Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Microsoft Microsoft Certified: Information Security Administrator Associate SC-401 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

Options:

A.

an XLSX file that contains one word in each cell of the first row


B.

an XML file that contains a keyword tag for each word


C.

an ACCDB database file that contains a table named Dictionary


D.

a text file that has one word on each line


Expert Solution
Questions # 12:

You have Microsoft 365 E5 tenant that has a domain name of 86s40q.ofimicrosoft.com. The tenant contains the users shown in the following table.

Question # 12

You have a published sensitivity label.

The Access control settings for the sensitivity label are configured as shown in the exhibit (Click the Exhibit tab.)

Question # 12

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Question # 12


Expert Solution
Questions # 13:

You have a Microsoft 365 E5 subscription. The subscription contains a user named User1 and the sensitivity labels shown in the following table.

Question # 13

You publish the labels to User1.

The subscription contains the files shown in the following table.

Question # 13

Which files can Microsoft 365 Copilot summarize for User1?

Options:

A.

File2only


B.

File3 only


C.

File2 and File3 only


D.

File1, File2. and File3


Expert Solution
Questions # 14:

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

Question # 14

The subscription contains the groups shown in the following table.

Question # 14

You plan to create a priority user group named Priority1.

You need to identify the following:

. Which users and groups can be added to Priority1?

. Which users can be enabled to view alerts that involve the members of Priority1?

What should you identify? To answer, select the appropriate options in the answer area.

Question # 14


Expert Solution
Questions # 15:

You have a Microsoft 365 alert named Alert2 as shown in the following exhibit.

Question # 15

You need to manage the status of Alert? To which status can you change Alette?

Options:

A.

The status cannot be changed.


B.

Dismissed only


C.

Investigating only


D.

Active or Investigating only


E.

Investigating. Active, or Dismissed


Expert Solution
Questions # 16:

You have a Microsoft 365 E5 subscription.

You plan to implement Microsoft Purview insider risk management.

You implement the HR data connector.

You need to prepare the data that will be imported by the data connector.

In which format should you prepare the data?

Options:

A.

JSON


B.

CSV


C.

TSV


D.

XML


E.

PRN


Expert Solution
Questions # 17:

You have a Microsoft 365 tenant that uses Microsoft Purview Message Encryption.

You need to ensure that any emails containing attachments and sent to user1@contoso.com are encrypted automatically by using Microsoft Purview Message Encryption.

What should you do?

Options:

A.

From the Exchange admin center, create a mail flow rule.


B.

From the Exchange admin center, create a new sharing policy.


C.

From the Microsoft Defender portal, create a Safe Attachments policy.


D.

From the Microsoft Purview portal, configure an auto-apply retention label policy.


Expert Solution
Questions # 18:

You have a Microsoft 365 E5 subscription.

You are implementing insider risk management.

You need to maximize the amount of historical data that is collected when an event is triggered.

What is the maximum number of days that historical data can be collected?

Options:

A.

30


B.

60


C.

90


D.

180


Expert Solution
Questions # 19:

DRAG DROP

You have a Microsoft 365 subscription that contains 20 data loss prevention (DLP) policies.

You need to identify the following:

● Rules that are applied without triggering a policy alert

● The top 10 files that have matched DLP policies

● Alerts that are miscategorized

Which report should you use for each requirement? To answer, drag the appropriate reports to the correct requirements. Each report may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Question # 19


Expert Solution
Questions # 20:

You have a Microsoft 36S ES subscription

You need to implement Endpoint data loss prevention (Endpoint DLP) to meet the following requirements:

• Ensure that users can upload data to only two sites named Site1 and Site2.

• Prevent users from pasting data to two search engines named Search1 and Search2.

• Minimize the number of policies and groups.

What If the minimum number of sensitive service domain groups and Endpoint DIP policies required? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 20


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions