Knowledge check

Completed

Choose the best response for each of the questions below. Then select "Check your answers".

Check your knowledge

1.

An administrator at Contoso wants to use device identification as a way to enforce Conditional App Access Control in Defender for Cloud Apps. The administrator knows that client certificates in a trusted chain can be used to make a determination around access or session policies that implement device state as a filter. Which of the following can also be used?

2.

An administrator at Contoso wants to use device identification as a way to enforce Conditional App Access Control in Defender for Cloud Apps. The administrator knows that client certificates in a trusted chain can be used to make a determination around access or session policies that implement device state as a filter. The administrator starts to upload root CA certificates to the Defender for Cloud Apps portal. What format do the certificates need to be?

3.

When an administrator starts to deploy Conditional Access App Control with AD FS as the identity provider, they create a new AD FS Relying Party Trust and App Single Sign-On configuration. Why is this necessary?