Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Microsoft > Microsoft Certified: Information Security Administrator Associate > SC-401

SC-401 Administering Information Security in Microsoft 365 Question and Answers

Question # 4

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site! and the data loss prevention (DLP) policies shown in the following table.

The DLP rules are configured as shown In the following table.

All the policies are assigned to Site1.

You need to ensure that if a user uploads a document to Site1 that matches all the rules, the user will be shown the Tip 2 policy tip. What should you do?

A.

Change the priority of DLP2 to 0.

B.

Prevent additional processing of the policies if there is a match for Rule2

C.

Change the priority of DLP2 to 3.

D.

Enable additional processing of the policies if there is a match for Rule1.

Full Access
Question # 5

You need to provide a user with the ability to view data loss prevention (DIP) alerts in the Microsoft Purview portal. The solution must use the principle of least privilege.

Which role should you assign to the user?

A.

Compliance Administrator

B.

Security Reader

C.

Security Operator

D.

Compliance Data Administrator

Full Access
Question # 6

You have a Microsoft J65 E5 subscription. You plan to implement retention policies for Microsoft Teams. Which item types can be retained?

A.

voice memos from the Teams mobile client

B.

embedded images

C.

code snippets

Full Access
Question # 7

You have a Microsoft 36S ES subscription.

You plan to use the Microsoft Purview portal to map human resources (HR) data for use with insider risk management policies.

You need to add a data connector to import the HR data.

What should you do first and in which format should you import the data? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 8

You have a Microsoft 365 E5 subscription that contains four users named User1. User2, User3, and User4 and a file named File1.docx. File1 has a sensitivity label applied. The label is configured as shown in the following table.

Which users can summarize File1 by using Microsoft 365 Copilot?

A.

User1 only

B.

User1 and User2 only

C.

User1, User2. and User3 only

D.

User1, User2, User3. and User4

Full Access
Question # 9

HOTSPOT

You have a Microsoft 365 E5 subscription that has data loss prevention (DLP) implemented.

You plan to export DLP activity by using Activity explorer.

The exported file needs to display the sensitive info type detected for each DLP rule match.

What should you do in Activity explorer before exporting the data, and in which file format is the file exported? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 10

You have a Microsoft 36S ES subscription that contains the devices shown in the following table.

You plan to implement inside' risk management and capture forensic evidence

Which devices support the collection of forensic evidence, and what should you do lo prepare each supported device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

You have a Microsoft 365 subscription that has a retention label named Retention1. The subscription contains the files shown in the following table.

You create an auto-labeling policy named Policy1 that will automatically apply Retention1 as shown in the Auto-labeling policy

Exhibit. (Click the Auto-labeling policy tab.)

You configure Policy1 to apply Retention1 as shown in the Locations exhibit. (Click the Locations tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 12

You have a Microsoft 365 E5 subscription that contains two users named User! and User2. The subscription has a data loss prevention (DLP) policy named Policy 1.

User2 sends an outbound message that generates a false positive for Policy1.

You need to ensure that User1 can download the message that generated the alert The solution must follow the principle of least privilege.

To which role group should you add User1?

A.

Data Investigator

B.

Global Reader

C.

eDiscovery Manager

D.

Security Operator

Full Access
Question # 13

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need to perform a content search for email messages that meet the following requirements:

• Are delivered to both user1@contoso.com and user2@contoso.com

• Are sent from a user account that has a name that starts with the word Compliance

How should you complete the query in the KQL editor? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 14

You have a Microsoft 365 £5 subscription that contains the groups shown in the following table.

The subscription contains the users shown in the following table.

You create the mail flow rules shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 15

You have a Microsoft 36S ES subscription

You plan to create an met data match (EDM) classifier named EDM1.

You need to grant permissions to hash and upload the sensitive ^formation source table for EDMI. What should you create first?

A.

a Microsoft Entra enterprise application named EDM.DataUploaders

B.

a Microsoft Purview role group named EDM.DataUploaders

C.

a security group named EDM.DataUploaders

D.

a Microsoft Entra app registration named EDM.DataUploaders

E.

a Microsoft 365 group named EDM.Datauploaders

Full Access
Question # 16

Your company has offices in multiple countries.

The company has a Microsoft 365 E5 subscription that uses Microsoft Purview insider risk management.

You plan to perform the following actions:

● In a new country, open an office named Office1.

● Create a new user named User1.

● Deploy insider risk management to Office1.

● Add User1 to the Insider Risk Management Admins role group.

You need to ensure that User1 can perform insider risk management tasks for only the users and the devices in Office1.

What should you create first?

A.

a dynamic device group

B.

a dynamic user group

C.

an administrative unit

D.

a management group

Full Access
Question # 17

You have a Microsoft 365 E5 subscription.

You plan to implement Microsoft Purview insider risk management.

You need to recommend policy templates that meet the following requirements:

• Contain risk indicators and scoring for when a user receives a poor performance review

• Contain risk indicators and scoring for when a user disables security features on a device.

Which template should you use for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 18

You have a Microsoft 365 ES subscription.

You have a Microsoft SharePoint Online document library that contains Microsoft Word and Excel documents. The documents contain the following types of information:

• Credit card numbers

• Physical addresses in the UK

• National hearth service numbers from the UK

• Sensitive projects that contain the following words: Project Tailspin. Project Contoso, and Project falcon

You have email messages m Microsoft Exchange Online that contain the following information types:

• Credit card numbers

• User sign-in credentials

• National health service numbers from the UK

You plan to use sensitive information types (SITs) for compliance policies.

What is the minimum number of SITs required to classify all the information types?

A.

2

B.

5

C.

7

D.

10

Full Access
Question # 19

You have a Microsoft 365 ES subscription.

A security manager receives an email message every time a data loss prevention (DIP) policy match occurs. You need to limit alert notifications to actionable DLP events. What should you do?

A.

From the Microsoft Defender portal, apply a filter to the alerts.

B.

From the Microsoft Purview portal, modify the Policy Tips settings of a DLP policy.

C.

From the Microsoft Purview portal, modify the matched activities threshold of an alert policy.

D.

From the Microsoft Purview portal, modify the User overrides settings of a DLP policy.

Full Access
Question # 20

You have a Microsoft SharePoint Online site named Site1 that contains a document library. The library contains more than 1,000 documents. Some of the documents are job applicant resumes. All the documents are in the English language.

You plan to apply a sensitivity label automatically to any document identified as a resume. Only documents that contain work experience, education, and accomplishments must be labeled automatically.

You need to identify and categorize the resumes. The solution must minimize administrative effort.

What should you include in the solution?

A.

a trainable classifier

B.

a keyword dictionary

C.

a function

D.

an exact data match (EDM) classifier

Full Access
Question # 21

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need ensure that an incident will be generated when a user visits a phishing website.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 22

You have a Microsoft SharePoint Online site named Site! that contains the files shown in the following table.

You have a data loss prevention (DLP) policy named DLP1 that has the advanced DLP rules shown in the following table.

You apply DLP1 toSite1.

Which policy tips will appear for File2?

A.

Tip1 only

B.

Tip2 only

C.

Tip3 only

D.

Tip1 and Tip2 only

Full Access
Question # 23

You have a Microsoft 365 subscription. You create a retention policy and apply the policy to Exchange Online mailboxes.

You need to ensure that the retention policy tags can be assigned to mailbox items as soon as possible.

What should you do?

A.

From Exchange Online PowerShell. run Start-ManagedFolderAssistant.

B.

From the Microsoft Purview portal, create a data loss prevention (DLP) policy.

C.

From the Microsoft Purview portal, create a label policy.

D.

From Exchange Online PowerShell, run start -RetentionAutoTagLearning.

Full Access
Question # 24

DRAG DROP

You need to create a trainable classifier that can be used as a condition in an auto-apply retention label policy.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 25

You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.

A user named User 1 sends link based, branded emails that are encrypted by using Microsoft Purview Advanced Message Encryption to the recipients shown in the following table.

For which recipients Can User1 revoke the emails?

A.

Recipient1 only

B.

Recipient4 only

C.

Reciptent1 and Recipient4 only

D.

Reclpient3 and Recipients only

E.

Reciptent1, Recipient2. Recipient3, and Recipient4

Full Access
Question # 26

You need to create a retention policy to delete content after seven years from the following locations:

• Exchange Online email

• SharePoint Online sites

• OneDrive accounts

• Microsoft 365 Groups

• Teams channel messages

• Teams chats

What is the minimum number of retention policies that you should create?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 27

You have a Microsoft 365 E5 subscription. The subscription contains 500 devices that are onboarded to Microsoft Purview.

You select Activate Microsoft Purview Audit.

You need to ensure that you can track interactions between users and generative AI websites.

What should you deploy to the devices?

A.

the Microsoft Purview extension

B.

the Microsoft Purview Information Protection client

C.

the Microsoft Defender Browser Protection extension

D.

Endpoint analytics

Full Access
Question # 28

You have a Microsoft J65 ES subscription.

You need to create a Microsoft Defender for Cloud Apps policy that will detect data loss prevention (DIP) violations. What should you create?

A.

a file policy

B.

an activity policy

C.

a session policy

D.

an access policy

Full Access
Question # 29

You have a Microsoft 365 subscription that contains a sensitivity label named Contoso Confidential.

You publish Contoso Confidential to all users.

Contoso Confidential is configured as shown in the Configuration exhibit. (Click the Configuration tab.)

The Access control settings of Contoso Confidential are configured as shown in the Access control exhibit. (Click the Access control tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 30

You have a Microsoft 365 E5 subscription.

You need to review a Microsoft 365 Copilot usage report.

From where should you review the report?

A.

Information Protection in the Microsoft Purview portal

B.

the Microsoft 365 admin center

C.

DSPM for Al in the Microsoft Purview portal

D.

the Microsoft Defender portal

Full Access
Question # 31

You have a Microsoft 365 sensitivity label that is published to all the users in your Microsoft Entra tenant as shown in the following exhibit.

For each of the following statements, select Yes if the statement is true. Otherwise, select No

NOTE: Each correct selection is worth one point.

Full Access
Question # 32

You have a Microsoft 365 E5 subscription that contains two users named User! and User2.

You need to implement insider risk management. The solution must meet the following requirements:

• Ensure that User1 can create insider risk management policies.

• Ensure that User2 can use content captured by using insider risk management policies

• Follow the principle of least privilege.

To which role group should you add each user? To answer, drag the appropriate role groups to the correct users. Each role group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Full Access
Question # 33

You have a Microsoft 365 E5 subscription.

You need to ensure that users are prevented from uploading sensitive data to ChatGPT and Google Gemini. The solution must meet the following requirements:

• Prevent credit card numbers from being pasted into ChatGPT and Gemini.

• Prevent documents that contain classified data from being uploaded to ChatGPT and Gemini.

Which Microsoft Purview solution should you use for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 34

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

A.

1

B.

2

C.

3

D.

4

E.

6

Full Access
Question # 35

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 36

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Full Access