Microsoft SC-400 Practice Test - Questions Answers, Page 8
List of questions
Related questions
You have a Microsoft OneDrive for Business folder that contains the files shown in the following table.
In Microsoft Cloud App Security, you create a file policy to automatically apply a classification.
What is the effect of applying the policy?
The policy will apply to only the .docx and .txt files. The policy will classify the files within 24 hours.
The policy will apply to all the files. The policy will classify only 100 files daily.
The policy will apply to only the .docx files. The policy will classify only 100 files daily.
The policy will apply to only the .docx and .txt files. The policy will classify the files immediately.
You are implementing a data classification solution.
The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort.
What should you do?
Create a custom classifier.
Create a sensitive info type that uses Exact Data Match (EDM).
Use the source code classifier.
Create a sensitive info type that uses a regular expression.
You have a new Microsoft 365 tenant.
You need to ensure that custom trainable classifiers can be created in the tenant.
To which role should you be assigned to perform the configuration?
Security administrator
Security operator
Global administrator
Compliance administrator
You need to automatically apply a sensitivity label to documents that contain information about your company's network including computer names, IP addresses, and configuration information.
Which two objects should you use? Each correct answer presents part of the solution. (Choose two.)
NOTE: Each correct selection is worth one point.
an Information protection auto-labeling policy
a custom trainable classifier
a sensitive info type that uses a regular expression
a data loss prevention (DLP) policy
a sensitive info type that uses keywords
a sensitivity label that has auto-labeling
You are creating a custom trainable classifier to identify organizational product codes referenced in Microsoft 365 content.
You identify 300 files to use as seed content.
Where should you store the seed content?
a Microsoft SharePoint Online folder
a Microsoft OneDrive for Business folder
an Azure file share
Microsoft Exchange Online shared mailbox
Each product group at your company must show a distinct product logo in encrypted emails instead of the standard Microsoft Office 365 logo.
What should you do to create the branding templates?
Create a Transport rule.
Create an RMS template.
Run the Set-IRMConfiguration cmdlet.
Run the New-OMEConfiguration cmdlet.
You create a custom sensitive info type that uses Exact Data Match (EDM).
You plan to periodically update and upload the data used for EDM.
What is the maximum frequency with which the data can be uploaded?
twice per week
twice per day
once every six hours
once every 48 hours
twice per hour
A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx.
From the Cloud App Security portal, you discover the alert shown in the exhibit.
You restore the file from quarantine.
You need to prevent files that match the policy from being quarantined. Files that match the policy must generate an alert.
What should you do?
Modify the policy template.
Assign the Global reader role to the file owners.
Exclude file matching by using a regular expression.
Update the governance action.
You receive an email that contains a list of words that will be used for a sensitive information type.
You need to create a file that can be used as the source of a keyword dictionary.
In which format should you save the list?
a JSON file that has an element for each word
an ACCDB database file that contains a table named Dictionary
an XML file that contains a keyword tag for each word
a CSV file that contains words separated by commas
You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.
A user named User1 sends link-based, branded emails that are encrypted by using Microsoft Office 365 Advanced Message Encryption to the recipients shown in the following table.
For which recipients can User1 revoke the emails?
Recipient4 only
Recipient1 only
Recipient1, Recipient2, Recipient3, and Recipient4
Recipient3 and Recipient4 only
Recipient1 and Recipient2 only
Question