This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Why is it important to identify your attack surface?
It helps you to understand all the ways in which a cybercriminal could launch an attack.
It's a feature of a modern device management solution that lets you monitor endpoints.
It describes the detailed recommended settings for security to stop an ongoing attack.
Why should you register your endpoints with a cloud identity provider?
This enables your organization to update device configurations using compliance policies.
It enables you to decommission endpoints with a single switch when they're no longer used.
This enables your organization to see and manage access to endpoints.
Your organization uses compliance policies to satisfy security requirements. What should your organization do for noncompliant devices?
Your organization should set remediation rules when you create compliance policies.
Your organization should configure security baselines to remediate noncompliant devices.
Your organization should update those devices so that they automatically become compliant.
You must answer all questions before checking your work.
Was this page helpful?