on, EDR in block mode blocks malicious artifacts or behaviors that are detected on a device.<\/span><\/p>\n<p><b>Option B is incorrect &#8211; <\/b><span style=\"font-weight: 400;\">You can only use the experts-on-demand capability if you&#8217;ve applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your portal&#8217;s alerts dashboard and via email if you configure it.<\/span><\/p>\n<p><b>Option C is incorrect &#8211;<\/b><span style=\"font-weight: 400;\"> This feature is only available if you have an active Office 365 E5 or the Threat Intelligence add-on. When you turn on this feature, you&#8217;ll be able to incorporate data from Microsoft Defender for Office 365 into Microsoft 365 Defender to conduct a comprehensive security investigation across Office 365 mailboxes and Windows devices.<\/span><\/p>\n<p><b>Reference: <\/b><a style=\"font-size: 16px; font-weight: 400; background-color: #ffffff;\" href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/deploy-microsoft-defender-for-endpoints-environment\/8-configure-environment-advanced-features\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/deploy-microsoft-defender-for-endpoints-environment\/8-configure-environment-advanced-features<\/span><\/a><\/p>\n<h3>Conclusion<\/h3>\n<p>Passing the MD-102 exam not only validates their expertise but also opens up new career opportunities in the ever-evolving field of IT administration. Apart from MD-102 Free Exam Questions, we offer MD-102 Study Guides, and MD-102 Practice test. <strong>We do not offer MD-102 exam dumps at any cost.<\/strong><\/p>\n<p>To excel in this certification, continuous learning and hands-on experience are key, ensuring that IT professionals remain well-equipped to address the challenges of managing modern desktops in today&#8217;s dynamic technology landscape.<\/p>\n<p>You can get real-time hands-on experience by utilizing our <a href=\"https:\/\/www.whizlabs.com\/labs\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Azure hands-on labs<\/span><\/a><span style=\"font-weight: 400;\">, and <a href=\"https:\/\/www.whizlabs.com\/labs\/\">Azure <\/a> <\/span><a href=\"https:\/\/www.whizlabs.com\/labs\/sandbox\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">sandbox.<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Endpoint Administrator (MD-102) certification is designed mainly for IT professionals who are responsible for managing and deploying Windows 10 and other Microsoft 365 technologies within an organization. Microsoft MD-102 Exam assesses your expertise in deploying, configuring, protecting, managing, and monitoring devices and applications of the client in a Microsoft 365 environment. In this blog, we&#8217;ll provide you with valuable resources such as free MD-102 practice exam questions, allowing you to sharpen your skills and boost your confidence. Moreover, you can take advantage of our online Microsoft MD-102 practice test to assess your readiness before undertaking the actual MD-102 exam [&hellip;]<\/p>\n","protected":false},"author":363,"featured_media":91213,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15],"tags":[5070,5065],"class_list":["post-90994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-azure","tag-md-102-practice-test","tag-md-102"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",1280,720,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-150x150.webp",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-300x169.webp",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-768x432.webp",768,432,true],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-1024x576.webp",1024,576,true],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",1280,720,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",1280,720,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI.webp",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-250x250.webp",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-640x720.webp",640,720,true],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/09\/Free-Question-on-Microsoft-Endpoint-Administrator-MD-102-FI-150x84.webp",150,84,true]},"uagb_author_info":{"display_name":"Senthil","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/senthilwhizlabs-com\/"},"uagb_comment_info":508,"uagb_excerpt":"Microsoft Endpoint Administrator (MD-102) certification is designed mainly for IT professionals who are responsible for managing and deploying Windows 10 and other Microsoft 365 technologies within an organization. Microsoft MD-102 Exam assesses your expertise in deploying, configuring, protecting, managing, and monitoring devices and applications of the client in a Microsoft 365 environment. In this blog,&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/90994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/363"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=90994"}],"version-history":[{"count":11,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/90994\/revisions"}],"predecessor-version":[{"id":91268,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/90994\/revisions\/91268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/91213"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=90994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=90994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=90994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}