This assessment will evaluate the candidate's understanding of device management, application protection, and endpoint security in a corporate environment using Microsoft Intune. The candidate must demonstrate both conceptual knowledge and practical application through real-world scenarios, including code/script analysis and configuration management.
Example Question:
1. The configuration allows all apps to run if they meet a minimum level of system
permissions.
2. It blocks all applications that are unsigned, but allows script execution
without restrictions.
3. The configuration enforces both software and script integrity, preventing
unauthorized installations and scripts.
4. The policy ensures that only applications signed by trusted authorities can be
executed, but it does not protect against script-based attacks.