Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Microsoft SC-400 Dumps

Page: 1 / 26
Total 261 questions

Microsoft Information Protection Administrator Questions and Answers

Question 1

How many files in Site2 will be visible to User1 and User2 after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 2

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you grant the Sensitivity label administrator role?

Options:

A.

Admin1, Admin2, Admin4, and Admin5 only

B.

Admin1, Admin2, and Admin3 only

C.

Admin1 only

D.

Admin1 and Admin4 only

E.

Admin1 and Admin5 only

Question 3

You are evaluating the technical requirements for the DLP reports.

Which user can currently view the DLP reports?

Options:

A.

Admin4

B.

Admin1

C.

Admin5

D.

Admin2

E.

Admin3

Question 4

You need to meet the technical requirements for the confidential documents.

What should you created first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 5

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth is worth one point.

as

Options:

Question 6

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

as

Options:

Question 7

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 8

You need to meet the technical requirements for the Site3 documents.

What should you create?

Options:

A.

a retention label policy and a retention label that uses an event

B.

a sensitive info type that uses a dictionary and a sensitivity label

C.

a sensitive info type that uses a regular expression and a sensitivity label

D.

a retention policy that has Only delete items when they reach a certain age selected

Question 9

You need to meet the technical requirements for the creation of the sensitivity labels. Which administrative users are currently missing the Sensitivity label administrator role?

Options:

A.

Admin1 only

B.

Admm1, Admin2, Admin4, and Admin5 only

C.

Admin 1. Admin2, and Admin3 only

D.

Admin 1 and Admin5 only

E.

Admin 1 and Admin4 only

Question 10

You need to recommend a solution that meets the Data Loss Prevention requirements for the HR department.

Which three actions should you perform? Each correct answer presents part of the solution. (Choose three.)

NOTE: Each correct selection is worth one point.

Options:

A.

Schedule EdmUploadAgent.exe to hash and upload a data file that contains employee information.

B.

Create a sensitive info type rule package that contains the EDM classification.

C.

Define the sensitive information database schema in the XML format.

D.

Create a sensitive info type rule package that contains regular expressions.

E.

Define the sensitive information database schema in the CSV format.

Question 11

You need to recommend a solution that meets the executive requirements. What should you recommend?

Options:

A.

From the Microsoft 365 compliance center, create a retention policy.

B.

From the Exchange admin center, enable archive mailboxes.

C.

From the Microsoft 365 compliance center, create a retention label.

D.

From the Microsoft 365 compliance center, create a DLP policy.

Question 12

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder.

What should you configure in the Microsoft Purview compliance portal?

Options:

A.

a content scan job

B.

a Content Search query

C.

an auto-labeling policy

D.

a DLP policy

Question 13

You need to implement a solution that meets the compliance requirements for the Windows 10 computers.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each coned selection is worth one point.

Options:

A.

Deploy a Microsoft 36S Endpoint data loss prevention (Endpoint DLP) configuration package to the computers.

B.

Configure hybrid Azure AD join for all the computers.

C.

Configure the Microsoft Intune device enrollment settings.

D.

Configure a compliance policy in Microsoft Intune.

E.

Enroll the computers in Microsoft Defender for Endpoint protection.

Question 14

You need to recommend a solution that meets the compliance requirements for viewing DLP tooltip

justifications.

What should you recommend?

Options:

A.

Instruct the compliance department users to review the False positive and override report.

B.

Configure a Microsoft Power Automate workflow to route DLP notification emails to the compliance

department.

C.

Instruct the compliance department users to review the DLP incidents report.

D.

Configure an Azure logic app to route DLP notification emails to the compliance department.

Question 15

You need to recommend an information governance solution that meets the HR requirements for handling employment applications and resumes.

What is the minimum number of information governance solution components that you should create? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 16

You need to recommend a solution to configuration the Microsoft 365 Records management settings by using the CSV file must meet the compliance requirements.

What should you recommend?

Options:

A.

From the Microsoft 365 compliance center, import the CSV file to a file plan.

B.

Use EdmUploadAgent.exe to upload a hash of the CSV to a datastore.

C.

Use a PowerShell command that pipes the import csv cmdlet to the New-RetentionPolicy cmdlet.

D.

Use a PowerShell command that pipes the import-csv cmdlet to the New-Label cmdlet.

Question 17

You need to recommend a solution that meets the compliance requirements for Dropbox.

What should you recommend?

Options:

A.

Create a DLP policy that applies to Cloud App Security.

B.

Edit an existing retention label that enforces the item deletion settings.

C.

Create a retention label that enforces the item deletion settings.

D.

Create a DLP policy that applies to devices.

Question 18

You need to recommend a solution that meets the sales requirements.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

as

Options:

Question 19

You need to recommend a solution that meets the compliance requirements for Dropbox.

What should you recommend?

Options:

A.

Create a DLP policy that applies to devices.

B.

Create a file policy in Microsoft Defender for Cloud Apps that uses the built-in DLP inspection method.

C.

Create a retention label that enforces the item deletion settings.

D.

Edit an existing retention label that enforces the item deletion settings.

Question 20

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder. What should you recommend?

Options:

A.

From the Microsoft 365 compliance center, configure a DLP policy.

B.

From the Microsoft 365 compliance center, configure a Content Search query.

C.

From the Microsoft 365 compliance center, configure an auto-labeling policy.

D.

From Azure Information Protection, configure a content scan job.

Question 21

Task 9

You are investigating a data breach.

You need to retain all Microsoft Exchange items in the mailbox of Alex Wilber that contain the word Falcon and were created in the year 2021.

Options:

Question 22

Task 6

You plan to implement Endpoint data loss prevention (Endpoint DLP) policies for computers that run Windows.

Users have an application named App1 that stores data locally in a folder named C:\app1\data.

You need to prevent the folder from being monitored by Endpoint DLP.

Options:

Question 23

Task 2

You discover that all users can apply the Confidential - Finance label.

You need to ensure that the Confidential - Finance label is available only to the members of the Finance Team group.

Options:

Question 24

Task 8

You need to retain Microsoft SharePoint files that contain the word Falcon for two years from the date they were created, and then delete them.

Options:

Question 25

Task 10

You plan to create a data loss prevention (DLP) policy that will apply to content containing the following keywords:

• Tailspin

• litware

• Falcon

You need to create a keyword list that can be used in the DLP policy. You do NOT need to create the DLP policy at this time.

Options:

Question 26

Task 5

You need to ensure that a group named U.S. Sales can store files containing information subject to General Data Protection Regulation (GDPR) in their OneDrive accounts. All other current GDPR restrictions must remain in effect.

Options:

Question 27

Task 3

You plan to automatically apply a watermark to the document1 of a project named Falcon.

You need to create a label that will add a watermark of "Project falcon' in red. size-12 font diagonally across the documents.

Options:

Question 28

Task 1

You need to provide users with the ability to manually classify files that contain product information that are stored in SharePoint Online sites. The solution must meet the following requirements:

• The users must be able to apply a classification of Product1 to the files.

• Any authenticated user must be able to open files classified as Product1.

• files classified as Product1 must be encrypted.

Options:

Question 29

Task 4

You need to block users from sending emails containing information that is subject to Payment Card Industry Data Security Standard (PCI OSS). The solution must affect only emails.

Options:

Question 30

Task 7

You need to create a retention policy that meets the following requirements:

• Applies to Microsoft Teams chat and Teams channel messages of users that have a department attribute of Sales.

• Retains item for five years from the date they are created, and then deletes them.

Options:

Question 31

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies that you should use?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Question 32

You have a Microsoft 365 E5 subscription.

You need to prevent users from uploading data loss prevention (DLP)-protected documents to the following third-party websites;

• web1.contoso.com

• web2.contoso.com

The solution must minimize administrative effort.

To what should you set the Service domains setting for Endpoint DLP?

Options:

A.

contoso.com

B.

web'.contoso.com

C.

*.contoso.com

D.

web1xontoso.com and web2.contoso.com

Question 33

You have a Microsoft 365 tenant that uses records management.

You use a retention label to mark legal files stored in a Microsoft SharePoint Online document library as

regulatory records.

What can you do to the legal files?

Options:

A.

Rename the files.

B.

Edit the properties of the files.

C.

Change the retention label of the files.

D.

Copy the content of the files.

Question 34

You have a Microsoft 365 E5 tenant.

You create sensitivity labels as shown in the Sensitivity Labels exhibit.

as

The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content.

The sensitivity labels are published as shown in the Published exhibit.

as

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 35

You plan to implement a sensitive information type based on a trainable classifier. The sensitive information type will identify employment contracts.

You need to copy the required files to Microsoft SharePoint Online folders to train the classifier.

What should you use to seed content and test the classifier? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 36

You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.

You need to implement insider risk management. The solution must meet the following requirements:

• Ensure that User1 can create insider risk management policies.

• Ensure that User2 can use content captured by using insider risk management policies.

• Follow the principle of least privilege.

To which role group should you add each user? To answer, drag the appropriate role groups to the correct users. Each role group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

as

Options:

Question 37

You need to automatically apply a sensitivity label to documents that contain information about your company's

network including computer names, IP addresses, and configuration information.

Which two objects should you use? Each correct answer presents part of the solution. (Choose two.)

NOTE: Each correct selection is worth one point.

Options:

A.

an Information protection auto-labeling policy

B.

a custom trainable classifier

C.

a sensitive info type that uses a regular expression

D.

a data loss prevention (DLP) policy

E.

a sensitive info type that uses keywords

F.

a sensitivity label that has auto-labeling

Question 38

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview compliance portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

YOU run the Set-MailboxFolderPernission -Identity "User1" -User Userlfcontoso.com -AccessRights Owner command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Question 39

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

Options:

A.

a JSON file that has an element for each word

B.

an ACCDB database file that contains a table named Dictionary

C.

an XML file that contains a keyword tag for each word

D.

a CSV file that contains words separated by commas

Question 40

You have a Microsoft 365 sensitivity label that is published to all the users in your Azure AD tenant as shown in the following exhibit.

as

Options:

Page: 1 / 26
Total 261 questions