Big Black Friday Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Microsoft SC-401 Administering Information Security in Microsoft 365 Exam Practice Test

Page: 1 / 20
Total 201 questions

Administering Information Security in Microsoft 365 Questions and Answers

Question 1

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Question # 1

Options:

Question 2

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 2

Options:

Question 3

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 3

Options:

Question 4

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Question 5

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Question 6

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 6

Options:

Question 7

DRAG DROP

You have a Microsoft 365 E5 subscription that has data loss prevention (DLP) implemented.

You need to create a custom sensitive info type. The solution must meet the following requirements:

● Match product serial numbers that contain a 10-character alphanumeric string.

● Ensure that the abbreviation of SN appears within six characters of each product serial number.

● Exclude a test serial number of 1111111111 from a match.

Which pattern settings should you configure for each requirement? To answer, drag the appropriate settings to the correct requirements. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Question # 7

Options:

Question 8

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-AdminAuditLogConfig -AdminAuditLogEnabled $true -AdminAuditLogCmdlets *Mailbox* command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Question 9

You have a Microsoft 365 ES subscription that uses Microsoft Teams and contains the users shown in the following table.

Question # 9

You have the retention policies shown in the following table.

Question # 9

The users perform the actions shown in the following table.

Question # 9

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Question # 9

Options:

Question 10

You have a data loss prevention (DIP) policy that has the advanced DIP rules shown in the following table.

Question # 10

You need to identity which rules will apply when content matches multiple advanced DIP rules.

Which rules should you identify? To answer, select the appropriate options in the answer area.

Question # 10

Options:

Question 11

You have a Microsoft 365 E5 subscription that uses Microsoft Purview Audit (Premium) with the 10-Year Audit Log Retention add-on license.

The subscription contains the audit retention policies shown in the following table.

Question # 11

From the SharePoint Online admin center, User1 performs the actions shown in the following table.

Question # 11

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.

Question # 11

Options:

Question 12

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1. Site1 contains three files named File1, File2, and File3.

You create the data loss prevention (DLP) policies shown in the following table.

Question # 12

The DLP rule matches for each file are shown in the following table.

Question # 12

How many DLP policy matches events will be added to Activity explorer, and how many policy matches will be added to the DLP incidents report? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 12

Options:

Question 13

HOTSPOT

You have a Microsoft 365 E5 subscription that contains two Microsoft 365 groups named Group1 and Group2. Both groups use the following resources:

● A group mailbox

● Microsoft Teams channel messages

● A Microsoft SharePoint Online teams site

You create the objects shown in the following table.

Question # 13

To which resources will AutoApply1 and Retention1 be applied? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 13

Options:

Question 14

You have a Microsoft 365 subscription. You create a retention policy and apply the policy to Exchange Online mailboxes.

You need to ensure that the retention policy tags can be assigned to mailbox items as soon as possible.

What should you do?

Options:

A.

From Exchange Online PowerShell. run Start-ManagedFolderAssistant.

B.

From the Microsoft Purview portal, create a data loss prevention (DLP) policy.

C.

From the Microsoft Purview portal, create a label policy.

D.

From Exchange Online PowerShell, run start -RetentionAutoTagLearning.

Question 15

You have a Microsoft 565 E5 subscription.

You plan to use Microsoft Purview insider risk management.

You need to create an insider risk management policy that will detect data theft from Microsoft SharePoint Online by users that submitted their resignation or are near their employment termination date.

What should you do first?

Options:

A.

Configure a HR data connector.

B.

Configure Office indicators.

C.

Configure a Physical badging connector.

D.

Onboard devices to Microsoft Defender for Endpoint.

Question 16

You have a Microsoft 365 E5 subscription. The subscription contains a user named User1 and the sensitivity labels shown in the following table.

Question # 16

You publish the labels to User1.

The subscription contains the files shown in the following table.

Question # 16

Which files can Microsoft 365 Copilot summarize for User1?

Options:

A.

File2only

B.

File3 only

C.

File2 and File3 only

D.

File1, File2. and File3

Question 17

You have a Microsoft 365 subscription.

You need to ensure that users can apply retention labels to individual documents in their Microsoft SharePoint libraries.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

From Microsoft Defender for Cloud Apps, create a file policy.

B.

From the SharePoint admin center, modify the Site Settings.

C.

From the SharePoint ad min center, modify the records management settings.

D.

From the Microsoft Purview portal, publish a label.

E.

From the Microsoft Purview portal, create a label.

Question 18

You have a Microsoft 365 E5 subscription.

You plan to implement insider risk management for users that manage sensitive data associated with a project.

You need to create a protection policy for the users. The solution must meet the following requirements:

● Minimize the impact on users who are NOT part of the project.

● Minimize administrative effort.

What should you do first?

Options:

A.

From the Microsoft Purview portal, create an insider risk management policy.

B.

From the Microsoft Entra admin center, create a security group.

C.

From the Microsoft Entra admin center create a User risk policy

D.

From the Microsoft Purview portal create a priority user group

Question 19

You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.

A user named User 1 sends link based, branded emails that are encrypted by using Microsoft Purview Advanced Message Encryption to the recipients shown in the following table.

Question # 19

For which recipients Can User1 revoke the emails?

Options:

A.

Recipient1 only

B.

Recipient4 only

C.

Reciptent1 and Recipient4 only

D.

Reclpient3 and Recipients only

E.

Reciptent1, Recipient2. Recipient3, and Recipient4

Question 20

You have a Microsoft 365 E5 subscription that contains a user named User1.

You need to ensure that all email messages that contain attachments are encrypted automatically by using Microsoft Purview Message Encryption.

What should you create?

Options:

A.

a mail flow rule

B.

an information barrier segment

C.

a data loss prevention (DLP) policy

D.

a sensitivity label

Question 21

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You plan to deploy a Defender for Cloud Apps file policy that will be triggered when the following conditions are met:

● A file is shared externally.

● A file is labeled as internal only.

Which filter should you use for each condition? To answer, drag the appropriate filters to the correct conditions. Each filter may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Question # 21

Options:

Question 22

You have a Microsoft 365 E5 subscription that contains the sensitive information types (SITs) shown in the following table.

Question # 22

You plan to create the policies shown in the following table and assign them to a Microsoft SharePoint Online site.

Question # 22

Which policies can use SIT1. and which policies can use SIT2? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 22

Options:

Question 23

You have a Microsoft 365 E5 subscription.

You need to ensure that encrypted email messages sent to an external recipient can be revoked or will expire within seven days.

What should you configure first?

Options:

A.

a custom branding template

B.

a mail flow rule

C.

a sensitivity label

D.

a Conditional Access policy

Question 24

You have a Microsoft 365 E5 subscription.

You are implementing insider risk management.

You need to maximize the amount of historical data that is collected when an event is triggered.

What is the maximum number of days that historical data can be collected?

Options:

A.

30

B.

60

C.

90

D.

180

Question 25

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

Question # 25

You have the data loss prevention (DLP) policies shown in the following table.

Question # 25

From Insider risk management, you configure a priority user group named PriGroup1 that contains User3 as a member. You have the insider risk policies shown in the following table.

Question # 25

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 25

Options:

Question 26

You have a sensitive information type based on a trainable classifier.

You are unsatisfied with the result of the trainable classifier.

You need to retrain the classifier.

What should you use in the Microsoft Purview portal?

Options:

A.

Content explorer from Data classification

B.

Labels from Information protection

C.

Labels from Information governance

D.

Content search

Question 27

You have a data loss prevention (DIP) policy that applies to the Devices location. The policy protects documents that contain United States passport numbers

Users report that they cannot upload documents to a travel management website because of the pokey.

You need to ensure that the users can upload the documents to the travel management website. The solution must prevent the protected content from being uploaded to other locations.

Which Microsoft 365 Endpoint data loss prevention (Endpoint DIP) setting should you configure?

Options:

A.

Service domains

B.

Unallowed browsers

C.

File path exclusions

D.

Unallowed apps

Question 28

You have a Microsoft 36S ES subscription.

You need to create the Microsoft Purview insider risk management policies shown in the following table.

Question # 28

Which policy template should you use for each policy? To answer, drag the appropriate policy templates to the correct polices

Each template may be used once more than once or not at all. You may need to drag the split bar between panes or scroll to view..

Question # 28

Options:

Question 29

You have a Microsoft 365 tenant.

You have a database that stores customer details. Each customer has a unique 13-digit identifier that consists of a fixed pattern of numbers and letters.

You need to implement a data loss prevention (DLP) solution that meets the following requirements:

● Email messages that contain a single customer identifier can be sent outside your company.

● Email messages that contain two or more customer identifiers must be approved by the company's data privacy team.

Which two components should you include in the solution? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

a sensitivity label

B.

a sensitive information type

C.

a DLP policy

D.

a retention label

E.

a mail flow rule

Question 30

You have a Microsoft 365 IS subscription that contains the resources shown in the following table.

Question # 30

The subscription contains a Windows 11 device named Device 1 and has the Microsoft Purview Information Protection client installed. Device i contains the resources shown in the following table.

Question # 30

You publish a sensitivity label named Label1 to User1 and Group1.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Question # 30

Options:

Page: 1 / 20
Total 201 questions