Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft Certified: Information Security Administrator Associate SC-401 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are implementing Microsoft Purview Advanced Message Encryption for a Microsoft 365 tenant named contoso.com You need to meet the following requirements:

• All email to a domain named (abrikam.com must be encrypted automatically.

• Encrypted emails must expire seven days after they are sent

What should you configure for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 1


Expert Solution
Questions # 2:

Your company has a Microsoft 365 tenant.

The company performs annual employee assessments. The assessment results are recorded in a document named AssessmentTemplate.docx that is created by using a Microsoft Word template. Copies of the employee assessments are sent to employees and their managers.

The assessment copies are stored in mailboxes, Microsoft SharePoint Online sites, and OneDrive folders. A copy of each assessment is also stored in a SharePoint Online folder named Assessments.

You need to create a data loss prevention (DLP) policy that prevents the employee assessments from being emailed to external users. You will use a document fingerprint to identify the assessment documents. The solution must minimize effort.

What should you include in the solution?

Options:

A.

Create a fingerprint of AssessmentTemplate.docx.


B.

Create a sensitive info type that uses Exact Data Match (EDM).


C.

Import 100 sample documents from the Assessments folder to a seed folder.


D.

Create a fingerprint of 100 sample documents in the Assessments folder.


Expert Solution
Questions # 3:

You have a Microsoft 365 E5 subscription that contains a user named User1. The subscription contains an Endpoint data loss prevention (Endpoint DLP) policy as shown in the Actions exhibit. (Click the Actions tab.)

Question # 3

You configure the Upload to a restricted cloud service domain or access from an unallowed browsers settings as shown in the Upload restrictions exhibit. (Click the Upload restrictions tab.)

Question # 3

You configure the Paste to supported browsers settings as shown in the Paste restrictions exhibit. (Click the Paste restrictions tab.)

Question # 3

When User1 pastes content into ChatGPT, the user receives the error message shown in the Error exhibit. (Click the Error tab.)

Question # 3

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.

Question # 3


Expert Solution
Questions # 4:

You have a Microsoft 365 E5 subscription. The subscription contains a user named User1 and the sensitivity labels shown in the following table.

Question # 4

You publish the labels to User1.

The subscription contains the files shown in the following table.

Question # 4

Which files can Microsoft 365 Copilot summarize for User1?

Options:

A.

File2only


B.

File3 only


C.

File2 and File3 only


D.

File1, File2. and File3


Expert Solution
Questions # 5:

Nate: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique

solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might

not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the

review screen.

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 11 and have Microsoft 365 Apps installed. The computers are joined to a Microsoft Entra tenant.

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You onboard the computers to Microsoft Defender for Endpoint.

Does this meet the goal?

Options:

A.

Yes


B.

No


Expert Solution
Questions # 6:

You have a Microsoft 365 E5 tenant.

You have sensitivity labels as shown in the Sensitivity Labels exhibit. (Click the Sensitivity Labels tab.)

Question # 6

The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content.

The sensitivity labels ate published as shown in the Published exhibit. (Click the Published tab.)

Question # 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 6


Expert Solution
Questions # 7:

You have a Microsoft J65 E5 subscription. You plan to implement retention policies for Microsoft Teams. Which item types can be retained?

Options:

A.

voice memos from the Teams mobile client


B.

embedded images


C.

code snippets


Expert Solution
Questions # 8:

You have a Microsoft 365 E5 tenant.

You need to add a new keyword dictionary.

What should you create?

Options:

A.

a trainable classifier


B.

a retention policy


C.

a sensitivity label


D.

a sensitive info type


Expert Solution
Questions # 9:

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-Mailbox -Identity " User1 " -AuditEnabled $true command.

Does that meet the goal?

Options:

A.

Yes


B.

No


Expert Solution
Questions # 10:

You have a Microsoft 565 E5 subscription.

You plan to use Microsoft Purview insider risk management.

You need to create an insider risk management policy that will detect data theft from Microsoft SharePoint Online by users that submitted their resignation or are near their employment termination date.

What should you do first?

Options:

A.

Configure a HR data connector.


B.

Configure Office indicators.


C.

Configure a Physical badging connector.


D.

Onboard devices to Microsoft Defender for Endpoint.


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions