If you are looking for free MD-102 dumps than here we have some sample question answers available. You can prepare from our Microsoft MD-102 exam questions notes and prepare exam with this practice test. Check below our updated MD-102 exam dumps.
DumpsGroup are top class study material providers and our inclusive range of MD-102 Real exam questions would be your key to success in Microsoft Microsoft 365 Certified: Endpoint Administrator Associate Certification Exam in just first attempt. We have an excellent material covering almost all the topics of Microsoft MD-102 exam. You can get this material in Microsoft MD-102 PDF and MD-102 practice test engine formats designed similar to the Real Exam Questions. Free MD-102 questions answers and free Microsoft MD-102 study material is available here to get an idea about the quality and accuracy of our study material.
Sample Question 4
You have 25 computers that run Windows 10 Pro.You have a Microsoft 365 E5 subscription that uses Microsoft Intune.You need to upgrade the computers to Windows 11 Enterprise by using an in-placeupgrade. The solution must minimize administrative effort.What should you use?
A. Microsoft Deployment Toolkit (MDT) and a default image of Windows 11 Enterprise B. Microsoft Configuration Manager and a custom image of Windows 11 Enterprise C. Windows Autopilot D. Subscription Activation
Answer: C
Sample Question 5
Your network contains an Active Directory domain. The domain contains a computernamed Computer! that runs Windows 11. You need to enable the Windows RemoteManagement (WinRM) service on Computer1 and perform the following configurations:• For the WinRM service, set Startup type to Automatic.• Create a listener that accepts requests from any IP address.• Enable a firewall exception for WS-Management communications.Which PowerShell cmdlet should you use?
A. Connect-WSMan B. Enable-PSRemoting C. Invoke-WSManAction D. Enable-PSSessionConfiguration
Answer: B
Sample Question 6
You have a Microsoft 365 subscription.You need provide a user the ability to disable Security defaults and principle of leastprivilege.Which role should you assign to the user?
A. Global Administrator B. Conditional Access Administrator C. Security Administrator D. Intune Administrator
Answer: B
Explanation:
To enable or disable security defaults in your directory, sign in to theAzure portalas a
security administrator, Conditional Access administrator, or global administrator.
Note: Conditional Access Administrator
Users with this role have the ability to manage Azure Active Directory Conditional Access
You have computers that run Windows 10 and are managed by using Microsoft Intune.Users store their files in a folder named D:\Folder1.You need to ensure that only a trusted list of applications is granted write access toD:\Folder1.What should you configure in the device configuration profile?
A. Microsoft Defender Exploit Guard B. Microsoft Defender Application Guard C. Microsoft Defender SmartScreen D. Microsoft Defender Application Control
Answer: A
Sample Question 8
Note: This question is part of a series of questions that present the same scenario. Eachquestion in the series contains a unique solution that might meet the stated goals. Somequestion sets might have more than one correct solution, while others might not have acorrect solution.After you answer a question in this section, you will NOT be able to return to it. As a result,these questions will not appear in the review screen.Your company has an Azure AD tenant named contoso.com that contains several Windows10 devices.When you join new Windows 10 devices to contoso.com, users are prompted to set up afour-digit pin.You need to ensure that the users are prompted to set up a six-digit pin when they join theWindows 10 devices to contoso.com.Solution: From the Microsoft Entra admin center, you configure the Authenticationmethods.Does this meet the goal?
A. Yes B. No
Answer: B
Sample Question 9
You have a Windows 10 device named Device! that is joined to Active Directory andenrolled in Microsoft Intune.Device1 is managed by using Group Policy and Intune. You need to ensure that the Intune settings override the Group Policy settings.What should you configure?
A. a device configuration profile B. a device compliance policy C. an MDM Security Baseline profile D. a Group Policy Object (GPO)
Answer: A
Explanation: A device configuration profile is a collection of settings that can be applied to
devices enrolled in Microsoft Intune. You can use device configuration profiles to manage
Windows 10 devices that are joined to Active Directory and enrolled in Intune. To ensure
that the Intune settings override the Group Policy settings, you need to enable the policy
CSP setting called MDMWinsOverGP in the device configuration profile. This setting will
give precedence to the MDM policy over any conflicting Group Policy
Your company implements Azure AD, Microsoft 365, Microsoft Intune, and AzureInformation Protection. The company's security policy states the following:• Personal devices do not need to be enrolled in Intune.• Users must authenticate by using a PIN before they can access corporate email data.• Users can use their personal iOS and Android devices to access corporate cloudservices.• Users must be prevented from copying corporate email data to a cloud storage serviceother than Microsoft OneDrive for Business.You need to configure a solution to enforce the security policy.What should you create?
A. a device configuration profile from the Microsoft Intune admin center B. a data loss prevention (DIP) policy from the Microsoft Purview compliance portal C. an insider risk management policy from the Microsoft Purview compliance portal D. an app protection policy from the Microsoft Intune admin center
Answer: B
Sample Question 11
You have a Microsoft Deployment Toolkit (MDT) deployment share named DS1.in the Out-of-Box Drivers node, you create folders that contain drivers for differenthardware models.You need to configure the Inject Drivers MDT task to use PnP detection to install thedrivers for one of the hardware models.What should you do first?
A. Import an OS package. B. Create a selection profile. C. Add a Gather task to the task sequence. D. Add a Validate task to the task sequence.
Answer: B
Sample Question 12
You have a Microsoft 365 subscription that uses Microsoft Intune Suite. You use MicrosoftIntune to manage devices.You need to review the startup times and restart frequencies of the devices. What shouldyou use?
A. Azure Monitor B. intune Data Warehouse C. Microsoft Defender for Endpoint D. Endpoint analytics
Answer: D
Explanation: Endpoint analytics is a feature of Microsoft Intune that provides insights into
the performance and health of devices. You can use endpoint analytics to review the
startup times and restart frequencies of the devices, as well as other metrics such as signin
times, battery life, app reliability, and software inventory. References:
You have a Microsoft 365 E5 subscription. The subscription contains 25 computers that runWindows 11 and are enrolled in Microsoft Intune. You need to onboard the devices toMicrosoft Defender for Endpoint. What should you create in the Microsoft Intune admincenter?
A. an attack surface reduction (ASR) policy B. a security baseline C. an endpoint detection and response (EDR) policy D. an account protection policy E. an antivirus policy
Answer: C
Explanation: To onboard the devices to Microsoft Defender for Endpoint, you need to
create an endpoint detection and response (EDR) policy in the Microsoft Intune admin
center. This policy enables EDR capabilities on devices that are enrolled in Intune and
allows you to configure various settings for EDR functionality. You can then assign the
You have 100 computers that run Windows 10 and connect to an Azure Log Analyticsworkspace.Which three types of data can you collect from the computers by using Log Analytics?Each correct answer a complete solution.NOTE: Each correct selection is worth one point.
A. error events from the System log B. failure events from the Security log C. third-party application logs stored as text files D. the list of processes and their execution times E. the average processor utilization
Answer: A,C,E
Explanation: You can collect error events from the System log, third-party application logs
stored as text files, and the average processor utilization from the computers by using Log
Analytics. These are some of the types of data that you can collect by using data sources
such as Windows event logs, custom logs, and performance counters. You cannot collect
failure events from the Security log or the list of processes and their execution times by
Your network contains an Active Directory domain named contoso.com. The domaincontains two computers named Computer! and Computer2 that run Windows 10. OnComputer1, you need to run the Invoke-Command cmdlet to execute several PowerShellcommands on Computed. What should you do first?
A. On Computed, run the Enable-PSRemoting cmdlet. B. On Computed, add Computer! to the Remote Management Users group. C. From Active Directory, configure the Trusted for Delegation setting for the computeraccount of Computed. D. On Computer1, run the HcK-PSSession cmdlet.
Answer: C
Sample Question 16
You have a Microsoft 365 subscription that uses Microsoft Intune Suite. You use Microsoft Intune to manage Windows 11 devices.You need to implement passwordless authentication that requires users to use numbermatchingWhich authentication method should you use?
A. Microsoft Authenticator B. voice calls C. FI002 security keys D. text messages
Answer: A
Sample Question 17
You are replacing 100 company-owned Windows devices.You need to use the Microsoft Deployment Toolkit (MDT) to securely wipe anddecommission the devices. The solution must meet the following requirements:• Back up the user state.• Minimize administrative effort.Which task sequence template should you use?
A. Standard Client Task Sequence B. Standard Client Replace Task Sequence C. Litetouch OEM Task Sequence D. Sysprep and Capture
Answer: B
Sample Question 18
You have an Azure AD tenant and 100 Windows 10 devices that are Azure AD joined andmanaged by using Microsoft Intune.You need to configure Microsoft Defender Firewall and Microsoft Defender Antivirus on thedevices. The solution must minimize administrative effort.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.
A. To configure Microsoft Defender Antivirus, create a Group Policy Object (GPO) andconfigure the Windows Defender Antivirus settings. B. To configure Microsoft Defender Firewall, create a device configuration profile andconfigure the Device restrictions settings. C. To configure Microsoft Defender Antivirus, create a device configuration profile andconfigure the Endpoint protection settings. D. To configure Microsoft Defender Antivirus, create a device configuration profile andconfigure the Device restrictions settings. E. To configure Microsoft Defender Firewall, create a device configuration profile andconfigure the Endpoint protection settings. F. To configure Microsoft Defender Firewall, create a Group Policy Object (GPO) andconfigure Windows Defender Firewall with Advanced Security.
Answer: C,E
Explanation: To configure Microsoft Defender Firewall and Microsoft Defender Antivirus
on Azure AD joined devices that are managed by Intune, you need to create a device
configuration profile and configure the Endpoint protection settings. You can use this profile
to configure various settings for firewall and antivirus protection on the devices.
You have a hybrid deployment of Azure AD that contains 50 Windows 10 devices. All thedevices are enrolled in Microsoft Intune.You discover that Group Policy settings override the settings configured in Microsoft Intunepolicies.You need to ensure that the settings configured in Microsoft Intune override the GroupPolicy settings.What should you do?
A. From Group Policy Management Editor, configure the Computer Configuration settingsin the Default Domain Policy. B. From the Microsoft Intune admin center, create a custom device profile. C. From the Microsoft Intune admin center, create an Administrative Templates deviceprofile. D. From Group Policy Management Editor, configure the User Configuration settings in theDefault Domain Policy.
Answer: C
Sample Question 20
You have a Microsoft 365 subscription.You have devices enrolled in Microsoft Intune as shown in the following table.To which devices can you deploy apps by using Intune?
A. Device1 only B. Device1 and Device2 only C. Device1 and Device3 only D. Device1, Device2, and Device3 only E. Device1, Device2, Device3, and Device4
Answer: E
Sample Question 21
You have a Microsoft 365 E5 subscription that contains a user named User1 and usesMicrosoft Intune Suite.You use Microsoft Intune to manage devices. You have a device named Device1 that is enrolled in Intune.You need to ensure that User1 can use Remote Help from the Intune admin center forDevice1.Which three actions should you perform? Each correct answer presents part of thesolution.NOTE: Each correct selection is worth one point.
A. Deploy the Remote Help app to Device1. B. Assign the Help Desk Operator role to User1. C. Assign the Intune Administrator role to User1. D. Assign a Microsoft 365 E5 license to User1. E. Rerun device onboarding on Device1. F. Assign the Remote Help add-on license to User1.
Answer: A,B,F
Sample Question 22
You have a Microsoft 365 subscription that contains 1,000 iOS devices and includesMicrosoft Intune. You need to prevent the printing of corporate data from managed apps onthe devices, should you configure?
A. an app configuration policy B. a security baseline C. an app protection policy D. an iOS app provisioning profile
Answer: C
Explanation: An app protection policy is a set of rules that controls how data is accessed
and handled by managed apps on mobile devices. App protection policies can prevent the
printing of corporate data from managed apps on iOS devices by using the Restrict cut,
copy, and paste with other apps setting. This setting can be configured to block printing
from the iOS share menu. An app configuration policy is used to customize the behavior of
a managed app, such as specifying a VPN profile or a web link. A security baseline is a
collection of recommended security settings for Windows 10 devices that are managed by
Intune. An iOS app provisioning profile is a file that contains information about the app’s
identity, entitlements, and distribution method
Sample Question 23
You have a Microsoft 365 subscription that uses Microsoft Intune Suite.You use Microsoft Intune to manage devices.You plan to deploy two apps named App1 and App2 to all Windows devices. App1 must beinstalled before App2.From the Intune admin center, you create and deploy two Windows app (Win32) apps.You need to ensure that App1 is installed before App2 on every device.What should you configure?
A. the App1 deployment configurations B. a dynamic device group C. a detection rule D. the App2 deployment configurations
Answer: C
Explanation: The correct answer is D because you can configure the dependencies for a
Win32 app in the deployment configurations1. Dependencies are other Win32 apps that
must be installed before your Win32 app can be installed1. You can add Win32 app
dependencies only after your Win32 app has been added and uploaded to Intune2. In this
case, you need to configure the App2 deployment configurations to add App1 as a
dependency2. References: 1: Microsoft Intune Win32 App Dependencies - MSEndpointMgr
Your company has 200 computers that run Windows 10. The computers are managed byusing Microsoft Intune. Currently, Windows updates are downloaded without using DeliveryOptimization. You need to configure the computers to use Delivery Optimization. Whatshould you create in Intune?
A. a device compliance policy B. a Windows 10 update ring C. a device configuration profile D. an app protection policy
Answer: C
Sample Question 25
You have a Microsoft 365 E5 subscription that contains 1,000 Windows 11 devices. All thedevices are enrolled in Microsoft Intune.You plan to integrate Intune with Microsoft Defender for Endpoint.You need to establish a service-to-service connection between Intune and Defender forEndpoint. Which settings should you configure in the Microsoft Endpoint Manager admin center?
A. Connectors and tokens B. Premium add-ons C. Microsoft Tunnel Gateway D. Tenant enrollment
Answer: A
Explanation:
Microsoft Defender for Endpoint – Important Service and Endpoint Settings You Should
Configure Right Now.
As a prerequisite, however, head to tenant administration > connectors and tokens >
Microsoft Defender for Endpoint and confirm the connection is enabled. You previously set
this up in the advanced settings of Microsoft 365 Defender.
You have a Microsoft 365 subscription that uses Microsoft Intune. You plan to manage Windows updates by using Intune. You create an update ring for Windows 10 and later and configure the User experience settings for the ring as shown in the following exhibit.
A. Create a configuration profile. B. Add a certificate connector. C. Configure the Partner device management settings. D. Link your managed Google Play account to Intune.
Answer: D
Sample Question 27
You have a Microsoft 365 tenant.You have devices enrolled in Microsoft Intune.You assign a conditional access policy named Policy1 to a group named Group1. Policy!restricts devices marked as noncompliant from accessing Microsoft OneDrive for Business.You need to identify which noncompliant devices attempt to access OneDrive for Business.What should you do?
A. From the Microsoft Entra admin center, review the Conditional Access Insights andReporting workbook. B. From the Microsoft Intune admin center, review Device compliance report. C. From the Microsoft Intune admin center, review the Noncompliant devices report. D. From the Microsoft Intune admin center, review the Setting compliance report.
Answer: C
Sample Question 28
You use the Microsoft Deployment Toolkit (MDT) to manage Windows 11 deployments.From Deployment Workbench, you modify the WinPE settings and add PowerShellsupport. You need to generate a new set of WinPE boot image files that contain the updatedsettings.What should you do?
A. From the Deployment Shares node, update the deployment share. B. From the Advanced Configuration node, create new media. C. From the Packages node, import a new operating system package D. From the Operating Systems node, import a new operating system.
Answer: A
Sample Question 29
You have a Microsoft 365 subscription.You have 10 computers that run Windows 10 and are enrolled in mobile devicemanagement (MDM).You need to deploy the Microsoft 36S Apps for enterprise suite to all the computers.What should you do?
A. From the Microsoft Intune admin center, create a Windows 10 device profile. B. From Azure AD, add an app registration. C. From Azure AD. add an enterprise application. D. From the Microsoft Intune admin center, add an app.
Answer: D
Explanation: To deploy Microsoft 365 Apps for enterprise to Windows 10 devices that are
enrolled in Intune, you need to add an app of type “Windows 10 app (Win32)” in the
Microsoft Intune admin center and configure the app settings. You can then assign the app
You have a Microsoft 365 subscription that uses Microsoft Intune Suite.You use Microsoft Intune to manage devices.Auto-enrollment in Intune is configured.You have 100 Windows 11 devices in a workgroup. You need to connect the devices to the corporate wireless network and enroll 100 newWindows devices in Intune.What should you use?
A. a provisioning package B. a Group Policy Object (GPO) C. mobile device management (MDM) automatic enrollment D. a device configuration policy
Answer: C
Sample Question 31
You have 200 computers that run Windows 10 and are joined to an Active Directorydomain.You need to enable Windows Remote Management (WinRM) on all the computers by usingGroup Policy.Which three actions should you perform? Each correct answer presents part of thesolution.NOTE: Each correct selection is worth one point.
A. Enable the Allow Remote Shell access setting. B. Enable the Allow remote server management through WinRM setting. C. Set the Startup Type of the Windows Remote Management (WS-Management) serviceto Automatic. D. Enable the Windows Defender Firewall: Allow inbound Remote Desktop exceptionssetting. E. Set the Startup Type of the Remote Registry service to Automatic F. Enable the Windows Defender Firewall: Allow inbound remote administration exceptionsetting.
Answer: B,C,F
Explanation: To enable WinRM on domain computers using Group Policy, you need to
perform the following actions:
Enable the Allow remote server management through WinRM setting under
Computer Configuration > Policies > Administrative Templates > Windows
Components > Windows Remote Management (WinRM) > WinRM Service. This
setting allows you to specify the IP address ranges that can connect to the WinRM
service.
Set the Startup Type of the Windows Remote Management (WS-Management)
service to Automatic under Computer Configuration > Preferences > Control Panel
Settings > Services. This setting ensures that the WinRM service starts
automatically on the computers.
Enable the Windows Defender Firewall: Allow inbound remote administration
Windows Firewall and Advanced Security > Windows Firewall and Advanced
Security > Inbound Rules. This setting creates a firewall rule that allows incoming
TCP connections on port 5985 for WinRM. References: How to Enable WinRM via Group Policy, Installation and configuration for Windows Remote Management
Sample Question 32
You need to implement mobile device management (MDM) for personal devices that runWindows 11. The solution must meet the following requirements:• Ensure that you can manage the personal devices by using Microsoft Intune.• Ensure that users can access company data seamlessly from their personal devices.• Ensure that users can only sign in to their personal devices by using their personalaccountWhat should you use to add the devices to Azure AD?
A. Azure AD registered B. hybrid Azure AD join C. AD joined
Answer: A
Explanation:
To implement MDM for personal devices that run Windows 11, you should use Azure AD
registered. Azure AD registered devices are devices that are connected to your
organization’s resources using a personal device and a personal account. You can manage
these devices by using Microsoft Intune and enable seamless access to company data.
Users can only sign in to their personal devices by using their personal account, not their
organizational account. Azure AD registered devices support Windows 10 or newer, iOS,
Android, macOS, and Ubuntu 20.04/22.04 LTS1.
The other options are not suitable for this scenario because:
Hybrid Azure AD join is for corporate-owned and managed devices that are joined
to both on-premises Active Directory and Azure AD. Users can sign in to these devices by using their organizational account that exists in both directories2.
AD joined is for devices that are joined only to on-premises Active
Directory. These devices are not managed by Microsoft Intune and do not have
access to cloud resources3.
References: What are Azure AD registered devices?, What are hybrid Azure AD joined
devices?, What is an Active Directory domain join?
Sample Question 33
You have a Microsoft 365 E5 subscription that contains 100 iOS devices enrolled inMicrosoft Intune.You need to deploy a custom line-of-business (LOB) app to the devices by using Intune.Which extension should you select for the app package file?
A. .intunemac B. apk C. jpa D. .appx
Answer: C
Explanation:
iOS/iPadOS LOB apps: Select Line-of-business app as the app type, select the App
package file, and then enter an iOS/iPadOS installation file with the extension .ipa.
You have the Microsoft Deployment Toolkit (MDT) installed.You install and customize Windows 11 on a reference computerYou need to capture an image of the reference computer and ensure that the image can bedeployed to multiple computers.Which command should you run before you capture the image?
A. dism B. wpeinit C. sysprep D. bcdedit
Answer: C
Explanation: To capture an image of a reference computer and make it ready for
deployment to multiple computers, you need to run the sysprep command with the
/generalize option. This option removes all unique system information from the Windows
installation, such as the computer name, security identifier (SID), and driver cache. The
other commands are not used for this purpose. References: Sysprep (Generalize) a
Windows installation
Sample Question 35
Your company has an Azure AD tenant named contoso.com that contains several Windows10 devices.When you join new Windows 10 devices to contoso.com, users are prompted to set up afour-digit pin.You need to ensure that the users are prompted to set up a six-digit pin when they join theWindows 10 devices to contoso.com.Solution: From the Microsoft Entra admin center, you configure automatic mobile devicemanagement (MDM) enrollment. From the Microsoft Intune admin center, you create andassign a device restrictions profile.Does this meet the goal?
A. Yes B. No
Answer: B
Sample Question 36
Your network contains an Active Directory domain. The domain contains a user namedAdmin1. All computers run Windows 10.You enable Windows PowerShell remoting on the computers.You need to ensure that Admin1 can establish remote PowerShell connections to thecomputers. The solution must use the principle of least privilege.To which group should you add Admin1?
A. Access Control Assistance Operators B. Remote Desktop Users C. Power Users D. Remote Management Users
Answer: B
Sample Question 37
You have a Microsoft 365 subscription that contains 100 devices enrolled in MicrosoftIntune.You need to review the startup processes and how often each device restarts.What should you use?
A. Endpoint analytics B. Intune Data Warehouse C. Azure Monitor D. Device Management
Answer: B
Sample Question 38
You have a Microsoft 365 subscription that uses Microsoft Intune Suite.You use Microsoft Intune to manage devices. All devices are in the same time zone.You create an update rings policy and assign the policy to all Windows devices.On the November 1, you pause the update rings policy.All devices remain online.Without further modification to the policy, on which date will the devices next attempt toupdate?
A. December 1 B. December 6 C. November 15 D. November 22
Answer: C
Sample Question 39
You have a Microsoft 365 subscription that contains 1.000 Windows 11 devices enrolled inMicrosoft Intune. You plan to use Intune to deploy an application named App1 that containsmultiple installation files.What should you do first?
A. Prepare the contents of App1 by using the Microsoft Win32 Content Prep Tool. B. Create an Android application package (APK). C. Upload the contents of App1 to Intune. D. Install the Microsoft Deployment Toolkit (MDT).
Answer: A
Sample Question 40
You use a Microsoft Intune subscription to manage iOS devices.You configure a device compliance policy that blocks jailbroken iOS devices.You need to enable Enhanced jailbreak detection.What should you configure?
A. the Compliance policy settings B. the device compliance policy C. a network location D. a configuration profile
Answer: D
Sample Question 41
You have a computer named Computed that has Windows 10 installed.You create a Windows PowerShell script named config.psl.You need to ensure that config.psl runs after feature updates are installed on Computer5.
A. LiteTouch.wsf B. SetupConfig.ini C. Unattendb* D. Unattend.xml
Answer: B
Explanation: SetupConfig.ini is a file that can be used to customize the behavior of
Windows Setup during feature updates. You can use this file to specify commands or
scripts that run before or after the installation process. To run a PowerShell script after a
feature update, you can use the PostOOBE parameter in SetupConfig.ini and specify the
path to the script file. References: [SetupConfig.ini reference]
Sample Question 42
Your company has a Remote Desktop Gateway (RD Gateway).You have a server named Server1 that is accessible by using Remote Desktop Services(RDS) through the RD Gateway.You need to configure a Remote Desktop connection to connect through the gateway.Which setting should you configure?
A. Connect from anywhere B. Server authentication C. Connection settings D. Local devices and resources
Answer: A
Explanation: To connect to a remote server through the RD Gateway, you need to
configure the Connect from anywhere setting in the Remote Desktop Connection client.
This setting allows you to specify the domain name and port of the RD Gateway server, as
well as the authentication method. The other settings are not related to the RD Gateway
connection. References: Configure Remote Desktop Connection Settings for Remote
Desktop Gateway
Sample Question 43
You have a Microsoft 365 Business Standard subscription and 100 Windows 10 Prodevices.You purchase a Microsoft 365 E5 subscription.You need to upgrade the Windows 10 Pro devices to Windows 10 Enterprise. The solutionmust minimize administrative effort.Which upgrade method should you use?
A. Windows Autopilot B. a Microsoft Deployment Toolkit (MDT) lite-touch deployment C. Subscription Activation D. an in-place upgrade by using Windows installation media
Answer: C
Explanation: Subscription Activation is a feature that allows you to upgrade from Windows
10 Pro or Windows 11 Pro to Windows 10 Enterprise or Windows 11 Enterprise without
needing a product key or reinstallation. You just need to assign a subscription license (such
as Microsoft 365 E5) to the user in Azure AD, and then sign in to the device with that user
account. The device will automatically activate Windows Enterprise edition using the
firmware-embedded activation key for Windows Pro edition. This method minimizes
administrative effort and simplifies the upgrade process. References: Windows subscription
activation, Deploy Windows Enterprise licenses
Sample Question 44
You have a Microsoft 365 E5 subscription that contains the devices shown in the followingtable.All devices have Microsoft Edge installed.From the Microsoft Intune admin center, you create a MicrosoftYou need to apply Edge1 to all the supported devices.To which devices should you apply Edge1?
A. Device1 only B. Device1 and Device2 only C. Device1, Device2, and Device3 only D. Device1, Device2, and Device4 only E. Device1, Device2, Device3, and Device4
Answer: E
Sample Question 45
You have a Microsoft Azure subscription that contains an Azure Log Analytics workspace. You deploy a new computer named Computer1 that runs Windows 10. Computer1 is in aworkgroup.You need to ensure that you can use Log Analytics to query events from Computer1.What should you do on Computer1?
A. Join Azure AD. B. Configure Windows Defender Firewall C. Create an event subscription. D. Install the Azure Monitor Agent.
Answer: D
Sample Question 46
You manage 1.000 devices by using Microsoft Intune. You review the Device compliancetrends report. For how long will the report display trend data?
A. 30 days B. 60 days C. 90 days D. 365 days
Answer: B
Explanation: The Device compliance trends report shows the number of devices that are
compliant, noncompliant, and not evaluated over time. The report displays trend data for
the last 60 days by default, but you can change the time range to view data for the last 7,
14, or 30 days as well. The report does not show data for more than 60