Easter Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

SC-401 Administering Information Security in Microsoft 365 Questions and Answers

Questions 4

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

SC-401 Question 4

You plan to create a Microsoft Purview insider risk management case named Case1.

Which insider risk management object should you select first, and which users will be added as contributors for Case1 by default?

To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 4

Options:

Buy Now
Questions 5

You have a Microsoft SharePoint Online site named Site1 that contains a document library. The library contains more than 1,000 documents. Some of the documents are job applicant resumes. All the documents are in the English language.

You plan to apply a sensitivity label automatically to any document identified as a resume. Only documents that contain work experience, education, and accomplishments must be labeled automatically.

You need to identify and categorize the resumes. The solution must minimize administrative effort.

What should you include in the solution?

Options:

A.

a trainable classifier

B.

a keyword dictionary

C.

a function

D.

an exact data match (EDM) classifier

Buy Now
Questions 6

You have a Microsoft 365 E5 subscription that contains a retention policy named RP1 as shown in the following table.

SC-401 Question 6

You place a preservation lock on RP1.

You need to modify RP1.

Which two modifications can you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Add locations to the policy.

B.

Delete the policy.

C.

Remove locations from the policy.

D.

Decrease the retention period of the policy.

E.

Disable the policy.

F.

Increase the retention period of the policy.

Buy Now
Questions 7

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

Options:

A.

an XLSX file that contains one word in each cell of the first row

B.

an XML file that contains a keyword tag for each word

C.

an ACCDB database file that contains a table named Dictionary

D.

a text file that has one word on each line

Buy Now
Questions 8

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Buy Now
Questions 9

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-401 Question 9

Options:

Buy Now
Questions 10

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-401 Question 10

Options:

Buy Now
Questions 11

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Buy Now
Questions 12

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 12

Options:

Buy Now
Questions 13

You have a data loss prevention (DLP) policy configured for endpoints as shown in the following exhibit.

SC-401 Question 13

From a computer named Computer1, a user can sometimes upload files to cloud services and sometimes cannot. Other users experience the same issue.

What are two possible causes of the issue? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

The unallowed browsers in the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings are NOT configured.

B.

There are file path exclusions in the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings.

C.

The Access by restricted apps action is set to Audit only.

D.

The Copy to clipboard action is set to Audit only.

E.

The computers are NOT onboarded to Microsoft Purview.

Buy Now
Questions 14

You have a Microsoft 365 E5 subscription.

You need to prevent users from uploading data loss prevention (DLP)-protected documents to the following third-party websites:

● web1.contoso.com

● web2.contoso.com

The solution must minimize administrative effort.

To what should you set the Service domains setting for Endpoint DLP?

Options:

A.

*.contoso.com

B.

contoso.com

C.

web1.contoso.com and web2.contoso.com

D.

web*.contoso.com

Buy Now
Questions 15

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage Account keys in plain text to third parties.

You need to ensure that when Azure Storage Account keys are emailed, the emails are encrypted.

Solution: You create a data loss prevention (DLP) policy that has only the Exchange email location selected.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 16

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

SC-401 Question 16

Which users will Microsoft Purview insider risk management flag as potential high-impact users?

Options:

A.

User1 and User2 only

B.

User2 and User3 only

C.

User1, User2, and User3 only

D.

User1, User2, User3, and User4

Buy Now
Questions 17

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage Account keys in plain text to third parties.

You need to ensure that when Azure Storage Account keys are emailed, the emails are encrypted.

Solution: You configure a mail flow rule that matches the text patterns.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Exam Code: SC-401
Exam Name: Administering Information Security in Microsoft 365
Last Update: Apr 16, 2025
Questions: 72

PDF + Testing Engine

$52.5  $174.99

Testing Engine

$40.5  $134.99
buy now SC-401 testing engine

PDF (Q&A)

$34.5  $114.99
buy now SC-401 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 19 Apr 2025