Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Microsoft SC-401 Dumps Questions Answers

Page: 1 / 7
Total 203 questions

Administering Information Security in Microsoft 365 Questions and Answers

Question 1

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Buy Now
Question 2

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 3

You need to meet the retention requirement for the users ' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Question 4

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Options:

Question 5

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 6

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 7

You have a Microsoft 365 subscription.

You create a new trainable classifier.

You need to train the classifier.

Which source can you use to train the classifier?

Options:

A.

an on-premises Microsoft SharePoint Server site

B.

an A2ure Files share

C.

a Microsoft SharePoint Online site

D.

an NFS file share

Question 8

You need to create a retention policy to delete content after seven years from the following locations:

• Exchange Online email

• SharePoint Online sites

• OneDrive accounts

• Microsoft 365 Groups

• Teams channel messages

• Teams chats

What is the minimum number of retention policies that you should create?

Options:

A.

1

B.

2

C.

3

D.

4

Question 9

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 11 and have Microsoft 365 Apps installed. The computers are joined to a Microsoft Entra tenant.

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You enroll the computers in Microsoft Intune.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 10

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

Which users will Microsoft Purview insider risk management flag as potential high-impact users?

Options:

A.

User1 and User2 only

B.

User2 and User3 only

C.

User1, User2, and User3 only

D.

User1, User2, User3, and User4

Question 11

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-MailboxFolderPermission -Identity " User1 " -User User1@contoso.com -AccessRights Owner command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Question 12

You have a Microsoft 365 subscription that contains a sensitivity label named Contoso Confidential.

You publish Contoso Confidential to all users.

Contoso Confidential is configured as shown in the Configuration exhibit. (Click the Configuration tab.)

The Access control settings of Contoso Confidential are configured as shown in the Access control exhibit. (Click the Access control tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 13

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

Options:

A.

an XLSX file that contains one word in each cell of the first row

B.

an XML file that contains a keyword tag for each word

C.

an ACCDB database file that contains a table named Dictionary

D.

a text file that has one word on each line

Question 14

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You plan to deploy a Defender for Cloud Apps file policy that will be triggered when the following conditions are met:

● A file is shared externally.

● A file is labeled as internal only.

Which filter should you use for each condition? To answer, drag the appropriate filters to the correct conditions. Each filter may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE : Each correct selection is worth one point.

Options:

Question 15

Nate: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique

solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might

not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the

review screen.

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 11 and have Microsoft 365 Apps installed. The computers are joined to a Microsoft Entra tenant.

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You onboard the computers to Microsoft Defender for Endpoint.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 16

You have a Microsoft 365 E5 subscription.

You plan to implement insider risk management for users that manage sensitive data associated with a project.

You need to create a protection policy for the users. The solution must meet the following requirements:

● Minimize the impact on users who are NOT part of the project.

● Minimize administrative effort.

What should you do first?

Options:

A.

From the Microsoft Purview portal, create an insider risk management policy.

B.

From the Microsoft Entra admin center, create a security group.

C.

From the Microsoft Entra admin center create a User risk policy

D.

From the Microsoft Purview portal create a priority user group

Question 17

You have a Microsoft 365 E5 subscription that contains two users named User! and User2.

You need to implement insider risk management. The solution must meet the following requirements:

• Ensure that User1 can create insider risk management policies.

• Ensure that User2 can use content captured by using insider risk management policies

• Follow the principle of least privilege.

To which role group should you add each user? To answer, drag the appropriate role groups to the correct users. Each role group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Options:

Question 18

You have a Microsoft 365 ES subscription.

You have a Microsoft SharePoint Online document library that contains Microsoft Word and Excel documents. The documents contain the following types of information:

• Credit card numbers

• Physical addresses in the UK

• National hearth service numbers from the UK

• Sensitive projects that contain the following words: Project Tailspin. Project Contoso, and Project falcon

You have email messages m Microsoft Exchange Online that contain the following information types:

• Credit card numbers

• User sign-in credentials

• National health service numbers from the UK

You plan to use sensitive information types (SITs) for compliance policies.

What is the minimum number of SITs required to classify all the information types?

Options:

A.

2

B.

5

C.

7

D.

10

Question 19

You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.

A user named User 1 sends link based, branded emails that are encrypted by using Microsoft Purview Advanced Message Encryption to the recipients shown in the following table.

For which recipients Can User1 revoke the emails?

Options:

A.

Recipient1 only

B.

Recipient4 only

C.

Reciptent1 and Recipient4 only

D.

Reclpient3 and Recipients only

E.

Reciptent1, Recipient2. Recipient3, and Recipient4

Question 20

You have a Microsoft 365 alert named Alert2 as shown in the following exhibit.

You need to manage the status of Alert? To which status can you change Alette?

Options:

A.

The status cannot be changed.

B.

Dismissed only

C.

Investigating only

D.

Active or Investigating only

E.

Investigating. Active, or Dismissed

Question 21

DRAG DROP

You have a Microsoft 365 subscription that contains 20 data loss prevention (DLP) policies.

You need to identify the following:

● Rules that are applied without triggering a policy alert

● The top 10 files that have matched DLP policies

● Alerts that are miscategorized

Which report should you use for each requirement? To answer, drag the appropriate reports to the correct requirements. Each report may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE : Each correct selection is worth one point.

Options:

Question 22

HOTSPOT

You have a Microsoft SharePoint Online site that contains the following files.

Users are assigned roles for the site as shown in the following table.

Which files can User1 and User2 open? To answer, select the appropriate options in the answer area.

NOTE : Each correct selection is worth one point.

Options:

Question 23

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DIP).

You have computers that run Windows 11 and have Microsoft 365 Apps instated. The computers are joined to a Microsoft Entra tenant

You need to ensure that Endpoint DIP policies can protect content on the computers.

Solution: You deploy the Endpoint DLP configuration package to the computers.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 24

You have a Microsoft 365 E5 subscription.

You plan to implement Microsoft Purview insider risk management.

You need to recommend policy templates that meet the following requirements:

• Contain risk indicators and scoring for when a user receives a poor performance review

• Contain risk indicators and scoring for when a user disables security features on a device.

Which template should you use for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 25

HOTSPOT

You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.

You create the audit retention policies shown in the following table.

The users perform the following actions:

● User1 renames a Microsoft SharePoint Online site.

● User2 sends an email message.

How long will the audit log records be retained for each action? To answer, select the appropriate options in the answer area.

NOTE : Each correct selection is worth one point.

Options:

Question 26

You have a Microsoft 36515 subscription tha1 contains a Microsoft SharePoint Online site named Site1 Site1 contains three tiles named File1. File2 and File3.

You create the data loss prevention (DIP) policies shown in the following table.

The DIP rule matches for each tile are shown in the following table.

How many DIP policy matches events will be added to Activity explorer, and how many policy matches will be added to the DLP incidents report? To answer, select the appropriate options m the answer area.

Options:

Question 27

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.

You need to deploy a Microsoft Purview insider risk management solution that will generate an alert when users share sensitive information on Site1 with external recipients.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Create a data loss prevention (DLP) policy.

B.

Turn on Indicators.

C.

Configure adaptive protection.

D.

Turn on analytics.

E.

Create an insider risk policy.

Question 28

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You have the data loss prevention (DLP) policies shown in the following table.

From Insider risk management, you configure a priority user group named PriGroup1 that contains User3 as a member. You have the insider risk policies shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Page: 1 / 7
Total 203 questions