MD-102 Practice Test Video Answer

1. B
Microsoft Deployment Toolkit (MDT) automates Windows deployment, allowing IT admins to create and manage deployment images efficiently.

2. A
HTTPS is widely used for secure communication and file transfers, providing encryption and integrity in enterprise environments.

3. D
Get-AppxPackage retrieves a list of all installed applications for a user or device in Windows 10.

4. C
Intune compliance policies allow administrators to enforce security settings across all managed endpoints.

5. C
Device configuration profiles in Intune apply specific settings, restrictions, or policies to enrolled devices.

6. B
PXE Boot Deployment allows network-based bare-metal installation of Windows without pre-installed OS.

7. B
Windows Update for Business enables administrators to schedule and manage updates to reduce disruption.

8. B
Azure AD Connect Health provides detailed error reports for devices attempting to join Azure AD.

9. C
Windows Hello for Business provides strong, passwordless authentication using biometrics or PIN.

10. B
Compliance policies enforce security requirements like encryption, password policies, and OS version.

11. C
LDAP is the protocol used to query and update directory information in Active Directory.

12. A
Pilot rings test updates on a small device group before broader deployment to detect potential issues.

13. C
Azure AD Self-Service Password Reset allows users to reset passwords remotely without IT intervention.

14. B
Microsoft Defender Application Guard isolates untrusted sites and applications to protect the OS.

15. B
MDT allows capturing customized images with applications for deployment to multiple devices.

16. B
Update Compliance Reports in Intune highlight which devices failed or succeeded in installing updates.

17. B
BitLocker encrypts the entire drive, protecting data if a device is lost or stolen.

18. B
Using Microsoft Intune to assign applications allows silent, automated deployment without user intervention.

19. C
Remote Actions in Intune allow locking, wiping, or retiring devices remotely for security purposes.

20. C
Group Policy can disable access to removable drives, preventing unauthorized copying or data leaks.

21. B
Compliance Status Reports in Intune summarize device adherence to configured policies.

22. A
Windows Update for Business automates updates without requiring user intervention.

23. B
Autopilot pre-configures devices for users, simplifying first-time setup and enrollment.

24. C
Dynamic Device Groups automatically include devices matching specified attributes for management.

25. B
Endpoint Analytics provides detailed insights and logs for device deployment and performance.

26. B
Phased Deployment ensures minimal disruption by gradually deploying updates across devices.

27. B
Intune compliance policies with reports allow monitoring adherence to regulations like GDPR or HIPAA.

28. A
Device Guard restricts application execution to trusted code, enhancing endpoint security.

29. C
Windows Hello for Business uses biometric authentication to secure device access.

30. B
Get-UpdateHistory shows which updates were installed or failed on a Windows device.

31. B
Configuration Profiles deploy network settings like Wi-Fi, VPN, and email automatically to endpoints.

32. C
Windows Reliability Monitor and Boot Analyzer provide detailed boot performance metrics to identify slow startup issues.

33. B
Azure AD Conditional Access can restrict access from unmanaged or non-compliant devices.

34. B
Endpoint user training and mentoring ensures employees follow security policies and best practices.

35. A
Event Viewer captures detailed logs to troubleshoot application deployment issues in Intune.

36. B
Encrypting File System (EFS) encrypts individual files or folders without encrypting the whole drive.

37. B
App Install Status Report in Intune provides information on application deployment success and failures.

38. C
Automatic enrollment ensures devices receive apps and policies immediately after enrollment.

39. B
Secure Boot prevents unauthorized firmware or boot-level malware from compromising the system.

40. B
Continuous learning and mentoring help endpoint administrators stay updated on new Microsoft 365 features.

Exit mobile version