MD-102 Practice Test Video Answer
1. B
Microsoft Deployment Toolkit (MDT) automates Windows deployment, allowing IT admins to create and manage deployment images efficiently.
2. A
HTTPS is widely used for secure communication and file transfers, providing encryption and integrity in enterprise environments.
3. D
Get-AppxPackage retrieves a list of all installed applications for a user or device in Windows 10.
4. C
Intune compliance policies allow administrators to enforce security settings across all managed endpoints.
5. C
Device configuration profiles in Intune apply specific settings, restrictions, or policies to enrolled devices.
6. B
PXE Boot Deployment allows network-based bare-metal installation of Windows without pre-installed OS.
7. B
Windows Update for Business enables administrators to schedule and manage updates to reduce disruption.
8. B
Azure AD Connect Health provides detailed error reports for devices attempting to join Azure AD.
9. C
Windows Hello for Business provides strong, passwordless authentication using biometrics or PIN.
10. B
Compliance policies enforce security requirements like encryption, password policies, and OS version.
11. C
LDAP is the protocol used to query and update directory information in Active Directory.
12. A
Pilot rings test updates on a small device group before broader deployment to detect potential issues.
13. C
Azure AD Self-Service Password Reset allows users to reset passwords remotely without IT intervention.
14. B
Microsoft Defender Application Guard isolates untrusted sites and applications to protect the OS.
15. B
MDT allows capturing customized images with applications for deployment to multiple devices.
16. B
Update Compliance Reports in Intune highlight which devices failed or succeeded in installing updates.
17. B
BitLocker encrypts the entire drive, protecting data if a device is lost or stolen.
18. B
Using Microsoft Intune to assign applications allows silent, automated deployment without user intervention.
19. C
Remote Actions in Intune allow locking, wiping, or retiring devices remotely for security purposes.
20. C
Group Policy can disable access to removable drives, preventing unauthorized copying or data leaks.
21. B
Compliance Status Reports in Intune summarize device adherence to configured policies.
22. A
Windows Update for Business automates updates without requiring user intervention.
23. B
Autopilot pre-configures devices for users, simplifying first-time setup and enrollment.
24. C
Dynamic Device Groups automatically include devices matching specified attributes for management.
25. B
Endpoint Analytics provides detailed insights and logs for device deployment and performance.
26. B
Phased Deployment ensures minimal disruption by gradually deploying updates across devices.
27. B
Intune compliance policies with reports allow monitoring adherence to regulations like GDPR or HIPAA.
28. A
Device Guard restricts application execution to trusted code, enhancing endpoint security.
29. C
Windows Hello for Business uses biometric authentication to secure device access.
30. B
Get-UpdateHistory shows which updates were installed or failed on a Windows device.
31. B
Configuration Profiles deploy network settings like Wi-Fi, VPN, and email automatically to endpoints.
32. C
Windows Reliability Monitor and Boot Analyzer provide detailed boot performance metrics to identify slow startup issues.
33. B
Azure AD Conditional Access can restrict access from unmanaged or non-compliant devices.
34. B
Endpoint user training and mentoring ensures employees follow security policies and best practices.
35. A
Event Viewer captures detailed logs to troubleshoot application deployment issues in Intune.
36. B
Encrypting File System (EFS) encrypts individual files or folders without encrypting the whole drive.
37. B
App Install Status Report in Intune provides information on application deployment success and failures.
38. C
Automatic enrollment ensures devices receive apps and policies immediately after enrollment.
39. B
Secure Boot prevents unauthorized firmware or boot-level malware from compromising the system.
40. B
Continuous learning and mentoring help endpoint administrators stay updated on new Microsoft 365 features.