
Answer-first summary for fast verification
Answer: Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint., Implement threat and vulnerability management in Microsoft Defender for Endpoint.
To secure the kiosks and meet the requirements of ensuring only authorized applications can run, and regularly hardening the kiosks against new threats, two actions should be taken: B: Onboarding the kiosks to Microsoft Intune and Microsoft Defender for Endpoint allows for centralized management, including the use of policies to ensure only authorized applications can run on the kiosks. Intune can be used to configure device compliance policies and deploy applications, while Microsoft Defender for Endpoint provides advanced threat protection. C: Implementing threat and vulnerability management in Microsoft Defender for Endpoint provides a centralized view of the security posture of the kiosks. This feature helps identify potential vulnerabilities and provides guidance on how to mitigate them, allowing for the regular hardening of the kiosks against new threats. Options A and D are not sufficient to fulfill both requirements. Option E, implementing Privileged Access Workstation (PAW), is typically used for highly privileged users rather than standard kiosks, thus not suitable for this scenario.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your company has a Microsoft 365 E5 subscription and is planning to deploy 45 mobile self-service kiosks that will run Windows 10. As part of the deployment strategy, it is crucial to provide recommendations to secure these kiosks. The security solution must fulfill the following criteria:
Considering these requirements, which two actions should be included in the recommendations? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A
Implement Automated investigation and Remediation (AIR) in Microsoft Defender for Endpoint.
B
Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint.
C
Implement threat and vulnerability management in Microsoft Defender for Endpoint.
D
Onboard the kiosks to Azure Monitor.
E
Implement Privileged Access Workstation (PAW) for the kiosks.