ExamGecko
Home Home / Microsoft / SC-400

Microsoft SC-400 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You need to prevent users in the finance department from sharing files with users in the research department. Which type of policy should you configure?

A.

communication compliance

A.

communication compliance

Answers
B.

information barrier

B.

information barrier

Answers
C.

Conditional Access

C.

Conditional Access

Answers
D.

insider risk management

D.

insider risk management

Answers
Suggested answer: B

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the users and groups shown in the following table.

You create the communication compliance policy as shown in the exhibit. (Click the Exhibit tab.)

Four emails are sent as shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 222
Correct answer: Question 222

HOTSPOT

You have a hybrid Microsoft 365 deployment that contains the users shown in the following table.

You need to perform an eDiscovery content search.

Which user's data can be included in the content search? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 223
Correct answer: Question 223

HOTSPOT

You have a Microsoft 365 subscription that has Enable Security defaults set to No in Azure AD.

You have a custom compliance manager template named Regulation1.

You have the assessments shown in the following table.

Assessment1 has the improvement actions shown in the following table.

Assessment2 has the improvement actions shown in the following table.

You perform the following actions:

* For Assessment2, change the Test status of Establish a threat intelligence program to Implemented.

* Enable multi-factor authentication (MFA) for all users.

* Configure a privileged access policy.

For each of the following statements, select Yes if the statement is true. Otherwise select No.

NOTE: Each correct selection is worth one point.


Question 224
Correct answer: Question 224

You have a Microsoft 365 E5 subscription that contains the resources shown in the following table.

You have a retention label configured as shown in the following exhibit.

You apply the label to the resources.

Which items can you delete?

A.

Mail1 only

A.

Mail1 only

Answers
B.

Filel.docx and File2.xlsx only

B.

Filel.docx and File2.xlsx only

Answers
C.

Mail1 and Filel.docx only

C.

Mail1 and Filel.docx only

Answers
D.

Mail1 and File2.xlsx only

D.

Mail1 and File2.xlsx only

Answers
E.

Mail1, Filel.docx, and File2.xlsx

E.

Mail1, Filel.docx, and File2.xlsx

Answers
Suggested answer: E

You have a Microsoft 365 tenant that has data loss prevention (DLP) policies.

You need to review DLP policy matches for the tenant.

What should you use?

A.

Content explorer

A.

Content explorer

Answers
B.

Activity explorer

B.

Activity explorer

Answers
C.

Compliance Manager

C.

Compliance Manager

Answers
D.

records management events

D.

records management events

Answers
Suggested answer: B

You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.

On January 1, you create the sensitivity label shown in the following table.

On January 2, you publish Label1 to User1.

On January 3, User1 creates a Microsoft Word document named Doc1 and applies Label1 to the document.

On January 4, User2 edits Doc1.

On January 15, you increase the content expiry period for Label1 to 28 days.

When will access to Doc1 expire for User2?

A.

January 23

A.

January 23

Answers
B.

January 24

B.

January 24

Answers
C.

January 25

C.

January 25

Answers
D.

January 31

D.

January 31

Answers
Suggested answer: C

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From Microsoft Defender for Cloud Apps, you create an app discovery policy.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

HOTSPOT

You have a Microsoft 365 subscription.

You are creating a retention policy named Retention1 as shown in the exhibit. (Click the Exhibit tab.)

You apply Retention1 to SharePoint sites and OneDrive accounts.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.


Question 229
Correct answer: Question 229

HOTSPOT

You have a Microsoft 365 subscription that uses an Azure AD tenant named contoso.com.

OneDrive stores files that are shared with external users. The files are configured as shown in the following table.

You create a data loss prevention (DLP) policy that applies to the content stored in OneDrive accounts. The policy contains the following three rules:

Rule1:

* Conditions: Label1. Detect content that's shared with people outside my organization

* Actions: Restrict access to the content for external users

* User notifications: Notify the user who last modified the content

* User overrides: On

* Priority: 0

Rule2:

* Conditions: Label! or Label2

* Actions: Restrict access to the content

* Priority: 1

Rule3:

* Conditions: Label2. Detect content that's shared with people outside my organization

* Actions: Restrict access to the content for external users

* User notifications: Notify the user who last modified the content

* User overrides: On

* Priority: 2

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 230
Correct answer: Question 230
Total 293 questions
Go to page: of 30