Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Microsoft > Microsoft Certified: Information Security Administrator Associate > SC-401

SC-401 Administering Information Security in Microsoft 365 Question and Answers

Question # 4

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 5

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

A.

1

B.

2

C.

3

D.

4

E.

6

Full Access
Question # 6

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 7

You have a Microsoft 365 E5 subscription that contains a data loss prevention (DLP) policy named DLP1. DLP1 contains the DLP rules shown in the table.

You need to ensure that when a document matches all the rules, users will see Tip 2.

What should you change?

A.

the priority setting of Rule2 to 0

B.

the priority setting of Rule2 to 2

C.

the priority setting of Rule3 and Rule4 to 0

D.

the If there's a match for this rule, stop processing additional DLP policies and rules setting for Rule3 to Enabled

Full Access
Question # 8

You have a Microsoft SharePoint Online site named Site! that contains the files shown in the following table.

You have a data loss prevention (DLP) policy named DLP1 that has the advanced DLP rules shown in the following table.

You apply DLP1 toSite1.

Which policy tips will appear for File2?

A.

Tip1 only

B.

Tip2 only

C.

Tip3 only

D.

Tip1 and Tip2 only

Full Access
Question # 9

You have a Microsoft 36S subscription that contains the users shown in the following table.

You create the data loss prevention (DLP) policies shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 10

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site! and the data loss prevention (DLP) policies shown in the following table.

The DLP rules are configured as shown In the following table.

All the policies are assigned to Site1.

You need to ensure that if a user uploads a document to Site1 that matches all the rules, the user will be shown the Tip 2 policy tip. What should you do?

A.

Change the priority of DLP2 to 0.

B.

Prevent additional processing of the policies if there is a match for Rule2

C.

Change the priority of DLP2 to 3.

D.

Enable additional processing of the policies if there is a match for Rule1.

Full Access
Question # 11

HOTSPOT

You have a Microsoft 365 E5 subscription. The subscription contains devices that are onboarded to Microsoft Purview and configured as shown in the following table.

The subscription contains the users shown in the following table.

You need to review the activities.

What should you use for each user? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 12

You have a Microsoft 365 E5 tenant that contains a user named User1. User1 is assigned the Compliance Administrator role. User1 cannot view the regular expression in the IP Address sensitive info type. You need to ensure that User! can view the regular expression. What should you do?

A.

Assign Used to the Reviewer role group

B.

Create a copy of the IP Address sensitive info type and instruct User1 to edit the copy.

C.

Instruct User1 to use the Test function on the sensitive info type.

D.

Assign User1 the Global Reader role.

Full Access
Question # 13

You are creating a data loss prevention (DLP) policy that will apply to all available locations except Fabric and Power BI workspaces.

You configure an advanced DLP rule in the policy.

Which type of condition can you use in the rule?

A.

Sensitive info type

B.

Content search query

C.

Sensitive label

D.

Keywords

Full Access
Question # 14

You have a Microsoft 365 subscription that contains a sensitivity label named Contoso Confidential.

You publish Contoso Confidential to all users.

Contoso Confidential is configured as shown in the Configuration exhibit. (Click the Configuration tab.)

The Access control settings of Contoso Confidential are configured as shown in the Access control exhibit. (Click the Access control tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 15

You have a Microsoft 365 E5 subscription. The subscription contains 500 Windows devices that are onboarded to Microsoft Purview.

You need to prevent users from sharing sensitive information with third-party generative Al websites. Which Microsoft Purview solution should you use?

A.

Information Protection

B.

Information Barriers

C.

Insider Risk Management

D.

Data Loss Prevention

Full Access
Question # 16

You have a Microsoft 365 E5 subscription that contains the data loss prevention (DLP) policies shown in the following table.

You have a custom employee information form named Template1 .docx.

You plan to create a sensitive info type named Sensitive! that will use the document fingerprint from Template1.docx.

What should you use to create Sensitive1, and in which DLP policies can you use Sensitive1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 17

You have a Microsoft 365 ES subscription.

You have a Microsoft SharePoint Online document library that contains Microsoft Word and Excel documents. The documents contain the following types of information:

• Credit card numbers

• Physical addresses in the UK

• National hearth service numbers from the UK

• Sensitive projects that contain the following words: Project Tailspin. Project Contoso, and Project falcon

You have email messages m Microsoft Exchange Online that contain the following information types:

• Credit card numbers

• User sign-in credentials

• National health service numbers from the UK

You plan to use sensitive information types (SITs) for compliance policies.

What is the minimum number of SITs required to classify all the information types?

A.

2

B.

5

C.

7

D.

10

Full Access
Question # 18

You have a Microsoft 365 E5 subscription that contains a user named User1. You deploy Microsoft Purview Data Security Posture Management for AD (DSPM for AD). You need to ensure that User1 can verify the auditing status of the subscription. The solution must follow the principle of least privilege. To which role group should you add User1?

A.

Insider Risk Management Analysts

B.

Security Reader

C.

Insider Risk Management Investigators

D.

View-Only Organization Management for Microsoft Exchange Online

Full Access
Question # 19

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-MailboxFolderPermission -Identity "User1" -User User1@contoso.com -AccessRights Owner command.

Does that meet the goal?

A.

Yes

B.

No

Full Access
Question # 20

You need to test Microsoft Purview Advanced Message Encryption capabilities for your company. The test must verify the following information:

• The acquired default template names

• The encryption and decryption verification status

Which PowerShell cmdlet should you run?

A.

Test-OAuthConnectivity

B.

Test-ClientAccessRule

C.

Test-IRMConfiguration

D.

Test-Mailflow

Full Access
Question # 21

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need ensure that an incident will be generated when a user visits a phishing website.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 22

You have a Microsoft 365 E5 subscription that uses retention label policies.

You need to identify all the changes made to retention labels during the last 30 days.

What should you use in the Microsoft Purview portal?

A.

Reports

B.

Activity explorer

C.

User data search

D.

Content search

Full Access
Question # 23

You need to create a retention policy to delete content after seven years from the following locations:

• Exchange Online email

• SharePoint Online sites

• OneDrive accounts

• Microsoft 365 Groups

• Teams channel messages

• Teams chats

What is the minimum number of retention policies that you should create?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 24

You have a Microsoft 36S ES subscription that contains a Windows 11 device named Device 1 and three users named User 1. User2. and User3.

You plan to deploy Azure Information Protection (AIP) and the Microsoft Purview Information Protection client to Device 1.

You need to ensure that the users can perform the following actions on Device1 as part of the planned deployment

• User 1 will test the functionality of the client.

• User2 will install and configure the Microsoft Rights Management connector.

• User3 will be configured as the service account for the information protection scanner.

The solution must maximize the security of the sign-in process for the users What should you do?

A.

Exclude User2 and User3 from multifactor authentication (MfA).

B.

Enable User? and Usex3 for passwordless authentication.

C.

Exclude User1 and User? from multifactor authentication (Mf A}

D.

Enable User1. User I and User 3 for passkey (FIDO2) authentication

Full Access
Question # 25

You have a Microsoft 365 subscription.

Users have devices that run Windows 11.

You plan to create a Microsoft Purview insider risk management policy that will detect when a user performs the following actions:

● Deletes files that contain a sensitive information type (SIT) from their device

● Copies files that contain a SIT to a USB drive

● Prints files that contain a SIT

You need to prepare the environment to support the policy.

What should you do?

A.

Configure the physical badging connector.

B.

Configure the HR data connector.

C.

Create a Microsoft Purview communication compliance policy.

D.

Onboard the devices to Microsoft Purview.

Full Access
Question # 26

Your company has a Microsoft 365 tenant.

The company performs annual employee assessments. The assessment results are recorded in a document named AssessmentTemplate.docx that is created by using a Microsoft Word template. Copies of the employee assessments are sent to employees and their managers.

The assessment copies are stored in mailboxes, Microsoft SharePoint Online sites, and OneDrive folders. A copy of each assessment is also stored in a SharePoint Online folder named Assessments.

You need to create a data loss prevention (DLP) policy that prevents the employee assessments from being emailed to external users. You will use a document fingerprint to identify the assessment documents. The solution must minimize effort.

What should you include in the solution?

A.

Create a fingerprint of AssessmentTemplate.docx.

B.

Create a sensitive info type that uses Exact Data Match (EDM).

C.

Import 100 sample documents from the Assessments folder to a seed folder.

D.

Create a fingerprint of 100 sample documents in the Assessments folder.

Full Access
Question # 27

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage Account keys in plain text to third parties.

You need to ensure that when Azure Storage Account keys are emailed, the emails are encrypted.

Solution: You configure a mail flow rule that matches the text patterns.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 28

You have a Microsoft 565 E5 subscription.

You plan to use Microsoft Purview insider risk management.

You need to create an insider risk management policy that will detect data theft from Microsoft SharePoint Online by users that submitted their resignation or are near their employment termination date.

What should you do first?

A.

Configure a HR data connector.

B.

Configure Office indicators.

C.

Configure a Physical badging connector.

D.

Onboard devices to Microsoft Defender for Endpoint.

Full Access
Question # 29

You have a Microsoft 365 E5 subscription.

You need to create static retention policies for the following locations:

● Teams chats

● Exchange email

● SharePoint sites

● Microsoft 365 Groups

● Teams channel messages

What is the minimum number of retention policies required?

A.

1

B.

2

C.

3

D.

4

E.

5

Full Access
Question # 30

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft Defender for Cloud Apps, you mark the application as Unsanctioned.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 31

You have a Microsoft 365 E5 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.

You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).

Which devices support Endpoint DLP?

A.

Device1 only

B.

Device1 and Device2 only

C.

Device1 and Device4 only

D.

Device1, Device2, and Device4 only

E.

Device1, Device2, Device3, and Device4

Full Access
Question # 32

You have a Microsoft 365 tenant.

A new regulatory requirement states that all documents containing a patent ID be labeled, retained for 10 years, and then deleted. The policy used to apply the retention settings must never be disabled or deleted by anyone.

You need to implement the regulatory requirement.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 33

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You plan to deploy a Defender for Cloud Apps file policy that will be triggered when the following conditions are met:

● A file is shared externally.

● A file is labeled as internal only.

Which filter should you use for each condition? To answer, drag the appropriate filters to the correct conditions. Each filter may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Full Access