ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 66 - SC-200 discussion

Report
Export

You are investigating a potential attack that deploys a new ransomware strain.

You plan to perform automated actions on a group of highly valuable machines that contain sensitive information.

You have three custom device groups.

You need to be able to temporarily group the machines to perform actions on the devices.

Which three actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Assign a tag to the device group.

Answers
A.

Assign a tag to the device group.

B.

Add the device users to the admin role.

Answers
B.

Add the device users to the admin role.

C.

Add a tag to the machines.

Answers
C.

Add a tag to the machines.

D.

Create a new device group that has a rank of 1.

Answers
D.

Create a new device group that has a rank of 1.

E.

Create a new admin role.

Answers
E.

Create a new admin role.

F.

Create a new device group that has a rank of 4.

Answers
F.

Create a new device group that has a rank of 4.

Suggested answer: A, C, D

Explanation:

Reference: https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manaqe-access

asked 05/10/2024
Ahmed Dawoud
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first