Intune

 30 Minutes
 10 Questions


This assessment will evaluate the candidate's understanding of device management, application protection, and endpoint security in a corporate environment using Microsoft Intune. The candidate must demonstrate both conceptual knowledge and practical application through real-world scenarios, including code/script analysis and configuration management.


Example Question:

Multiple-Choice

You are configuring Windows Defender Application Control (WDAC) policies in Microsoft Intune to restrict the execution of unauthorized software. The following policy snippet allows only trusted applications to run on managed devices. Without referring to the specific commands, describe the security mechanism this configuration provides. How would you enhance this policy to prevent unauthorized script execution?

<RuleCollection>
 <FileRules>
  <FileRule Action="Allow" SigningLevel="SignedVersion" />
 </FileRules>
</RuleCollection>


Answers
 
1. The configuration allows all apps to run if they meet a minimum level of system permissions.
 
2. It blocks all applications that are unsigned, but allows script execution without restrictions.
 
3. The configuration enforces both software and script integrity, preventing unauthorized installations and scripts.
 
4. The policy ensures that only applications signed by trusted authorities can be executed, but it does not protect against script-based attacks.