Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Microsoft SC-401 Administering Information Security in Microsoft 365 Exam Practice Test

Page: 1 / 12
Total 121 questions

Administering Information Security in Microsoft 365 Questions and Answers

Question 1

You have a Microsoft 36S ES subscription.

From the Microsoft Purview Data Security Posture Management for Al portal, you review the recommendations for Al data security

You plan to create a one-click policy to block elevated risk users from pasting or uploading sensitive data to Al websites

How will the policy be configured? To answer, select the appropriate options in the answer area

NOTE: Each correct selection is worth one point.

Question # 1

Options:

Question 2

You have a data loss prevention (DIP) policy that applies to the Devices location. The policy protects documents that contain United States passport numbers

Users report that they cannot upload documents to a travel management website because of the pokey.

Vou need to ensure that the users can upload the documents to the travel management website. The solution must prevent the protected content from being uploaded to other locations.

Which Microsoft 365 Endpoint data loss prevention (Endpoint DIP) setting should you configure?

Options:

A.

Service domains

B.

Unallowed browsers

C.

File path exclusions

D.

Unallowed apps

Question 3

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage Account keys in plain text to third parties.

You need to ensure that when Azure Storage Account keys are emailed, the emails are encrypted.

Solution: You configure a mail flow rule that matches the text patterns.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 4

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage Account keys in plain text to third parties.

You need to ensure that when Azure Storage Account keys are emailed, the emails are encrypted.

Solution: You configure a mail flow rule that matches a sensitive info type.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 5

You have a Microsoft J65 ES subscription.

You need to create a Microsoft Defender for Cloud Apps policy that will detect data loss prevention (DIP) violations. What should you create?

Options:

A.

a file policy

B.

an activity policy

C.

a session policy

D.

an access policy

Question 6

You have a Microsoft 365 ES subscription that uses Microsoft Teams and contains the users shown in the following table.

Question # 6

You have the retention policies shown in the following table.

Question # 6

The users perform the actions shown in the following table.

Question # 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Question # 6

Options:

Question 7

You are creating a data loss prevention (DLP) policy that will apply to all available locations except Fabric and Power BI workspaces.

You configure an advanced DLP rule in the policy.

Which type of condition can you use in the rule?

Options:

A.

Sensitive info type

B.

Content search query

C.

Sensitive label

D.

Keywords

Question 8

You have a Microsoft 365 E5 subscription that contains a Microsoft Teams channel named Channel1. Channel1 contains research and development documents.

You plan to implement Microsoft 365 Copilot for the subscription.

You need to prevent the contents of files stored in Channel1 from being included in answers generated by Copilot and shown to unauthorized users.

What should you use?

Options:

A.

data loss prevention (DLP)

B.

Microsoft Purview insider risk management

C.

Microsoft Purview Information Barriers

D.

sensitivity labels

Question 9

You have a Microsoft 365 E5 subscription. The subscription contains 500 devices that are onboarded to Microsoft Purview.

You select Activate Microsoft Purview Audit.

You need to ensure that you can track interactions between users and generative AI websites.

What should you deploy to the devices?

Options:

A.

the Microsoft Purview extension

B.

the Microsoft Purview Information Protection client

C.

the Microsoft Defender Browser Protection extension

D.

Endpoint analytics

Question 10

You have a Microsoft 365 E5 subscription that contains three DOCX files named File1, File2, and File3.

You create the sensitivity labels shown in the following table.

Question # 10

You apply the labels to the files as shown in the following table.

Question # 10

You ask Microsoft 365 Copilot to summarize the files, and you receive the results shown in the following table.

Question # 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 10

Options:

Question 11

You have a Microsoft 36S ES subscription that contains a Windows 11 device named Device 1 and three users named User 1. User2. and User3.

You plan to deploy Azure Information Protection (AIP) and the Microsoft Purview Information Protection client to Device 1.

You need to ensure that the users can perform the following actions on Device1 as part of the planned deployment

• User 1 will test the functionality of the client.

• User2 will install and configure the Microsoft Rights Management connector.

• User3 will be configured as the service account for the information protection scanner.

The solution must maximize the security of the sign-in process for the users What should you do?

Options:

A.

Exclude User2 and User3 from multifactor authentication (MfA).

B.

Enable User? and Usex3 for passwordless authentication.

C.

Exclude User1 and User? from multifactor authentication (Mf A}

D.

Enable User1. User I and User 3 for passkey (FIDO2) authentication

Question 12

You have a Microsoft 365 E5 subscription.

You need to create a sensitivity label named Label1. The solution must ensure that users can use Microsoft 365 Copilot to summarize files that have Label1 applied.

Which permission should you select for Label1?

Options:

A.

Export content(EXPORT)

B.

Copy and extract content(EXTRACT)

C.

Edit content(DOCEDIT)

D.

View rights(VIEW)

Question 13

You have a Microsoft 365 IS subscription that contains the resources shown in the following table.

Question # 13

The subscription contains a Windows 11 device named Device 1 and has the Microsoft Purview Information Protection client installed. Device i contains the resources shown in the following table.

Question # 13

You publish a sensitivity label named Label1 to User1 and Group1.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Question # 13

Options:

Question 14

You have a Microsoft 365 E5 subscription.

You have a file named Customer.csv that contains a list of 1,000 customer names.

You plan to use Customer.csv to classify documents stored in a Microsoft SharePoint Online library.

What should you create in the Microsoft Purview portal, and which type of element should you select? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 14

Options:

Question 15

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the device configurations shown in the following table.

Question # 15

Each configuration uses either Google Chrome or Firefox as a default browser.

You need to implement Microsoft Purview and deploy the Microsoft Purview browser extension to the configurations.

To which configuration can each extension be deployed? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 15

Options:

Question 16

You are creating a custom trainable classifier to Identify organizational product codes referenced in Microsoft 36S content. You identify 300 files to use as seed content When? should you store the seed content?

Options:

A.

a Microsoft OneDrive folder

B.

a Microsoft Exchange Online shared mailbox

C.

an Azure file share

D.

a Microsoft SharePoint Online folder

Question 17

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You are creating an exact data match (EDM) classifier named EDM1.

For EDM1, you upload a schema file that contains the fields shown in the following table.

Question # 17

What is the maximum number of primary elements that EDM1 can have?

Options:

A.

1

B.

2

C.

3

D.

4

Question 18

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-Mailbox -Identity "User1" -AuditEnabled $true command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Question 19

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Question 20

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 20

Options:

Question 21

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Question 22

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 22

Options:

Question 23

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 23

Options:

Question 24

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Question # 24

Options:

Page: 1 / 12
Total 121 questions