List of questions
Related questions
Question 75 - SC-100 discussion
A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications. The customer discovers that several endpoints are infected with malware.
The customer suspends access attempts from the infected endpoints.
The malware is removed from the end point.
Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Microsoft Defender for Endpoint reports the endpoints as compliant.
Microsoft Intune reports the endpoints as compliant.
A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.
The client access tokens are refreshed.
0 comments
Leave a comment first