Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

All SC-401 Test Inside Microsoft Questions

Page: 3 / 6
Total 121 questions

Administering Information Security in Microsoft 365 Questions and Answers

Question 9

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft Defender for Cloud Apps, you mark the application as Unsanctioned.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 10

You are implementing Microsoft Purview Advanced Message Encryption for a Microsoft 365 tenant named contoso.com You need to meet the following requirements:

• All email to a domain named (abrikam.com must be encrypted automatically.

• Encrypted emails must expire seven days after they are sent

What should you configure for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 11

You create a data loss prevention (DIP) policy that meets the following requirements:

• Prevents guest users from accessing a sensitive document shared during a Microsoft Teams chat

• Prevents guest users from accessing a sensitive document stored in a Microsoft Team? channel

Which location should you select for each requirement? To answer, select the appropriate options in the answer area NOTE: Each correct selection is worth one point.

Options:

Question 12

You implement Microsoft 36S Endpoint data loss pi event ion (Endpoint DIP).

You have computers that run Windows 11 and have Microsoft 365 Apps instated The computers are joined to a Microsoft Entra tenant.

You need to ensure that Endpoint DIP policies can protect content on the computers.

Solution: You onboard the computers to Microsoft Defender for Endpoint Does this meet the goal?

Options:

A.

Yes

B.

No

Page: 3 / 6
Total 121 questions