Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Microsoft SC-401 Administering Information Security in Microsoft 365 Exam Practice Test

Page: 1 / 17
Total 165 questions

Administering Information Security in Microsoft 365 Questions and Answers

Question 1

You have the files shown in the following table.

Question # 1

You configure a retention policy as shown >n the exhibit. (Click the Exhibit lab.)

The start of the retention period is based on when items are created. The current date is January 01. 207S.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Question # 1

Options:

Question 2

You have a Microsoft 365 E5 tenant.

You have sensitivity labels as shown in the Sensitivity Labels exhibit. (Click the Sensitivity Labels tab.)

Question # 2

The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content.

The sensitivity labels ate published as shown in the Published exhibit. (Click the Published tab.)

Question # 2

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 2

Options:

Question 3

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You create a communication compliance policy named Policy1 and select Detect Microsoft Copilot interactions.

Which two trainable classifiers will be added to Policy1 automatically? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Unauthorized disclosure

B.

Prompt Shields

C.

Threat

D.

Corporate Sabotage

E.

Protected Materials

Question 4

HOTSPOT

You have a Microsoft 365 subscription.

You plan to deploy an audit log retention policy.

You need to perform a search to validate whether the policy will be applied to the intended entries.

Which two fields should you configure for the search? To answer, select the appropriate fields in the answer area.

NOTE: Each correct selection is worth one point.

Question # 4

Options:

Question 5

You have a Microsoft $65 subscription.

You plan to retain the following audit log record types and activities for the next three years.

• Copilotlnteraction: All activities selected (1/1)

o Interacted with Copilot

• Compliance DLP endpoint: All activities selected {2/2)

o Matched DIP rule

o Removed Dl P rule from document

• AzureActiveDirectory 2 of 25 activities selected (2/25)

o Reset user password o Changed user password

What is the minimum number of audit retention policies you should create to retain only the selected record types and activities?

Options:

A.

1

B.

2

C.

3

D.

5

Question 6

You need to test Microsoft Purview Advanced Message Encryption capabilities for your company. The test must verify the following information:

• The acquired default template names

• The encryption and decryption verification status

Which PowerShell cmdlet should you run?

Options:

A.

Test-OAuthConnectivity

B.

Test-ClientAccessRule

C.

Test-IRMConfiguration

D.

Test-Mailflow

Question 7

You have a Microsoft 365 E5 subscription.

Users access their mailbox by using the following apps.

• Outlook for Microsoft 365

• Outlook on the web

• Outlook Mobile fiOS. Android)

You create a data loss prevention (DLP) policy named DLP1 that has the following settings:

• Location; Exchange email

• Status: On

• User notifications: On

• Notify users with a policy tip: Enabled

Which apps display a policy tip when content is matched by using DIP1 ?

Options:

A.

Outlook for Microsoft 365 only

B.

Outlook on the web only

C.

Outlook for Microsoft 365 and Outlook on the web only

D.

Outlook for Microsoft 365 and Outlook Mobile (iOS. Android) only

E.

Outlook for Microsoft 365. Outlook on the web, and Outlook Mobile (iOS. Android)

Question 8

You have a Microsoft 565 subscription that contains 100 users and a Microsoft 365 group named Group1. All users have Windows 11 devices and use Microsoft SharePoint Online and Exchange Online. A sensitivity label named Label! is published as the default label for Group1. You add two sublabels named Sublabel1 and Sublabel2 lo Label1. You need to ensure that the settings in Sublabel 1 are applied by default to Group 1. What should you do?

Options:

A.

Change the order of Sublabel!

B.

Duplicate all the settings from Sublabel! to Label1.

C.

Modify the policy of Label1.

D.

Delete the policy of Label1 and publish Sublabel1.

Question 9

You have a Microsoft 365 £5 subscription.

You are implementing insider risk management.

You need to create an insider risk management notice template and format the message body of the notice template.

How should you configure the template? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 9

Options:

Question 10

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft Defender for Cloud Apps, you mark the application as Unsanctioned.

Does this meet the goal?

Options:

A.

Yes

B.

No

Question 11

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1 and the users shown in the following table.

Question # 11

You have a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit.

Question # 11

You apply DLP1 to Site1.

User1 uploads a file named File1 to Site1. File1 does NOT match any of the DLP1 rules. User2 updates File1 to contain data that matches the DLP1 rules.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 11

Options:

Question 12

You are creating a custom trainable classifier to Identify organizational product codes referenced in Microsoft 36S content. You identify 300 files to use as seed content When? should you store the seed content?

Options:

A.

a Microsoft OneDrive folder

B.

a Microsoft Exchange Online shared mailbox

C.

an Azure file share

D.

a Microsoft SharePoint Online folder

Question 13

You have Microsoft 365 E5 tenant that has a domain name of 86s40q.ofimicrosoft.com. The tenant contains the users shown in the following table.

Question # 13

You have a published sensitivity label.

The Access control settings for the sensitivity label are configured as shown in the exhibit (Click the Exhibit tab.)

Question # 13

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Question # 13

Options:

Question 14

You have a Microsoft 36S ES subscription

You need to implement Endpoint data loss prevention (Endpoint DLP) to meet the following requirements:

• Ensure that users can upload data to only two sites named Site1 and Site2.

• Prevent users from pasting data to two search engines named Search1 and Search2.

• Minimize the number of policies and groups.

What If the minimum number of sensitive service domain groups and Endpoint DIP policies required? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 14

Options:

Question 15

You have a Microsoft 36S subscription.

In Microsoft Exchange Online, you configure the mail flow rule shown in the following exhibit.

Question # 15

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

Question # 15

Options:

Question 16

You have a Microsoft 365 E5 subscription. The subscription contains 500 devices that are onboarded to Microsoft Purview.

You select Activate Microsoft Purview Audit.

You need to ensure that you can track interactions between users and generative AI websites.

What should you deploy to the devices?

Options:

A.

the Microsoft Purview extension

B.

the Microsoft Purview Information Protection client

C.

the Microsoft Defender Browser Protection extension

D.

Endpoint analytics

Question 17

You are implementing Microsoft Purview Advanced Message Encryption for a Microsoft 365 tenant named contoso.com You need to meet the following requirements:

• All email to a domain named (abrikam.com must be encrypted automatically.

• Encrypted emails must expire seven days after they are sent

What should you configure for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 17

Options:

Question 18

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.

You need to deploy a Microsoft Purview insider risk management solution that will generate an alert when users share sensitive information on Site1 with external recipients.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Create a data loss prevention (DLP) policy.

B.

Turn on Indicators.

C.

Configure adaptive protection.

D.

Turn on analytics.

E.

Create an insider risk policy.

Question 19

You have a Microsoft 365 £5 subscription that contains the groups shown in the following table.

Question # 19

The subscription contains the users shown in the following table.

Question # 19

You create the mail flow rules shown in the following table.

Question # 19

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 19

Options:

Question 20

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need ensure that an incident will be generated when a user visits a phishing website.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 20

Options:

Question 21

You have a data loss prevention (DIP) policy that applies to the Devices location. The policy protects documents that contain United States passport numbers

Users report that they cannot upload documents to a travel management website because of the pokey.

You need to ensure that the users can upload the documents to the travel management website. The solution must prevent the protected content from being uploaded to other locations.

Which Microsoft 365 Endpoint data loss prevention (Endpoint DIP) setting should you configure?

Options:

A.

Service domains

B.

Unallowed browsers

C.

File path exclusions

D.

Unallowed apps

Question 22

You have a Microsoft 365 subscription. Auditing is enabled.

A user named User1 is a member of a dynamic security group named Group1.

You discover that User1 is no longer a member of Group1.

You need to search the audit log to identify why User1 was removed from Group1.

Which two activities should you use in the search? To answer, select the appropriate activities in the answer area.

NOTE: Each correct selection is worth one point.

Question # 22

Options:

Question 23

You have a Microsoft 365 E5 subscription.

You plan to use insider risk management to collect and investigate forensic evidence.

You need to enable forensic evidence capturing.

What should you do first?

Options:

A.

Configure the information protection scanner.

B.

Claim capacity.

C.

Enable Adaptive Protection.

D.

Create priority user groups.

Question 24

You have a Microsoft 365 E5 subscription.

You need to enable support for sensitivity labels in Microsoft SharePoint Online.

What should you use?

Options:

A.

the Microsoft Purview portal

B.

the Microsoft Entra admin center

C.

the SharePoint admin center

D.

the Microsoft 365 admin center

Question 25

You have a Microsoft 365 E5 subscription. The subscription contains 500 Windows devices that are onboarded to Microsoft Purview.

You need to prevent users from sharing sensitive information with third-party generative Al websites. Which Microsoft Purview solution should you use?

Options:

A.

Information Protection

B.

Information Barriers

C.

Insider Risk Management

D.

Data Loss Prevention

Question 26

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 26

Options:

Question 27

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Question 28

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 28

Options:

Question 29

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Question # 29

Options:

Question 30

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Question 31

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 31

Options:

Page: 1 / 17
Total 165 questions