Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

SC-400 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SC-400 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Microsoft Information Protection Administrator
  • Last Update: May 18, 2024
  • Questions and Answers: 261
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SC-400 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SC-400 Practice Exam Questions with Answers Microsoft Information Protection Administrator Certification

Question # 6

You need to recommend a solution that meets the executive requirements. What should you recommend?

A.

From the Microsoft 365 compliance center, create a retention policy.

B.

From the Exchange admin center, enable archive mailboxes.

C.

From the Microsoft 365 compliance center, create a retention label.

D.

From the Microsoft 365 compliance center, create a DLP policy.

Full Access
Question # 7

You need to implement a solution that meets the compliance requirements for the Windows 10 computers.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each coned selection is worth one point.

A.

Deploy a Microsoft 36S Endpoint data loss prevention (Endpoint DLP) configuration package to the computers.

B.

Configure hybrid Azure AD join for all the computers.

C.

Configure the Microsoft Intune device enrollment settings.

D.

Configure a compliance policy in Microsoft Intune.

E.

Enroll the computers in Microsoft Defender for Endpoint protection.

Full Access
Question # 8

You need to recommend a solution that meets the compliance requirements for viewing DLP tooltip

justifications.

What should you recommend?

A.

Instruct the compliance department users to review the False positive and override report.

B.

Configure a Microsoft Power Automate workflow to route DLP notification emails to the compliance

department.

C.

Instruct the compliance department users to review the DLP incidents report.

D.

Configure an Azure logic app to route DLP notification emails to the compliance department.

Full Access
Question # 9

You need to implement a solution to encrypt email. The solution must meet the compliance requirements.

What should you create in the Exchange admin center and the Microsoft 36.S compliance center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 10

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder.

What should you configure in the Microsoft Purview compliance portal?

A.

a content scan job

B.

a Content Search query

C.

an auto-labeling policy

D.

a DLP policy

Full Access
Question # 11

You need to recommend a solution to configuration the Microsoft 365 Records management settings by using the CSV file must meet the compliance requirements.

What should you recommend?

A.

From the Microsoft 365 compliance center, import the CSV file to a file plan.

B.

Use EdmUploadAgent.exe to upload a hash of the CSV to a datastore.

C.

Use a PowerShell command that pipes the import csv cmdlet to the New-RetentionPolicy cmdlet.

D.

Use a PowerShell command that pipes the import-csv cmdlet to the New-Label cmdlet.

Full Access
Question # 12

You need to recommend a solution that meets the compliance requirements for Dropbox.

What should you recommend?

A.

Create a DLP policy that applies to devices.

B.

Create a file policy in Microsoft Defender for Cloud Apps that uses the built-in DLP inspection method.

C.

Create a retention label that enforces the item deletion settings.

D.

Edit an existing retention label that enforces the item deletion settings.

Full Access
Question # 13

How many files in Site2 will be visible to User1 and User2 after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 14

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-400 question answer

Full Access
Question # 15

You need to meet the technical requirements for the Site3 documents.

What should you create?

A.

a retention label policy and a retention label that uses an event

B.

a sensitive info type that uses a dictionary and a sensitivity label

C.

a sensitive info type that uses a regular expression and a sensitivity label

D.

a retention policy that has Only delete items when they reach a certain age selected

Full Access
Question # 16

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you grant the Sensitivity label administrator role?

A.

Admin1, Admin2, Admin4, and Admin5 only

B.

Admin1, Admin2, and Admin3 only

C.

Admin1 only

D.

Admin1 and Admin4 only

E.

Admin1 and Admin5 only

Full Access
Question # 17

You need to recommend an information governance solution that meets the HR requirements for handling employment applications and resumes.

What is the minimum number of information governance solution components that you should create? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 18

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder. What should you recommend?

A.

From the Microsoft 365 compliance center, configure a DLP policy.

B.

From the Microsoft 365 compliance center, configure a Content Search query.

C.

From the Microsoft 365 compliance center, configure an auto-labeling policy.

D.

From Azure Information Protection, configure a content scan job.

Full Access
Question # 19

You need to recommend a solution that meets the sales requirements.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-400 question answer

Full Access
Question # 20

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 21

You need to meet the technical requirements for the confidential documents.

What should you created first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 22

You need to meet the technical requirements for the creation of the sensitivity labels. Which administrative users are currently missing the Sensitivity label administrator role?

A.

Admin1 only

B.

Admm1, Admin2, Admin4, and Admin5 only

C.

Admin 1. Admin2, and Admin3 only

D.

Admin 1 and Admin5 only

E.

Admin 1 and Admin4 only

Full Access
Question # 23

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth is worth one point.

SC-400 question answer

Full Access
Question # 24

You are evaluating the technical requirements for the DLP reports.

Which user can currently view the DLP reports?

A.

Admin4

B.

Admin1

C.

Admin5

D.

Admin2

E.

Admin3

Full Access
Question # 25

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 E5 subscription.

You need to identify resumes that are stored in the subscription by using a built-in trainable classifier.

Solution: You create an auto-labeling policy for a sensitivity label.

Does this meet the goal?

A.

Yes

B.

NO

Full Access
Question # 26

You have a Microsoft 365 E5 tenant and the Windows 10 devices shown in the following table.

SC-400 question answer

To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?

A.

Device1, Device3, and Device4 only

B.

Device1, Device2, Device3, and Device4

C.

Device1 and Device2 only

D.

Device1 and Device3 only

E.

Device1 only

Full Access
Question # 27

You need to create a retention policy to retain all the files from Microsoft Teams channel conversations and private chats.

Which two locations should you select in the retention policy? Each correct answer present part of the solution.

NOTE: Each correct selection is worth one point.

A.

Team channel messages

B.

OneDrive accounts

C.

SharePoint sites

D.

Exchange email

E.

Office 365 groups

F.

Team chats

Full Access
Question # 28

You have a Microsoft 365 tenant that uses trainable classifiers.

You are creating a custom trainable classifier.

You collect 300 sample file types from various geographical locations to use as seed content. Some of the file samples are encrypted.

You organize the files into categories as shown in the following table.

SC-400 question answer

Which file categories can be used as seed content?

A.

Category4 and Category5 only

B.

Category4 and Category6 only

C.

Category3. and Category5 only

D.

Category1 and Category3 only

Full Access
Question # 29

You plan to create a custom sensitive information type that will use Exact Data Match (EDM).

You need to identify what to upload to Microsoft 365, and which tool to use for the upload.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 30

You have a Microsoft 365 E5 subscription that contains the adaptive scopes shown in the following table.

SC-400 question answer

You create the retention policies shown in the following table.

SC-400 question answer

Which retention policies support a preservation lock?

A.

RPolicy2only

B.

RPolicy3only

C.

RPolicy1l and RPolicy2 only

D.

RPolicy1 and RPolicy3 only

E.

RPolicy1, RPolicy2, and RPolicy3

Full Access
Question # 31

You have a Microsoft 365 tenant named contoso.com that contains two users named User1 and User2. The tenant uses Microsoft Office 365 Message Encryption (OME).

User1 plans to send emails that contain attachments as shown in the following table.

SC-400 question answer

User2 plans to send emails that contain attachments as shown in the following table.

SC-400 question answer

For which emails will the attachments be protected? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 32

You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.

You create the audit retention policies shown in the following table.

SC-400 question answer

The users perform the following actions:

• User1 renames a Microsoft SharePoint Online site.

• User2 sends an email message.

How long will the audit log records be retained for each action? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 33

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD).

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You enroll the computers in Microsoft intune.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 34

You have a Microsoft 365 tenant that contains a Microsoft SharePoint Online site named Site1.

You have the users shown in the following table.

SC-400 question answer

You create a data loss prevention (DLP) policy for Site1 that detects credit card number information. You configure the policy to use the following protection action:

  • When content matches the policy conditions, show policy tips to users and send them an email notification.

You use the default notification settings.

To Site1, User1 uploads a file that contains a credit card number.

Which users receive an email notification?

A.

Used and User2 only

B.

Used and User4 only

C.

Used, User2, User3, and User4

D.

Used only

E.

Used and User3 only

Full Access
Question # 35

You receive an email that contains a list of words that will be used few a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

A.

an XLSX file that contains one word in each cell of the first row

B.

a ISV file that contains words separated by tabs

C.

a JSON file that that an element tor each word

D.

a text file that has one word on each line

Full Access
Question # 36

You have a data loss prevention (DLP) policy configured for endpoints as shown in the following exhibit.

SC-400 question answer

From a computer named Computer1, 3 user can sometimes upload files to cloud services and sometimes cannot. Other users experience the same issue. What are two possible causes of the issue? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

The Access by unallowed apps action is set to Audit only.

B.

The computers are NOT onboarded to the Microsoft 365 compliance center.

C.

The Copy to clipboard action is set to Audit only.

D.

There are file path exclusions in the Microsoft 365 Endpoint data loss prevention (Endpoint DIP) settings.

E.

The unallowed browsers in the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings are NOT configured.

Full Access
Question # 37

You are creating a custom trainable classifier to identify organizational product codes referenced in Microsoft

365 content.

You identify 300 files to use as seed content.

Where should you store the seed content?

A.

a Microsoft SharePoint Online folder

B.

a Microsoft OneDrive for Business folder

C.

an Azure file share

D.

Microsoft Exchange Online shared mailbox

Full Access
Question # 38

You have Microsoft 365 E5 subscription that uses data loss prevention (DLP) to protect sensitive information.

You have a document named Form.docx.

You plan to use PowerShell to create a document fingerprint based on Form.docx.

You need to first connect to the subscription.

Which cmdlet should you run?

A.

Connect-SPOService

B.

Connect-IPPSSession

C.

Connect-AzureAD

D.

Connect-ExchangeOnline

Full Access
Question # 39

You have a Microsoft 365 subscription.

In Microsoft Exchange Online, you configure the mail flow rule shown in the following exhibit.

SC-400 question answer

SC-400 question answer

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

SC-400 question answer

Full Access
Question # 40

You need to test Microsoft Office 365 Message Encryption (OME) capabilities for your company. The test must

verify the following information:

The acquired default template names

The encryption and decryption verification status

Which PowerShell cmdlet should you run?

A.

Test-ClientAccessRule

B.

Test-Mailflow

C.

Test-OAuthConnectivity

D.

Test-IRMConfiguration

Full Access
Question # 41

Task 5

You need to ensure that a group named U.S. Sales can store files containing information subject to General Data Protection Regulation (GDPR) in their OneDrive accounts. All other current GDPR restrictions must remain in effect.

Full Access
Question # 42

Task 9

You are investigating a data breach.

You need to retain all Microsoft Exchange items in the mailbox of Alex Wilber that contain the word Falcon and were created in the year 2021.

Full Access
Question # 43

Task 8

You need to retain Microsoft SharePoint files that contain the word Falcon for two years from the date they were created, and then delete them.

Full Access
Question # 44

Task 7

You need to create a retention policy that meets the following requirements:

• Applies to Microsoft Teams chat and Teams channel messages of users that have a department attribute of Sales.

• Retains item for five years from the date they are created, and then deletes them.

Full Access
Question # 45

Task 4

You need to block users from sending emails containing information that is subject to Payment Card Industry Data Security Standard (PCI OSS). The solution must affect only emails.

Full Access
Question # 46

Task 10

You plan to create a data loss prevention (DLP) policy that will apply to content containing the following keywords:

• Tailspin

• litware

• Falcon

You need to create a keyword list that can be used in the DLP policy. You do NOT need to create the DLP policy at this time.

Full Access
Question # 47

Task 1

You need to provide users with the ability to manually classify files that contain product information that are stored in SharePoint Online sites. The solution must meet the following requirements:

• The users must be able to apply a classification of Product1 to the files.

• Any authenticated user must be able to open files classified as Product1.

• files classified as Product1 must be encrypted.

Full Access
Question # 48

Task 6

You plan to implement Endpoint data loss prevention (Endpoint DLP) policies for computers that run Windows.

Users have an application named App1 that stores data locally in a folder named C:\app1\data.

You need to prevent the folder from being monitored by Endpoint DLP.

Full Access
Question # 49

Task 2

You discover that all users can apply the Confidential - Finance label.

You need to ensure that the Confidential - Finance label is available only to the members of the Finance Team group.

Full Access
Question # 50

Task 3

You plan to automatically apply a watermark to the document1 of a project named Falcon.

You need to create a label that will add a watermark of "Project falcon' in red. size-12 font diagonally across the documents.

Full Access