Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Microsoft Certified: Information Security Administrator Associate SC-401 Questions and answers with Dumpstech

Exam SC-401 Premium Access

View all detail and faqs for the SC-401 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

HOTSPOT

You have a Microsoft 365 E5 subscription that contains two Microsoft 365 groups named Group1 and Group2. Both groups use the following resources:

● A group mailbox

● Microsoft Teams channel messages

● A Microsoft SharePoint Online teams site

You create the objects shown in the following table.

Question # 51

To which resources will AutoApply1 and Retention1 be applied? To answer, select the appropriate options in the answer area.

NOTE : Each correct selection is worth one point.

Question # 51

Options:

Questions # 52:

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the device configurations shown in the following table.

Question # 52

Each configuration uses either Google Chrome or Firefox as a default browser.

You need to implement Microsoft Purview and deploy the Microsoft Purview browser extension to the configurations.

To which configuration can each extension be deployed? To answer, select the appropriate options in the answer area.

NOTE : Each correct selection is worth one point.

Question # 52

Options:

Questions # 53:

You implement Microsoft 36S Endpoint data loss pi event ion (Endpoint DIP).

You have computer that run Windows 11 and have Microsoft 365 Apps instated The computers are joined to a Microsoft Entra

tenant

You need to ensure that endpoint DIP policies can protect content on the computers.

Solution: You deploy the Microsoft Purview Information Protection client to the computers.

Does this meet the goal?

Options:

A.

Yes

B.

No

Questions # 54:

You are creating a DLP policy named Policy1 that will be applied to the locations as shown in the following exhibit.

Question # 54

Policy1 contains an advanced data loss prevention (DLP) rule named Rule1.

Which two conditions can you use in Rule1? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Document property is

B.

Attachment ' s file extension is

C.

Document size equals or is greater than

D.

Content is shared from Microsoft 365

E.

Content contains

Questions # 55:

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add a folder path to the file path exclusions.

Does this meet the goal?

Options:

A.

Yes

B.

No

Questions # 56:

You have a Microsoft 365 E5 subscription that contains a device named Device1.

You need to enable Endpoint data loss prevention (Endpoint DLP) for Device1.

What should you do first in the Microsoft Purview portal?

Options:

A.

Turn on device onboarding.

B.

Enable Microsoft Priva Privacy Risk Management.

C.

Create a Microsoft Purview Information Barriers (IBs) segment.

D.

Add a Microsoft Purview Information Protection scanner cluster.

E.

Onboard Device1 to Microsoft Purview.

Questions # 57:

You have a Microsoft 365 E5 subscription that contains 500 Windows devices.

You plan to deploy Microsoft Purview Data Security Posture Management for AI (DSPM for AI).

You need to ensure that you can monitor user activities on third-party generative AI websites.

Which two prerequisites should you complete for DSPM for AI? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Install the Microsoft Purview extension on the devices.

B.

Create a data leaks policy.

C.

Onboard the devices to Microsoft Purview.

D.

Create a communication compliance policy.

E.

Create an Endpoint data loss prevention (Endpoint DLP) policy.

F.

Enroll the devices in Microsoft Intune.

Questions # 58:

You have a Microsoft 365 subscription that contains the devices shown in the following table.

Question # 58

From which devices can Microsoft Purview Insider Risk Management capture forensic evidence?

Options:

A.

Device only

B.

Device2 only

C.

Device1 and Device2 only

D.

Device2 and Device3 only

E.

Device1, Device2 and Device3

Questions # 59:

You need to create a retention policy to delete content after seven years from the following locations:

• Exchange Online email

• SharePoint Online sites

• OneDrive accounts

• Microsoft 365 Groups

• Teams channel messages

• Teams chats

What is the minimum number of retention policies that you should create?

Options:

A.

1

B.

2

C.

3

D.

4

Questions # 60:

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.

You need to deploy a Microsoft Purview insider risk management solution that will generate an alert when users share sensitive information on Site1 with external recipients.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Create a data loss prevention (DLP) policy.

B.

Turn on Indicators.

C.

Configure adaptive protection.

D.

Turn on analytics.

E.

Create an insider risk policy.

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions