Big 11.11 Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Microsoft SC-401 Administering Information Security in Microsoft 365 Exam Practice Test

Page: 1 / 18
Total 178 questions

Administering Information Security in Microsoft 365 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

Your company has a Microsoft 365 tenant.

The company performs annual employee assessments. The assessment results are recorded in a document named AssessmentTemplate.docx that is created by using a Microsoft Word template. Copies of the employee assessments are sent to employees and their managers.

The assessment copies are stored in mailboxes, Microsoft SharePoint Online sites, and OneDrive folders. A copy of each assessment is also stored in a SharePoint Online folder named Assessments.

You need to create a data loss prevention (DLP) policy that prevents the employee assessments from being emailed to external users. You will use a document fingerprint to identify the assessment documents. The solution must minimize effort.

What should you include in the solution?

Options:

A.

Create a fingerprint of AssessmentTemplate.docx.

B.

Create a sensitive info type that uses Exact Data Match (EDM).

C.

Import 100 sample documents from the Assessments folder to a seed folder.

D.

Create a fingerprint of 100 sample documents in the Assessments folder.

Question 2

You have a Microsoft 365 E5 subscription that has a sensitivity label named Sensitivity1.

You plan to create an auto-labeling policy that will apply Sensitivity1 to Microsoft Exchange Online mailboxes.

On February 1, you create the auto-labeling policy and enable simulation mode by using the default settings. No modifications are made to the policy in simulation mode.

When will the policy first be turned on?

Options:

A.

February 2

B.

February 6

C.

February 15

D.

never

Question 3

You have a Microsoft 365 ES subscription.

You have a Microsoft SharePoint Online document library that contains Microsoft Word and Excel documents. The documents contain the following types of information:

• Credit card numbers

• Physical addresses in the UK

• National hearth service numbers from the UK

• Sensitive projects that contain the following words: Project Tailspin. Project Contoso, and Project falcon

You have email messages m Microsoft Exchange Online that contain the following information types:

• Credit card numbers

• User sign-in credentials

• National health service numbers from the UK

You plan to use sensitive information types (SITs) for compliance policies.

What is the minimum number of SITs required to classify all the information types?

Options:

A.

2

B.

5

C.

7

D.

10

Question 4

You have a Microsoft 365 tenant that is opt-in for trainable classifiers.

You need to ensure that a user named User1 can create custom trainable classifiers. The solution must use the principle of least privilege.

Which role should you assign to User1?

Options:

A.

Security Administrator

B.

Compliance Administrator

C.

Global Administrator

D.

Security Operator

Question 5

You have a Microsoft 365 E5 subscription that contains the adaptive scopes shown in the following table.

You create the retention policies shown in the following table.

Which retention policies support a preservation lock?

Options:

A.

RPolicy2only

B.

RPolicy3on1y

C.

RPolicy1 and RPolicy2 only

D.

RPolicy1 and RPolicy3 only

E.

RPolicy1, RPolicy2, and RPolicy3

Question 6

You have a Microsoft 365 subscription. You create a retention policy and apply the policy to Exchange Online mailboxes.

You need to ensure that the retention policy tags can be assigned to mailbox items as soon as possible.

What should you do?

Options:

A.

From Exchange Online PowerShell. run Start-ManagedFolderAssistant.

B.

From the Microsoft Purview portal, create a data loss prevention (DLP) policy.

C.

From the Microsoft Purview portal, create a label policy.

D.

From Exchange Online PowerShell, run start -RetentionAutoTagLearning.

Question 7

You have a Microsoft 365 E5 tenant that contains a user named User1. User1 is assigned the Compliance Administrator role. User1 cannot view the regular expression in the IP Address sensitive info type. You need to ensure that User! can view the regular expression. What should you do?

Options:

A.

Assign Used to the Reviewer role group

B.

Create a copy of the IP Address sensitive info type and instruct User1 to edit the copy.

C.

Instruct User1 to use the Test function on the sensitive info type.

D.

Assign User1 the Global Reader role.

Question 8

DRAG DROP

You have a Microsoft 365 E5 subscription that has data loss prevention (DLP) implemented.

You need to create a custom sensitive info type. The solution must meet the following requirements:

● Match product serial numbers that contain a 10-character alphanumeric string.

● Ensure that the abbreviation of SN appears within six characters of each product serial number.

● Exclude a test serial number of 1111111111 from a match.

Which pattern settings should you configure for each requirement? To answer, drag the appropriate settings to the correct requirements. Each setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Options:

Question 9

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the device configurations shown in the following table.

Each configuration uses either Google Chrome or Firefox as a default browser.

You need to implement Microsoft Purview and deploy the Microsoft Purview browser extension to the configurations.

To which configuration can each extension be deployed? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 10

You have a Microsoft 365 E5 subscription.

You need to review a Microsoft 365 Copilot usage report.

From where should you review the report?

Options:

A.

Information Protection in the Microsoft Purview portal

B.

the Microsoft 365 admin center

C.

DSPM for Al in the Microsoft Purview portal

D.

the Microsoft Defender portal

Question 11

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-MailboxFolderPermission -Identity "User1" -User User1@contoso.com -AccessRights Owner command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Question 12

You have a Microsoft 365 £5 subscription.

You are implementing insider risk management.

You need to create an insider risk management notice template and format the message body of the notice template.

How should you configure the template? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 13

You have a Microsoft 365 E5 subscription that contains four users named User1. User2, User3, and User4 and a file named File1.docx. File1 has a sensitivity label applied. The label is configured as shown in the following table.

Which users can summarize File1 by using Microsoft 365 Copilot?

Options:

A.

User1 only

B.

User1 and User2 only

C.

User1, User2. and User3 only

D.

User1, User2, User3. and User4

Question 14

You have a Microsoft S65 E5 subscription that contains two users named User! and Admin1 Admin1 manages audit retention policies for the subscription.

You need to ensure that the audit logs of User1 will be retained for 10 years.

What should you do first?

Options:

A.

Assign a Microsoft Purview Audit (Premium) add on license to User1.

B.

Assign a 10 year audit log retention add-on license to Admin1.

C.

Assign a 10-year audit log retention add-on license to User1.

D.

Assign a Microsoft Purview Audit (Premium) add-on license to Admin1.

Question 15

HOTSPOT

You have a Microsoft 365 subscription.

You plan to deploy an audit log retention policy.

You need to perform a search to validate whether the policy will be applied to the intended entries.

Which two fields should you configure for the search? To answer, select the appropriate fields in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 16

You create a retention label policy named Contoso_Policy that contains the following labels:

• 10 years then delete

• 5 years then delete

• Do not retain

Contoso.Policy is applied to content in Microsoft SharePoint Online sites.

After a couple of days, you discover the following messages on the Properties page of the label policy:

• Status: Off (Error)

• It's taking longer than expected to deploy the policy

You need to reinitiate the policy.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 17

You have a Microsoft 365 E5 subscription that uses Microsoft Purview insider risk management and contains three users named User1, User2, and User3.

All insider risk management policies have adaptive protection enabled and the default conditions for insider risk levels configured.

The users perform the following activities, which trigger insider risk policy alerts:

    User1 performs at least one data exfiltration activity that results in a high severity risk score.

    User2 performs at least three risky user activities within seven days, that each results in a high severity risk score.

    User3 performs at least bwo data exfiltration activities within seven days, that each results in a high severity risk score.

Which insider risk level is assigned to each user? To answer, drag the appropriate levels to the correct users. Each level may be used once, more than once, or not at all. You may need to drag the split bar between panes or seroll to view content.

NOTE: Each correct selection is worth one point.

Options:

Question 18

You have a sensitive information type based on a trainable classifier.

You are unsatisfied with the result of the trainable classifier.

You need to retrain the classifier.

What should you use in the Microsoft Purview portal?

Options:

A.

Content explorer from Data classification

B.

Labels from Information protection

C.

Labels from Information governance

D.

Content search

Question 19

You have a Microsoft J65 subscription linked to a Microsoft Entra tenant that contains a user named User1. You need to grant User1 permission to search Microsoft 365 audit logs. The solution must use the principle of least privilege. Which role should you assign to User1?

Options:

A.

the Security Reader role in the Microsoft Entra admin center

B.

the Compliance Management role in the Exchange admin center

C.

the View Only Audit Logs role in the Exchange admin center

D.

the Reviewer role in the Microsoft Purview portal

Question 20

You have a data loss prevention (DIP) policy that has the advanced DIP rules shown in the following table.

You need to identity which rules will apply when content matches multiple advanced DIP rules.

Which rules should you identify? To answer, select the appropriate options in the answer area.

Options:

Question 21

You have a Microsoft 365 E5 subscription. The subscription contains a user named User1 and the sensitivity labels shown in the following table.

You publish the labels to User1.

The subscription contains the files shown in the following table.

Which files can Microsoft 365 Copilot summarize for User1?

Options:

A.

File2only

B.

File3 only

C.

File2 and File3 only

D.

File1, File2. and File3

Question 22

You have a Microsoft 36S ES subscription that contains a Windows 11 device named Device 1 and three users named User 1. User2. and User3.

You plan to deploy Azure Information Protection (AIP) and the Microsoft Purview Information Protection client to Device 1.

You need to ensure that the users can perform the following actions on Device1 as part of the planned deployment

• User 1 will test the functionality of the client.

• User2 will install and configure the Microsoft Rights Management connector.

• User3 will be configured as the service account for the information protection scanner.

The solution must maximize the security of the sign-in process for the users What should you do?

Options:

A.

Exclude User2 and User3 from multifactor authentication (MfA).

B.

Enable User? and Usex3 for passwordless authentication.

C.

Exclude User1 and User? from multifactor authentication (Mf A}

D.

Enable User1. User I and User 3 for passkey (FIDO2) authentication

Question 23

You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.

A user named User 1 sends link based, branded emails that are encrypted by using Microsoft Purview Advanced Message Encryption to the recipients shown in the following table.

For which recipients Can User1 revoke the emails?

Options:

A.

Recipient1 only

B.

Recipient4 only

C.

Reciptent1 and Recipient^ only

D.

Reclpient3 and Recipients only

E.

Reciptent1, Recipient2. Recipient3, and Recipient4

Question 24

You have a Microsoft 365 E5 subscription.

You plan to use insider risk management to collect and investigate forensic evidence.

You need to enable forensic evidence capturing.

What should you do first?

Options:

A.

Configure the information protection scanner.

B.

Claim capacity.

C.

Enable Adaptive Protection.

D.

Create priority user groups.

Question 25

DRAG DROP

You need to create a trainable classifier that can be used as a condition in an auto-apply retention label policy.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Options:

Question 26

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-Mailbox -Identity "User1" -AuditEnabled $true command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Question 27

You have a Microsoft 365 subscription that contains two Microsoft SharePoint Online sites named Site1 and Site2. You plan to use policies to meet the following requirements:

• Add a watermark of Confidential to a document if the document contains the words Project1 or Project2.

• Retain a document for seven years if the document contains credit card information.

• Add a watermark of Internal Use Only to all the documents stored on Site2.

• Add a watermark of Confidential to all the documents stored on Site1.

You need to recommend the minimum number of sensitive info types required.

How many sensitive info types should you recommend?

Options:

A.

1

B.

2

C.

3

D.

4

Question 28

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Question 29

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Question 30

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 31

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Options:

Question 32

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Question 33

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Page: 1 / 18
Total 178 questions