SC-400 Exam Dumps – Reliable Way to Pass and Get Certified

Category:

Comments:

Post Date:


If you are looking for a reliable and comprehensive way to prepare for your SC-400 certification exam, look no further than SC-400 exam questions. These SC-400 exam dumps questions are designed to help you assess your knowledge, identify your strengths and weaknesses, and improve your chances of passing the exam on the first try. These SC-400 dumps questions cover all the topics and concepts that are essential for the SC-400 exam, so you can be sure that you are fully prepared. Test Microsoft SC-400 free dumps below.

Page 1 of 8

1. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription.

You need to identify resumes that are stored in the subscription by using a built-in trainable classifier.

Solution: You create a retention policy.

Does this meet the goal?

2. You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview compliance portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

YOU run the Set-AdminAuditLogConfig -AdminAuditLogEnabled $true -AdminiAuditLogCmdlets "Mailbox* command.

Does that meet the goal?

3. You have a Microsoft 365 E5 tenant.

You create a data loss prevention (DLP) policy.

You need to ensure that the policy protects documents in Microsoft Teams chat sessions.

Which location should you enable in the policy?

4. You need to protect documents that contain credit card numbers from being opened by users outside your company. The solution must ensure that users at your company can open the documents.

What should you use?

5. You have a Microsoft 365 tenant that uses Microsoft Office 365 Message Encryption (OME).

You need to ensure that any emails containing attachments and sent to [email protected] are encrypted automatically by using OME.

What should you do?

6. HOTSPOT

You have a Microsoft 365 E5 subscription.

You are implementing insider risk management

You need to create an insider risk management notice template and format the message body of the notice template.

How should you configure the template? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.



7. You need to implement a solution that meets the compliance requirements for the Windows 10 computers.

Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each coned selection is worth one point.

8. Topic 2, Contoso Case Study



Overview

Contoso, Ltd. is a consulting company that has a main office in Montreal and three branch offices in Seattle, Boston, and Johannesburg.



Microsoft 365 Environment

Contoso has a Microsoft 365 FS tenant the tenant contains the administrative user accounts shown in the following table.







Users store data In the following locations:

• SharePoint sites

• OneDrive accounts

• Exchange email

• Exchange public folders

• Teams chats

• Teams channel messages

When users in the research department create documents, they must add a 10-dig>t project code to each document. Project codes that start with the digits 999 are confidential.



SharePoint Online Environment

Contoso has four Microsoft SharePoint Online sites named Site1. Site2. Site3. and Site4.

Site2 contains the files shown in the following table.





Two users named User1 and User2 are assigned roles for Site2 as shown in the following table.





Sile3 stores documents related to the company's projects. The documents are organized In a folder hierarchy based on the project.



Slte4 has the following two retention policies applied:

• Name: SitetKetentionPolicy1

• Locations to apply the policy: Site4

• Delete items older than:2 years

• Delete content based on: When items were created

• Name: Site4RetentionPolicy2

• Locations to apply the policy. Sile4

• Retain items for a specific period: 4 years

• Start the retention period based on: When items were created

• At the end of the retention period: Do nothing



Problem Statements

Management at Contoso is concerned about data leaks. On several occasions, confidential research departments were leaked.



Planned Changes

Contoso plans to create the following data loss prevention (DLP) policy:

• Name: DLPpolicy1

• Locations to apply the policy; Site2

• Conditions:

• Content contains any of these sensitive info types: SWIF F Code

• Instance count: 2 to any

• Actions: Restrict access to the content



Technical Requirements

Contoso must meet the following technical requirements:

• All administrative users must be able to review DLP reports.

• Whenever possible, the principle of least privilege must be used.

• For all users, all Microsoft 365 data must be retained for at least one year.

• Confidential documents must be detected and protected by using Microsoft 365.

• Site1 documents that include credit card numbers must be labeled automatically.

• All administrative users must be able to create Microsoft 365 sensitivity labels.

• After a project is complete, the documents in Site3 that relate to the project must be retained for 10 years



You need to meet the technical requirements for the Site3 documents.

What should you create?

9. You have a Microsoft 365 E5 tenant that contains the policies shown in the following table.





A file named File1 has all the policies applied.

How long will File1 be retained?

10. HOTSPOT

You need to implement an information compliance policy to meet the following requirements:

Documents that contain passport numbers from the United States, Germany, Australia, and Japan must be identified automatically.

When a user attempts to send an email or an attachment that contains a passport number, the user must receive a tooltip in Microsoft Outlook.

Users must be blocked from using Microsoft SharePoint Online or OneDrive for Business to share a document that contains a passport number.

What is the minimum number of sensitivity labels and auto-labeling policies you should create? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.




 

TAGS:

Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Related

Posts