Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Microsoft SC-401 - Administering Information Security in Microsoft 365

Page: 2 / 3
Total 121 questions

You have a Microsoft 365 subscription.

You need to customize encrypted email for the subscription. The solution must meet the following requirements.

● Ensure that when an encrypted email is sent, the email includes the company logo.

● Minimize administrative effort.

Which PowerShell cmdlet should you run?

A.

Set-IRMConfiguration

B.

Set-OMEConfiguration

C.

Set-RMSTemplate

D.

New-OMEConfiguration

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

A.

an XLSX file that contains one word in each cell of the first row

B.

an XML file that contains a keyword tag for each word

C.

an ACCDB database file that contains a table named Dictionary

D.

a text file that has one word on each line

You have a Microsoft J65 ES subscription.

You need to create a Microsoft Defender for Cloud Apps policy that will detect data loss prevention (DIP) violations. What should you create?

A.

a file policy

B.

an activity policy

C.

a session policy

D.

an access policy

You have a Microsoft 365 E5 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.

You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).

Which devices support Endpoint DLP?

A.

Device1 only

B.

Device1 and Device2 only

C.

Device1 and Device4 only

D.

Device1, Device2, and Device4 only

E.

Device1, Device2, Device3, and Device4

HOTSPOT

You plan to create a custom sensitive information type that will use Exact Data Match (EDM).

You need to identify what to upload to Microsoft 365, and which tool to use for the upload.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

You have a Microsoft J65 subscription linked to a Microsoft Entra tenant that contains a user named User1. You need to grant User1 permission to search Microsoft 365 audit logs. The solution must use the principle of least privilege. Which role should you assign to User1?

A.

the Security Reader role in the Microsoft Entra admin center

B.

the Compliance Management role in the Exchange admin center

C.

the View Only Audit Logs role in the Exchange admin center

D.

the Reviewer role in the Microsoft Purview portal

You have a Microsoft 36S ES subscription.

From the Microsoft Purview Data Security Posture Management for Al portal, you review the recommendations for Al data security

You plan to create a one-click policy to block elevated risk users from pasting or uploading sensitive data to Al websites

How will the policy be configured? To answer, select the appropriate options in the answer area

NOTE: Each correct selection is worth one point.

You have two Microsoft 365 subscriptions named Contoso and Fabrikam. The subscriptions contain the users shown in the following table.

You have a sensitivity label named Sensitivity! as shown in the exhibit. (Click the Exhibit tab) you have the files shown in the following table.

For each of the following statements, select yes if the statement is true. Otherwise select No.

NOTE: Each correct selection is worth one point.

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

A.

1

B.

2

C.

3

D.

4

E.

6