Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft MS-102 Exam - Topic 3 Question 21 Discussion

Actual exam question for Microsoft's MS-102 exam
Question #: 21
Topic #: 3
[All MS-102 Questions]

You have a Microsoft 365 E5 subscription.

Al users have Mac computers. ATI the computers are enrolled in Microsoft Endpoint Manager and onboarded to Microsoft Defender for Endpoint.

You need to configure Microsoft Defender for Endpoint on the computers.

What should you create from the Endpoint Management admin center?

Show Suggested Answer Hide Answer
Suggested Answer: D, E

Contribute your Thoughts:

0/2000 characters
Dalene
4 months ago
Are we sure about this? Seems too simple.
upvoted 0 times
...
Howard
4 months ago
No way, it's definitely not B or D.
upvoted 0 times
...
Linwood
4 months ago
Wait, I thought we needed a baseline profile?
upvoted 0 times
...
Eladia
4 months ago
Totally agree, C is the right choice!
upvoted 0 times
...
Nu
5 months ago
You need a device configuration profile for Macs.
upvoted 0 times
...
Thora
5 months ago
I’m leaning towards the mobile device management security baseline profile, but I need to double-check if that applies to Mac computers.
upvoted 0 times
...
Kanisha
5 months ago
I feel like a Microsoft Defender for Endpoint baseline profile could be the answer, but I might be mixing it up with other profiles we studied.
upvoted 0 times
...
Almeta
5 months ago
I remember practicing a question about security baselines, but I can't recall if it was specifically for Defender or something else.
upvoted 0 times
...
Blair
5 months ago
I think we need to create a device configuration profile, but I'm not entirely sure if that's the right choice for Defender.
upvoted 0 times
...
Danilo
5 months ago
Okay, I think I've got this. Since the computers are enrolled in Microsoft Endpoint Manager, we need to create a device configuration profile to configure Microsoft Defender for Endpoint. Option C looks like the right choice.
upvoted 0 times
...
Jill
5 months ago
Hmm, I'm a bit unsure here. The question mentions that all the users have Mac computers, so I'm not sure if a Microsoft Defender for Endpoint baseline profile is the right choice. Maybe I should double-check the options.
upvoted 0 times
...
India
5 months ago
This seems straightforward - we need to configure Microsoft Defender for Endpoint, so I'd go with option A and create a Microsoft Defender for Endpoint baseline profile.
upvoted 0 times
...
Rosita
6 months ago
I'm confident that option A is the correct answer. The question specifically states that we need to configure Microsoft Defender for Endpoint, and a baseline profile is the appropriate way to do that, regardless of the device type.
upvoted 0 times
...
Tequila
6 months ago
Okay, I got this. The key is to block access while minimizing half-open sockets, so I'm going to go with "drop" and "deny" as the two best security policy actions here.
upvoted 0 times
...
Paris
6 months ago
Hmm, this looks like a tricky one. I'll need to carefully analyze the requirements and see if I can find the most cost-effective host pool design.
upvoted 0 times
...
Chau
6 months ago
Okay, let me think this through. I'm pretty confident the incident field and verdict label are required, since the model needs to learn the relationship between the input data and the target output. The number of incidents and incident type seem less crucial, but I could be missing something.
upvoted 0 times
...
Kimbery
6 months ago
This seems like a straightforward question about following IIA guidance. I'll carefully review the options and choose the one that best aligns with the standards.
upvoted 0 times
...
Cristen
10 months ago
I bet the person who wrote this question has never actually used a Mac before. You know they're just trying to trip us up, right?
upvoted 0 times
...
Cyril
10 months ago
Ooh, a mobile device management (MDM) security baseline profile? That sounds fancy, but I don't think it's the right fit for this situation.
upvoted 0 times
Margurite
8 months ago
Brandon: Great, let's go ahead and create the device configuration profile then.
upvoted 0 times
...
Hyman
9 months ago
User 3: Yes, that's the right option. A device configuration profile is what we need.
upvoted 0 times
...
Brandon
9 months ago
User 2: Should we create a device configuration profile from the Endpoint Management admin center?
upvoted 0 times
...
Cortney
9 months ago
User 1: We need to configure Microsoft Defender for Endpoint on the Mac computers.
upvoted 0 times
...
...
Cortney
11 months ago
A device configuration profile is the obvious choice. Duh, how else are we going to set up Defender on those Macs?
upvoted 0 times
Johnetta
10 months ago
A) a Microsoft Defender for Endpoint baseline profile
upvoted 0 times
...
Buck
10 months ago
Exactly, a device configuration profile is needed to configure Microsoft Defender for Endpoint on the Mac computers.
upvoted 0 times
...
Davida
10 months ago
C) a device configuration profile
upvoted 0 times
...
...
Whitley
11 months ago
Wait, why would we need an update policy for iOS? These are Mac computers, not iPhones. That's just silly.
upvoted 0 times
Marti
11 months ago
D) a mobile device management (MDM) security baseline profile
upvoted 0 times
...
Dalene
11 months ago
C) a device configuration profile
upvoted 0 times
...
Cherrie
11 months ago
A) a Microsoft Defender for Endpoint baseline profile
upvoted 0 times
...
...
Mee
11 months ago
I'm not sure, but I think creating a Microsoft Defender for Endpoint baseline profile could also be a valid option.
upvoted 0 times
...
Noah
11 months ago
A Microsoft Defender for Endpoint baseline profile is the way to go here. Gotta make sure those Macs are locked down tight!
upvoted 0 times
Vicente
11 months ago
A) a Microsoft Defender for Endpoint baseline profile
upvoted 0 times
...
Raul
11 months ago
C) a device configuration profile
upvoted 0 times
...
...
Walton
11 months ago
I agree with Amalia. Configuring Microsoft Defender for Endpoint on Mac computers requires a device configuration profile.
upvoted 0 times
...
Amalia
11 months ago
I think we should create a device configuration profile.
upvoted 0 times
...
Paulina
11 months ago
I'm not sure, but I think creating a Microsoft Defender for Endpoint baseline profile could also be a valid option.
upvoted 0 times
...
Arlene
12 months ago
I agree with Viki, a device configuration profile makes sense for configuring Microsoft Defender for Endpoint.
upvoted 0 times
...
Viki
12 months ago
I think we should create a device configuration profile.
upvoted 0 times
...

Save Cancel