HOTSPOT -You have an Azure AD tenant named contoso.com that contains the devices shown in the following table.All devices contain an app named App1 and are enrolled in Microsoft Intune.You need to prevent users from copying data from App1 and pasting the data into other apps.Which type of policy and how many policies should you create in Intune? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.
You have a Microsoft 365 subscription that uses Microsoft Intune Suite.You use Microsoft Intune to manage devices.You plan to deploy two apps named App1 and App2 to all Windows devices. App1 must be installed before App2.From the Intune admin center, you create and deploy two Windows app (Win32) apps.You need to ensure that App1 is installed before App2 on every device.What should you configure?
You have a Microsoft Intune subscription.You have devices enrolled in Intune as shown in the following table.An app named App1 is installed on each device.What is the minimum number of app configuration policies required to manage App1?
You have a Microsoft 365 E5 subscription that contains 100 iOS devices enrolled in Microsoft Intune.You need to deploy a custom line-of-business (LOB) app to the devices by using Intune.Which extension should you select for the app package file?
You have a Microsoft 365 E5 subscription that contains a user named User1 and a web app named App1.App1 must only accept modern authentication requests.You plan to create a Conditional Access policy named CAPolicy1 that will have the following settings:Assignments -Users or workload identities: User1Cloud apps or actions: App1 -Access controls -Grant: Block access -You need to block only legacy authentication requests to App1.Which condition should you add to CAPolicy1?
HOTSPOT -Case study -Overview -ADatum Corporation is a consulting company that has a main office in Montreal and branch offices in Seattle and New York.ADatum has a Microsoft 365 E5 subscription.Environment -Network Environment -The network contains an on-premises Active Directory domain named adatum.com. The domain contains the servers shown in the following table.ADatum has a hybrid Azure AD tenant named adatum.com.Users and Groups -The adatum.com tenant contains the users shown in the following table.All users are assigned a Microsoft Office 365 license and an Enterprise Mobility + Security E3 license.Enterprise State Roaming is enabled for Group1 and GroupA.Group1 and Group2 have a Membership type of Assigned.Devices -ADatum has the Windows 10 devices shown in the following table.The Windows 10 devices are joined to Azure AD and enrolled in Microsoft Intune.The Windows 10 devices are configured as shown in the following table.All the Azure AD joined devices have an executable file named C:\AppA.exe and a folder named D:\Folder1.Microsoft Intune Configuration -Microsoft Intune has the compliance policies shown in the following table.The Automatic Enrollment settings have the following configurations:MDM user scope: GroupA -MAM user scope: GroupB -You have an Endpoint protection configuration profile that has the following Controlled folder access settings:Name: Protection1 -Folder protection: Enable -List of apps that have access to protected folders: C:\*\AppA.exeList of additional folders that need to be protected: D:\Folder1Assignments:Included groups: Group2, GroupB -Windows Autopilot Configuration -ADatum has a Windows Autopilot deployment profile configured as shown in the following exhibit.Currently, there are no devices deployed by using Windows Autopilot.The Intune connector for Active Directory is installed on Server1.Requirements -Planned Changes -ADatum plans to implement the following changes:Purchase a new Windows 10 device named Device6 and enroll the device in IntuneNew computers will be deployed by using Windows Autopilot and will be hybrid Azure AD joined.Deployed a network boundary configuration profile that will have the following settings:Name: Boundary1 -Network boundary: 192.168.1.0/24Scope tags: Tag1 -Assignments:Included groups: Group1, Group2 -Deploy two VPN configuration profiles named Connection1 and Connection2 that will have the following settings:Name: Connection1 -Connection name: VPN1 -Connection type: L2TP -Assignments:Included groups: Group1, Group2, GroupAExcluded groups: --Name: Connection2 -Connection name: VPN2 -Connection type: IKEv2 -Assignments:Included groups: GroupA -Excluded groups: GroupB -Technical Requirements -ADatum must meet the following technical requirements:Users in GroupA must be able to deploy new computers.Administrative effort must be minimized.For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point.