Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SC-401 Exam Dumps - Administering Information Security in Microsoft 365

Go to page:
Question # 4

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

A.

an XLSX file that contains one word in each cell of the first row

B.

an XML file that contains a keyword tag for each word

C.

an ACCDB database file that contains a table named Dictionary

D.

a text file that has one word on each line

Full Access
Question # 5

DRAG DROP

You need to create a trainable classifier that can be used as a condition in an auto-apply retention label policy.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 6

You have a Microsoft 365 E5 subscription.

Users access their mailbox by using the following apps.

• Outlook for Microsoft 365

• Outlook on the web

• Outlook Mobile fiOS. Android)

You create a data loss prevention (DLP) policy named DLP1 that has the following settings:

• Location; Exchange email

• Status: On

• User notifications: On

• Notify users with a policy tip: Enabled

Which apps display a policy tip when content is matched by using DIP1 ?

A.

Outlook for Microsoft 365 only

B.

Outlook on the web only

C.

Outlook for Microsoft 365 and Outlook on the web only

D.

Outlook for Microsoft 365 and Outlook Mobile (iOS. Android) only

E.

Outlook for Microsoft 365. Outlook on the web, and Outlook Mobile (iOS. Android)

Full Access
Question # 7

You have a Microsoft 365 ES subscription that uses Microsoft Teams and contains the users shown in the following table.

You have the retention policies shown in the following table.

The users perform the actions shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Full Access
Question # 8

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-MailboxFolderPermission -Identity "User1" -User User1@contoso.com -AccessRights Owner command.

Does that meet the goal?

A.

Yes

B.

No

Full Access
Go to page: