Knowledge check

Completed
1.

Which tool should you use for modern device management to improve your organization’s security posture?

2.

How do you activate Dynamic Root of Trust for Measurement (DRTM)?

3.

You want to prevent malware from disabling or removing security features. How will you do this?

4.

Which of the following tools can you use to deploy Windows Defender Application Control (WDAC)?

5.

You want to set your organization as the data controller for Windows diagnostics data. How will you do this?

6.

A user reports that their device has been lost. What will you do?

7.

How can users access Microsoft Defender for Endpoint?