Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Microsoft SC-401 Dumps

Page: 1 / 20
Total 203 questions

Administering Information Security in Microsoft 365 Questions and Answers

Question 1

You have a Microsoft S65 E5 subscription that contains two users named User! and Admin1 Admin1 manages audit retention policies for the subscription.

You need to ensure that the audit logs of User1 will be retained for 10 years.

What should you do first?

Options:

A.

Assign a Microsoft Purview Audit (Premium) add on license to User1.

B.

Assign a 10 year audit log retention add-on license to Admin1.

C.

Assign a 10-year audit log retention add-on license to User1.

D.

Assign a Microsoft Purview Audit (Premium) add-on license to Admin1.

Question 2

You have a Microsoft 365 E5 tenant that contains a sensitivity label named label1.

You plan to enable co-authoring for encrypted files.

You need to ensure that files that have label1 applied support co-authoring.

Which two settings should you modify? To answer, select the settings in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 3

You have a Microsoft 365 ES subscription.

A security manager receives an email message every time a data loss prevention (DIP) policy match occurs. You need to limit alert notifications to actionable DLP events. What should you do?

Options:

A.

From the Microsoft Defender portal, apply a filter to the alerts.

B.

From the Microsoft Purview portal, modify the Policy Tips settings of a DLP policy.

C.

From the Microsoft Purview portal, modify the matched activities threshold of an alert policy.

D.

From the Microsoft Purview portal, modify the User overrides settings of a DLP policy.

Question 4

You have a Microsoft 365 E5 subscription.

You need to ensure that encrypted email messages sent to an external recipient can be revoked or will expire within seven days.

What should you configure first?

Options:

A.

a custom branding template

B.

a mail flow rule

C.

a sensitivity label

D.

a Conditional Access policy

Question 5

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You plan to deploy a Defender for Cloud Apps file policy that will be triggered when the following conditions are met:

● A file is shared externally.

● A file is labeled as internal only.

Which filter should you use for each condition? To answer, drag the appropriate filters to the correct conditions. Each filter may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE : Each correct selection is worth one point.

as

Options:

Question 6

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

as

Which users will Microsoft Purview insider risk management flag as potential high-impact users?

Options:

A.

User1 and User2 only

B.

User2 and User3 only

C.

User1, User2, and User3 only

D.

User1, User2, User3, and User4

Question 7

You have a Microsoft J65 subscription linked to a Microsoft Entra tenant that contains a user named User1. You need to grant User1 permission to search Microsoft 365 audit logs. The solution must use the principle of least privilege. Which role should you assign to User1?

Options:

A.

the Security Reader role in the Microsoft Entra admin center

B.

the Compliance Management role in the Exchange admin center

C.

the View Only Audit Logs role in the Exchange admin center

D.

the Reviewer role in the Microsoft Purview portal

Question 8

You have a data loss prevention (DIP) policy that has the advanced DIP rules shown in the following table.

as

You need to identity which rules will apply when content matches multiple advanced DIP rules.

Which rules should you identify? To answer, select the appropriate options in the answer area.

as

Options:

Question 9

You implement Microsoft 36S Endpoint data loss pi event ion (Endpoint DIP).

You have computer that run Windows 11 and have Microsoft 365 Apps instated The computers are joined to a Microsoft Entra

tenant

You need to ensure that endpoint DIP policies can protect content on the computers.

Solution: You deploy the Microsoft Purview Information Protection client to the computers.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 10

You have a Microsoft 36S subscription.

In Microsoft Exchange Online, you configure the mail flow rule shown in the following exhibit.

as

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

as

Options:

Question 11

You have a Microsoft 365 E5 tenant.

You need to add a new keyword dictionary.

What should you create?

Options:

A.

a trainable classifier

B.

a retention policy

C.

a sensitivity label

D.

a sensitive info type

Question 12

You are creating a data loss prevention (DLP) policy that will apply to all available locations except Fabric and Power BI workspaces.

You configure an advanced DLP rule in the policy.

Which type of condition can you use in the rule?

Options:

A.

Sensitive info type

B.

Content search query

C.

Sensitive label

D.

Keywords

Question 13

You have a Microsoft SharePoint Online site named Site! that contains the files shown in the following table.

as

You have a data loss prevention (DLP) policy named DLP1 that has the advanced DLP rules shown in the following table.

as

You apply DLP1 toSite1.

Which policy tips will appear for File2?

Options:

A.

Tip1 only

B.

Tip2 only

C.

Tip3 only

D.

Tip1 and Tip2 only

Question 14

You have a Microsoft 365 E5 subscription. The subscription contains 500 devices that are onboarded to Microsoft Purview.

You select Activate Microsoft Purview Audit.

You need to ensure that you can track interactions between users and generative AI websites.

What should you deploy to the devices?

Options:

A.

the Microsoft Purview extension

B.

the Microsoft Purview Information Protection client

C.

the Microsoft Defender Browser Protection extension

D.

Endpoint analytics

Question 15

You have a Microsoft 365 E5 subscription that contains a user named User1. The subscription contains an Endpoint data loss prevention (Endpoint DLP) policy as shown in the Actions exhibit. (Click the Actions tab.)

as

You configure the Upload to a restricted cloud service domain or access from an unallowed browsers settings as shown in the Upload restrictions exhibit. (Click the Upload restrictions tab.)

as

You configure the Paste to supported browsers settings as shown in the Paste restrictions exhibit. (Click the Paste restrictions tab.)

as

When User1 pastes content into ChatGPT, the user receives the error message shown in the Error exhibit. (Click the Error tab.)

as

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.

as

Options:

Question 16

You have a Microsoft 365 E5 subscription.

Users access their mailbox by using the following apps.

• Outlook for Microsoft 365

• Outlook on the web

• Outlook Mobile fiOS. Android)

You create a data loss prevention (DLP) policy named DLP1 that has the following settings:

• Location; Exchange email

• Status: On

• User notifications: On

• Notify users with a policy tip: Enabled

Which apps display a policy tip when content is matched by using DIP1 ?

Options:

A.

Outlook for Microsoft 365 only

B.

Outlook on the web only

C.

Outlook for Microsoft 365 and Outlook on the web only

D.

Outlook for Microsoft 365 and Outlook Mobile (iOS. Android) only

E.

Outlook for Microsoft 365. Outlook on the web, and Outlook Mobile (iOS. Android)

Question 17

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add a folder path to the file path exclusions.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 18

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You need to ensure that you receive an alert when a user uploads a document to a third-party cloud storage service.

What should you use?

Options:

A.

an activity policy

B.

a sensitivity label

C.

a file policy

D.

an insider risk policy

Question 19

You have a Microsoft 365 subscription. Auditing is enabled.

A user named User1 is a member of a dynamic security group named Group1.

You discover that User1 is no longer a member of Group1.

You need to search the audit log to identify why User1 was removed from Group1.

Which two activities should you use in the search? To answer, select the appropriate activities in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 20

You have a Microsoft 365 E5 subscription that uses Microsoft Purview insider risk management and contains three users named User1, User2, and User3.

All insider risk management policies have adaptive protection enabled and the default conditions for insider risk levels configured.

The users perform the following activities, which trigger insider risk policy alerts:

    User1 performs at least one data exfiltration activity that results in a high severity risk score.

    User2 performs at least three risky user activities within seven days, that each results in a high severity risk score.

    User3 performs at least bwo data exfiltration activities within seven days, that each results in a high severity risk score.

Which insider risk level is assigned to each user? To answer, drag the appropriate levels to the correct users. Each level may be used once, more than once, or not at all. You may need to drag the split bar between panes or seroll to view content.

NOTE: Each correct selection is worth one point.

as

Options:

Question 21

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From Microsoft Defender for Cloud Apps, you create an app discovery policy.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 22

Nate: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique

solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might

not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the

review screen.

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 11 and have Microsoft 365 Apps installed. The computers are joined to a Microsoft Entra tenant.

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You onboard the computers to Microsoft Defender for Endpoint.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 23

You have a Microsoft 365 subscription.

You create a retention label named Label1 as shown in the following exhibit.

as

You publish Label! to SharePoint sites.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

as

Options:

Question 24

You have a Microsoft 365 ES subscription that uses Microsoft Teams and contains the users shown in the following table.

as

You have the retention policies shown in the following table.

as

The users perform the actions shown in the following table.

as

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

as

Options:

Question 25

You have a Microsoft 365 subscription.

You have a user named User1 Several users have full access to the mailbox of User1.

Some email messages sent to User 1 appeal to have been read and deleted before the user viewed them

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User l. the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-AuditConfig -Workload Exchange command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Question 26

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage Account keys in plain text to third parties.

You need to ensure that when Azure Storage Account keys are emailed, the emails are encrypted.

Solution: You create a data loss prevention (DLP) policy that has only the Exchange email location selected.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 27

You have a Microsoft 36515 subscription tha1 contains a Microsoft SharePoint Online site named Site1 Site1 contains three tiles named File1. File2 and File3.

You create the data loss prevention (DIP) policies shown in the following table.

as

The DIP rule matches for each tile are shown in the following table.

as

How many DIP policy matches events will be added to Activity explorer, and how many policy matches will be added to the DLP incidents report? To answer, select the appropriate options m the answer area.

as

Options:

Question 28

HOTSPOT

You have a Microsoft 365 E5 subscription that has data loss prevention (DLP) implemented.

You plan to export DLP activity by using Activity explorer.

The exported file needs to display the sensitive info type detected for each DLP rule match.

What should you do in Activity explorer before exporting the data, and in which file format is the file exported? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 29

You have a Microsoft 365 E5 subscription.

You plan to deploy Microsoft Purview Data Security Posture Management for Al (DSPM for Al) to protect company data that contains Personally Identifiable Information (Pll) from being shared with third-party generative Al tools.

You need to complete the prerequisites for the planned deployment.

Which two Microsoft Purview solutions should you use? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Data Loss Prevention

B.

Communication Compliance

C.

Audit

D.

Insider Risk Management

E.

Information Barriers

Question 30

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You create a communication compliance policy named Policy1 and select Detect Microsoft Copilot interactions.

Which two trainable classifiers will be added to Policy1 automatically? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Unauthorized disclosure

B.

Prompt Shields

C.

Threat

D.

Corporate Sabotage

E.

Protected Materials

Question 31

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 32

You need to meet the retention requirement for the users ' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Question 33

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Question 34

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

as

Options:

Question 35

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Question 36

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

as

Options:

Page: 1 / 20
Total 203 questions