ExamGecko
Home Home / Microsoft / SC-400

Microsoft SC-400 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











You have a Microsoft OneDrive for Business folder that contains the files shown in the following table.

In Microsoft Cloud App Security, you create a file policy to automatically apply a classification.

What is the effect of applying the policy?

A.

The policy will apply to only the .docx and .txt files. The policy will classify the files within 24 hours.

A.

The policy will apply to only the .docx and .txt files. The policy will classify the files within 24 hours.

Answers
B.

The policy will apply to all the files. The policy will classify only 100 files daily.

B.

The policy will apply to all the files. The policy will classify only 100 files daily.

Answers
C.

The policy will apply to only the .docx files. The policy will classify only 100 files daily.

C.

The policy will apply to only the .docx files. The policy will classify only 100 files daily.

Answers
D.

The policy will apply to only the .docx and .txt files. The policy will classify the files immediately.

D.

The policy will apply to only the .docx and .txt files. The policy will classify the files immediately.

Answers
Suggested answer: C

Explanation:

Reference: https://docs.microsoft.com/en-us/cloud-app-security/azip-integration

You are implementing a data classification solution.

The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort.

What should you do?

A.

Create a custom classifier.

A.

Create a custom classifier.

Answers
B.

Create a sensitive info type that uses Exact Data Match (EDM).

B.

Create a sensitive info type that uses Exact Data Match (EDM).

Answers
C.

Use the source code classifier.

C.

Use the source code classifier.

Answers
D.

Create a sensitive info type that uses a regular expression.

D.

Create a sensitive info type that uses a regular expression.

Answers
Suggested answer: C

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-learn-about?view=o365-worldwide

You have a new Microsoft 365 tenant.

You need to ensure that custom trainable classifiers can be created in the tenant.

To which role should you be assigned to perform the configuration?

A.

Security administrator

A.

Security administrator

Answers
B.

Security operator

B.

Security operator

Answers
C.

Global administrator

C.

Global administrator

Answers
D.

Compliance administrator

D.

Compliance administrator

Answers
Suggested answer: D

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-get-started-with?view=o365-worldwide

You need to automatically apply a sensitivity label to documents that contain information about your company's network including computer names, IP addresses, and configuration information.

Which two objects should you use? Each correct answer presents part of the solution. (Choose two.)

NOTE: Each correct selection is worth one point.

A.

an Information protection auto-labeling policy

A.

an Information protection auto-labeling policy

Answers
B.

a custom trainable classifier

B.

a custom trainable classifier

Answers
C.

a sensitive info type that uses a regular expression

C.

a sensitive info type that uses a regular expression

Answers
D.

a data loss prevention (DLP) policy

D.

a data loss prevention (DLP) policy

Answers
E.

a sensitive info type that uses keywords

E.

a sensitive info type that uses keywords

Answers
F.

a sensitivity label that has auto-labeling

F.

a sensitivity label that has auto-labeling

Answers
Suggested answer: A, B

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-learn-about?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwide

You are creating a custom trainable classifier to identify organizational product codes referenced in Microsoft 365 content.

You identify 300 files to use as seed content.

Where should you store the seed content?

A.

a Microsoft SharePoint Online folder

A.

a Microsoft SharePoint Online folder

Answers
B.

a Microsoft OneDrive for Business folder

B.

a Microsoft OneDrive for Business folder

Answers
C.

an Azure file share

C.

an Azure file share

Answers
D.

Microsoft Exchange Online shared mailbox

D.

Microsoft Exchange Online shared mailbox

Answers
Suggested answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-get-started-with?view=o365-worldwide

Each product group at your company must show a distinct product logo in encrypted emails instead of the standard Microsoft Office 365 logo.

What should you do to create the branding templates?

A.

Create a Transport rule.

A.

Create a Transport rule.

Answers
B.

Create an RMS template.

B.

Create an RMS template.

Answers
C.

Run the Set-IRMConfiguration cmdlet.

C.

Run the Set-IRMConfiguration cmdlet.

Answers
D.

Run the New-OMEConfiguration cmdlet.

D.

Run the New-OMEConfiguration cmdlet.

Answers
Suggested answer: D

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/add-your-organization-brand-to-encrypted-messages?view=o365-worldwide

You create a custom sensitive info type that uses Exact Data Match (EDM).

You plan to periodically update and upload the data used for EDM.

What is the maximum frequency with which the data can be uploaded?

A.

twice per week

A.

twice per week

Answers
B.

twice per day

B.

twice per day

Answers
C.

once every six hours

C.

once every six hours

Answers
D.

once every 48 hours

D.

once every 48 hours

Answers
E.

twice per hour

E.

twice per hour

Answers
Suggested answer: B

Explanation:

You can upload data with the EDMUploadAgent to any given data store only twice per day.Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/sit-get-started-exact-data-match-hash-upload?view=o365-worldwide

A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx.

From the Cloud App Security portal, you discover the alert shown in the exhibit.

You restore the file from quarantine.

You need to prevent files that match the policy from being quarantined. Files that match the policy must generate an alert.

What should you do?

A.

Modify the policy template.

A.

Modify the policy template.

Answers
B.

Assign the Global reader role to the file owners.

B.

Assign the Global reader role to the file owners.

Answers
C.

Exclude file matching by using a regular expression.

C.

Exclude file matching by using a regular expression.

Answers
D.

Update the governance action.

D.

Update the governance action.

Answers
Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/data-protection-policies#create-a-new-file-policy

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

A.

a JSON file that has an element for each word

A.

a JSON file that has an element for each word

Answers
B.

an ACCDB database file that contains a table named Dictionary

B.

an ACCDB database file that contains a table named Dictionary

Answers
C.

an XML file that contains a keyword tag for each word

C.

an XML file that contains a keyword tag for each word

Answers
D.

a CSV file that contains words separated by commas

D.

a CSV file that contains words separated by commas

Answers
Suggested answer: D

Explanation:

The keywords for your dictionary could come from various sources, most commonly from a file (such as a .csv or .txt list) imported in the service or by PowerShell cmdlet.

Note: This question can have various other incorrect answers in the exam, including:

a TSV file that contains words separated by tabs

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/create-a-keyword-dictionary?view=o365-worldwide

You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.

A user named User1 sends link-based, branded emails that are encrypted by using Microsoft Office 365 Advanced Message Encryption to the recipients shown in the following table.

For which recipients can User1 revoke the emails?

A.

Recipient4 only

A.

Recipient4 only

Answers
B.

Recipient1 only

B.

Recipient1 only

Answers
C.

Recipient1, Recipient2, Recipient3, and Recipient4

C.

Recipient1, Recipient2, Recipient3, and Recipient4

Answers
D.

Recipient3 and Recipient4 only

D.

Recipient3 and Recipient4 only

Answers
E.

Recipient1 and Recipient2 only

E.

Recipient1 and Recipient2 only

Answers
Suggested answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/revoke-ome-encrypted-mail?view=o365-worldwide

Total 293 questions
Go to page: of 30