New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft Certified: Information Security Administrator Associate SC-401 Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.

You need to deploy a Microsoft Purview insider risk management solution that will generate an alert when users share sensitive information on Site1 with external recipients.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Create a data loss prevention (DLP) policy.


B.

Turn on Indicators.


C.

Configure adaptive protection.


D.

Turn on analytics.


E.

Create an insider risk policy.


Expert Solution
Questions # 12:

You implement Microsoft 36S Endpoint data loss pi event ion (Endpoint DIP).

You have computer that run Windows 11 and have Microsoft 365 Apps instated The computers are joined to a Microsoft Entra

tenant

You need to ensure that endpoint DIP policies can protect content on the computers.

Solution: You deploy the Microsoft Purview Information Protection client to the computers.

Does this meet the goal?

Options:

A.

Yes


B.

No


Expert Solution
Questions # 13:

You have a Microsoft 365 E5 subscription. The subscription contains a user named User1 and the sensitivity labels shown in the following table.

Question # 13

You publish the labels to User1.

The subscription contains the files shown in the following table.

Question # 13

Which files can Microsoft 365 Copilot summarize for User1?

Options:

A.

File2only


B.

File3 only


C.

File2 and File3 only


D.

File1, File2. and File3


Expert Solution
Questions # 14:

You have a Microsoft 365 E5 subscription that contains 500 Windows devices.

You plan to deploy Microsoft Purview Data Security Posture Management for AI (DSPM for AI).

You need to ensure that you can monitor user activities on third-party generative AI websites.

Which two prerequisites should you complete for DSPM for AI? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Install the Microsoft Purview extension on the devices.


B.

Create a data leaks policy.


C.

Onboard the devices to Microsoft Purview.


D.

Create a communication compliance policy.


E.

Create an Endpoint data loss prevention (Endpoint DLP) policy.


F.

Enroll the devices in Microsoft Intune.


Expert Solution
Questions # 15:

You are planning a data loss prevention (DLP) solution that will apply to Windows Client computers.

You need to ensure that when users attempt to copy a file that contains sensitive information to a USB storage device, the following requirements are met:

● If the users are members of a group named Group1, the users must be allowed to copy the file, and an event must be recorded in the audit log.

● All other users must be blocked from copying the file.

What should you create?

Options:

A.

one DLP policy that contains one DLP rule


B.

one DLP policy that contains two DLP rules


C.

two DLP policies that each contains one DLP rule


Expert Solution
Questions # 16:

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add a folder path to the file path exclusions.

Does this meet the goal?

Options:

A.

Yes


B.

No


Expert Solution
Questions # 17:

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

Question # 17

Which users will Microsoft Purview insider risk management flag as potential high-impact users?

Options:

A.

User1 and User2 only


B.

User2 and User3 only


C.

User1, User2, and User3 only


D.

User1, User2, User3, and User4


Expert Solution
Questions # 18:

You have 4 Microsoft 565 E5 subscription that contains two Microsoft SharePoint Online sites named Site1 and Site2. You plan to configure a retention label named Labe1 and apply label1 to all the files in Site1 You need to ensure that two years after a file is created in Site1. the file moves automatically to Site2. How should you configure the Choose what happens after the retention period setting for Label1?

Options:

A.

Deactivate retention settings


B.

Start a disposition review


C.

Change the label


D.

Run a Power Automate flow


Expert Solution
Questions # 19:

You are creating a custom trainable classifier to Identify organizational product codes referenced in Microsoft 36S content. You identify 300 files to use as seed content When? should you store the seed content?

Options:

A.

a Microsoft OneDrive folder


B.

a Microsoft Exchange Online shared mailbox


C.

an Azure file share


D.

a Microsoft SharePoint Online folder


Expert Solution
Questions # 20:

You have a Microsoft 365 E5 subscription that uses Microsoft Purview insider risk management and contains three users named User1, User2, and User3.

All insider risk management policies have adaptive protection enabled and the default conditions for insider risk levels configured.

The users perform the following activities, which trigger insider risk policy alerts:

    User1 performs at least one data exfiltration activity that results in a high severity risk score.

    User2 performs at least three risky user activities within seven days, that each results in a high severity risk score.

    User3 performs at least bwo data exfiltration activities within seven days, that each results in a high severity risk score.

Which insider risk level is assigned to each user? To answer, drag the appropriate levels to the correct users. Each level may be used once, more than once, or not at all. You may need to drag the split bar between panes or seroll to view content.

NOTE: Each correct selection is worth one point.

Question # 20


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions