SC-401 Practice Test Questions

121 Questions


Topic 2: Mix Questions

You have a Microsoft J65 subscription linked to a Microsoft Entra tenant that contains a user named User1. You need to grant User1 permission to search Microsoft 365 audit logs. The solution must use the principle of least privilege. Which role should you assign to User1?


A. the Security Reader role in the Microsoft Entra admin center


B. the Compliance Management role in the Exchange admin center


C. the View Only Audit Logs role in the Exchange admin center


D. the Reviewer role in the Microsoft Purview portal





C.
  the View Only Audit Logs role in the Exchange admin center

You have Microsoft 365 E5 tenant that has a domain name of 86s40q.ofimicrosoft.com. The tenant contains the users shown in the following table.






You have a Microsoft 365 tenant.
You have a database that stores customer details. Each customer has a unique 13-digit identifier that consists of a fixed pattern of numbers and letters.
You need to implement a data loss prevention (DLP) solution that meets the following requirements:
Email messages that contain a single customer identifier can be sent outside your company.
Email messages that contain two or more customer identifiers must be approved by the company's data privacy team.
Which two components should you include in the solution? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.


A. a sensitivity label


B. a sensitive information type


C. a DLP policy


D. a retention label


E. a mail flow rule





B.
  a sensitive information type

C.
  a DLP policy

Explanation:
You need to define a custom sensitive information type that recognizes the unique 13-digit identifier format for customer records. Microsoft Purview DLP policies use these types to identify and protect sensitive data.
A Data Loss Prevention (DLP) policy is required to enforce the rules. It will allow emails with a single identifier but trigger an approval workflow when two or more identifiers are detected.

You have a Microsoft 365 E5 subscription that contains the groups shown in the following table.






You have a Microsoft S65 E5 subscription that contains two users named User! and Admin1 Admin1 manages audit retention policies for the subscription. You need to ensure that the audit logs of User1 will be retained for 10 years. What should you do first?


A. Assign a Microsoft Purview Audit (Premium) add on license to User1.


B. Assign a 10 year audit log retention add-on license to Admin1.


C. Assign a 10-year audit log retention add-on license to User1.


D. Assign a Microsoft Purview Audit (Premium) add-on license to Admin1.





C.
  Assign a 10-year audit log retention add-on license to User1.

You have 4 Microsoft 565 E5 subscription that contains two Microsoft SharePoint Online sites named Site1 and Site2. You plan to configure a retention label named Labe1 and apply label1 to all the files in Site1 You need to ensure that two years after a file is created in Site1. the file moves automatically to Site2. How should you configure the Choose what happens after the retention period setting for Label1?


A. Deactivate retention settings


B. Start a disposition review


C. Change the label


D. Run a Power Automate flow





D.
  Run a Power Automate flow

You have a data loss prevention (DIP) policy that applies to the Devices location. The policy protects documents that contain United States passport numbers Users report that they cannot upload documents to a travel management website because of the pokey. Vou need to ensure that the users can upload the documents to the travel management website. The solution must prevent the protected content from being uploaded to other locations. Which Microsoft 365 Endpoint data loss prevention (Endpoint DIP) setting should you configure?


A. Service domains


B. Unallowed browsers


C. File path exclusions


D. Unallowed apps





A.
  Service domains

You have a Microsoft 36515 subscription tha1 contains a Microsoft SharePoint Online site named Site1 Site1 contains three tiles named File1. File2 and File3. You create the data loss prevention (DIP) policies shown in the following table.






Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From Microsoft Defender for Cloud Apps, you create an app discovery policy.
Does this meet the goal?


A. Yes


B. No





B.
  No

Explanation:
Creating an app discovery policy in Microsoft Defender for Cloud Apps is used for detecting and monitoring cloud application usage, but it does not prevent a locally installed application (Tailspin_scanner.exe) from accessing sensitive files on Windows 11 devices.
To block Tailspin_scanner.exe from accessing sensitive documents while allowing it to access other files, the correct solution is to use Microsoft Purview Endpoint Data Loss Prevention (Endpoint DLP) and add Tailspin_scanner.exe to the Restricted Apps list.
Endpoint DLP allows you to block specific applications from accessing sensitive files while keeping general access available. Restricted Apps List in Endpoint DLP ensures that Tailspin_scanner.exe cannot open, copy, or process protected documents, but it can still function normally for non-sensitive content.

You have a Microsoft 565 E5 subscription.
You plan to use Microsoft Purview insider risk management.
You need to create an insider risk management policy that will detect data theft from Microsoft SharePoint Online by users that submitted their resignation or are near their employment termination date.
What should you do first?


A. Configure a HR data connector.


B. Configure Office indicators.


C. Configure a Physical badging connector.


D. Onboard devices to Microsoft Defender for Endpoint.





A.
  Configure a HR data connector.

You have a Microsoft 365 E5 subscription.
You need to enable support for sensitivity labels in Microsoft SharePoint Online.
What should you use?


A. the Microsoft Purview portal


B. the Microsoft Entra admin center


C. the SharePoint admin center


D. the Microsoft 365 admin center





C.
  the SharePoint admin center

Explanation:
To enable support for sensitivity labels in Microsoft SharePoint Online, you must configure the setting in the SharePoint admin center. Sensitivity labels in SharePoint Online allow labeling and protection of files stored in SharePoint and OneDrive. This feature must be enabled in the SharePoint admin center Settings Information protection to allow sensitivity labels to apply encryption and protection to stored documents.

You have a Microsoft 365 ES subscription that uses Microsoft Teams and contains the users shown in the following table.







Page 1 out of 11 Pages