ExamGecko
Home / Microsoft / SC-400 / List of questions
Ask Question

Microsoft SC-400 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

HOTSPOT

You have a data loss prevention (DLP) policy that has the advanced DLP rules shown in the following table.

Microsoft SC-400 image Question 21 108415 10052024010922000000

You need to identify which rules will apply when content matches multiple advanced DLP rules.

Which rules should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft SC-400 image Question 21 108415 10052024010922000
Correct answer: Microsoft SC-400 image answer Question 21 108415 10052024010922000
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide

asked 05/10/2024
Scott Wells
48 questions

Question 22

Report Export Collapse

You need to be alerted when users share sensitive documents from Microsoft One Drive to any users outside your company.

What should you do?

From the Microsoft 365 compliance center, create a data loss prevention (DLP) policy.

From the Microsoft 365 compliance center, create a data loss prevention (DLP) policy.

From the Microsoft 365 compliance center, start a data investigation.

From the Microsoft 365 compliance center, start a data investigation.

From the Microsoft 365 compliance center, create an insider risk policy.

From the Microsoft 365 compliance center, create an insider risk policy.

From the Cloud App Security portal, create an activity policy.

From the Cloud App Security portal, create an activity policy.

Suggested answer: A
Explanation:

With a DLP policy, you can identify, monitor, and automatically protect sensitive items.

Note:

There are several versions of this question in the exam. The question has two possible correct answers:

1. From the Microsoft 365 compliance center, create a data loss prevention (DLP) policy.

2. From the Cloud App Security portal, create a file policy.

Other incorrect answer options you may see on the exam include the following:

From the Exchange admin center, create a data loss prevention (DLP) policy.

From the Microsoft 365 compliance center, create an insider risk policy. From the Azure portal, create an Azure

Information Protection policy.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

asked 05/10/2024
Dirk Prinsloo
40 questions

Question 23

Report Export Collapse

You need to protect documents that contain credit card numbers from being opened by users outside your company. The solution must ensure that users at your company can open the documents.

What should you use?

a sensitivity label policy

a sensitivity label policy

a sensitivity label

a sensitivity label

a retention policy

a retention policy

a data loss prevention (DLP) policy

a data loss prevention (DLP) policy

Suggested answer: D
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

asked 05/10/2024
Paul Pinero
39 questions

Question 24

Report Export Collapse

You have a Microsoft 365 tenant that contains a Microsoft SharePoint Online site named Site1.

You have the users shown in the following table.

Microsoft SC-400 image Question 24 108418 10052024010922000000

You create a data loss prevention (DLP) policy for Site1 that detects credit card number information. You configure the policy to use the following protection action:

When content matches the policy conditions, show policy tips to users and send them an email notification.

You use the default notification settings.

To Site1, User1 uploads a file that contains a credit card number.

Which users receive an email notification?

User1 and User2 only

User1 and User2 only

User1 and User4 only

User1 and User4 only

User1, User2, User3, and User4

User1, User2, User3, and User4

User1 only

User1 only

User1 and User3 only

User1 and User3 only

Suggested answer: D
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-the-default-dlp-policy?view=o365-worldwide

asked 05/10/2024
Frans Gafane
37 questions

Question 25

Report Export Collapse

You have a data loss prevention (DLP) policy that applies to the Devices location. The policy protects documents that contain United States passport numbers.

Users report that they cannot upload documents to a travel management website because of the policy.

You need to ensure that the users can upload the documents to the travel management website. The solution must prevent the protected content from being uploaded to other locations.

Which Microsoft 365 Endpoint data loss prevention (Endpoint DLP) setting should you configure?

Unallowed browsers

Unallowed browsers

File path exclusions

File path exclusions

Unallowed apps

Unallowed apps

Service domains

Service domains

Suggested answer: D
Explanation:

You can control whether sensitive files protected by your policies can be uploaded to specific service domains from Microsoft Edge.

If the list mode is set to Block, then user will not be able to upload sensitive items to those domains. When an upload action is blocked because an item matches a DLP policy, DLP will either generate a warning or block the upload of the sensitive item.

If the list mode is set to Allow, then users will be able to upload sensitive items only to those domains, and upload access to all other domains is not allowed.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwide

asked 05/10/2024
Tiziano Riezzo
59 questions

Question 26

Report Export Collapse

You have a Microsoft 365 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.

Microsoft SC-400 image Question 26 108420 10052024010922000000

You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).

Which devices support Endpoint DLP?

Device5 only

Device5 only

Device2 only

Device2 only

Device1, Device2, Device3, Device4, and Device5

Device1, Device2, Device3, Device4, and Device5

Device3 and Device4 only

Device3 and Device4 only

Device1 and Device2 only

Device1 and Device2 only

Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwide

asked 05/10/2024
Veridjan Hoxha
46 questions

Question 27

Report Export Collapse

A compliance administrator recently created several data loss prevention (DLP) policies.

After the policies are created, you receive a higher than expected volume of DLP alerts.

You need to identify which rules are generating the alerts.

Which DLP report should you use?

Third-party DLP policy matches

Third-party DLP policy matches

DLP policy matches

DLP policy matches

DLP incidents

DLP incidents

False positive and override

False positive and override

Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

asked 05/10/2024
Maksim Alpatov
50 questions

Question 28

Report Export Collapse

HOTSPOT

You have a Microsoft 365 tenant that uses data loss prevention (DLP) to protect sensitive information.

You create a new custom sensitive info type that has the matching element shown in the following exhibit.

Microsoft SC-400 image Question 28 108422 10052024010922000000

The supporting elements are configured as shown in the following exhibit.

Microsoft SC-400 image Question 28 108422 10052024010922000000

The confidence level and character proximity are configured as shown in the following exhibit.

Microsoft SC-400 image Question 28 108422 10052024010922000000

For each of the following statements, select Yes if statement is true. Otherwise, select No

NOTE: Each correct selection is worth one point.


Microsoft SC-400 image Question 28 108422 10052024010922000
Correct answer: Microsoft SC-400 image answer Question 28 108422 10052024010922000
Explanation:

Note: The regular expression has a starts with (^) and ends with ($) metacharacter and will not match any of the sentences. Without the starts with (^) metacharacter the first and second sentences would match and the supporting element (Employee ID) would be within 100 character proximity.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/create-a-custom-sensitive-information-type?view=o365-worldwide

asked 05/10/2024
Elham Alasmari
42 questions

Question 29

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Cloud App Security portal, you create an app discovery policy.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:

You can create app discovery policies to alert you when new apps are detected within your organization.

Use the unallowed apps list instead.

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/cloud-discovery-policies

https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwide

asked 05/10/2024
Christophe Troessaert
43 questions

Question 30

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add a folder path to the file path exclusions.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:

Folder path to the file path exclusions excludes certain paths and files from DLP monitoring.

Use the unallowed apps list instead.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwide

asked 05/10/2024
giancarlo bagnetti srl
46 questions
Total 328 questions
Go to page: of 33
Search

Related questions