Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

SC-401 Leak Questions

Page: 4 / 7
Total 203 questions

Administering Information Security in Microsoft 365 Questions and Answers

Question 13

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

Options:

A.

an XLSX file that contains one word in each cell of the first row

B.

an XML file that contains a keyword tag for each word

C.

an ACCDB database file that contains a table named Dictionary

D.

a text file that has one word on each line

Question 14

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You plan to deploy a Defender for Cloud Apps file policy that will be triggered when the following conditions are met:

● A file is shared externally.

● A file is labeled as internal only.

Which filter should you use for each condition? To answer, drag the appropriate filters to the correct conditions. Each filter may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE : Each correct selection is worth one point.

Options:

Question 15

Nate: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique

solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might

not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the

review screen.

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 11 and have Microsoft 365 Apps installed. The computers are joined to a Microsoft Entra tenant.

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You onboard the computers to Microsoft Defender for Endpoint.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 16

You have a Microsoft 365 E5 subscription.

You plan to implement insider risk management for users that manage sensitive data associated with a project.

You need to create a protection policy for the users. The solution must meet the following requirements:

● Minimize the impact on users who are NOT part of the project.

● Minimize administrative effort.

What should you do first?

Options:

A.

From the Microsoft Purview portal, create an insider risk management policy.

B.

From the Microsoft Entra admin center, create a security group.

C.

From the Microsoft Entra admin center create a User risk policy

D.

From the Microsoft Purview portal create a priority user group

Page: 4 / 7
Total 203 questions