This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Tue Dec 3 17:29:33 2024 / +0000 GMT ___________________________________________________ Title: [April-2023]SC-400 PDF Dumps SC-400 172Q Instant Download in Braindump2go[Q87-Q117] --------------------------------------------------- April/2023 Latest Braindump2go SC-400 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go SC-400 Real Exam Questions!QUESTION 87You are planning a data loss prevention (DLP) solution that will apply to computers that run Windows 10.You need to ensure that when users attempt to copy a file that contains sensitive information to aUSB storage device, the following requirements are met:- If the users are members of a group named Group1, the users must be allowed to copy the file, and an event must be recorded in the audit log.- All other users must be blocked from copying the file.What should you create?A. one DLP policy that contains one DLP ruleB. two DLP policies that each contains on DLP ruleC. one DLP policy that contains two DLP rulesAnswer: BQUESTION 88You have a data loss prevention (DLP) policy configured for endpoints as shown in the following exhibit. From a computer named Computer1, 3 user can sometimes upload files to cloud services and sometimes cannot. Other users experience the same issue.What are two possible causes of the issue? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A. The Access by unallowed apps action is set to Audit only.B. The computers are NOT onboarded to the Microsoft 365 compliance center.C. The Copy to clipboard action is set to Audit only.D. There are file path exclusions in the Microsoft 365 Endpoint data loss prevention (Endpoint DIP) settings.E. The unallowed browsers in the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings are NOT configured.Answer: ADQUESTION 89You need to be alerted when users share sensitive documents from Microsoft OneDrive to any users outside your company.What should you do?A. From the Microsoft 365 compliance center, create a data loss prevention (DLP) policy.B. From the Azure portal, create an Azure Active Directory (Azure AD) Identity Protection policy.C. From the Microsoft 365 compliance center, create an insider risk policy.D. From the Microsoft 365 compliance center, start a data investigation.Answer: AExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwideQUESTION 90Your company manufactures parts that are each assigned a unique 12-character alphanumeric serial number. Emails between the company and its customers refer in the serial number.You need to ensure that ail Microsoft Exchange Online emails containing the serial numbers are retained for five years.Which three objects should you create? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.A. a trainable classifierB. a sensitive info typeC. a retention polityD. a data loss prevention (DLP) policyE. an auto-labeling policyF. a retention labelG. a sensitivity labelAnswer: BEFExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitive-information-type-learn-about?view=o365-worldwidehttps://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-worldwidehttps://docs.microsoft.com/en-us/microsoft-365/compliance/retention?view=o365-worldwideQUESTION 91You receive an email that contains a list of words that will be used few a sensitive information type. You need to create a file that can be used as the source of a keyword dictionary.In which format should you save the list?A. an XLSX file that contains one word in each cell of the first rowB. a ISV file that contains words separated by tabsC. a JSON file that that an element tor each wordD. a text file that has one word on each lineAnswer: AQUESTION 92You plan to implement sensitivity labels for Microsoft Teams.You need to ensure that you can view and apply sensitivity labels to new Microsoft Teams sites.What should you do first?A. Run the Set-sposite cmdlet.B. Configure the EnableMTPLabels Azure Active Directory (Azure AD) setting.C. Create a new sensitivity label scoped to Groups & sites.D. Run the Execute-AzureAdLabelSync cmdtet.Answer: CExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels-teams-groups-sites?view=o365-worldwideQUESTION 93Your company has a Microsoft 365 tenant that uses a domain named contoso.The company uses Microsoft Office 365 Message Encryption (OMI ) to encrypt email sent to users in fabrikam.com.A user named User1 erroneously sends an email to user2@fabrikam.You need to disable user2@fabrikam.com from accessing the email.What should you do?A. Run the New-ComplianceSearchAction cmdlet.B. Instruct User1 to delete the email from her Sent Items folder from Microsoft Outlook.C. Run the Get-MessageTrace Cmdlet.D. Run the Set-OMEMessageRevocation Cmdlet.E. instruct User1 to select Remove external access from Microsoft Outlook on the web.Answer: CQUESTION 94Your company has a Microsoft 365 tenant.The company performs annual employee assessments. The assessment results are recorded in a document named AssessmentTemplate.docx that is created by using a Microsoft Word template. Copies of the employee assessments are sent to employees and their managers. The assessment copies are stored in mailboxes, Microsoft SharePoint Online sites, and OneDrive for Business folders. A copy of each assessment is also stored in a SharePoint Online folder named Assessments.You need to create a data loss prevention (DLP) policy that prevents the employee assessments from being emailed to external users. You will use a document fingerprint to identify the assessment documents. The solution must minimize effort.What should you include in the solution?A. Create a fingerprint of AssessmentTemplate.docx.B. Create a sensitive info type that uses Exact Data Match (EDM).C. Create a fingerprint of 100 sample documents in the Assessments folder.D. Import 100 sample documents from the Assessments folder to a seed folder.Answer: DQUESTION 95Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 tenant that uses the following sensitivity labels:* Confidential* Internal* ExternalThe labels are published by using a label policy named Policy1. Users report that Microsoft Office for the wen apps do not display the Sensitivity button. The Sensitivity button appears in Microsoft 365 Apps that are installed locally.You need to ensure that the users can apply sensitivity labels to content when they use Office for the web apps.Solution: You modify the publishing settings of Policy1.Does the meet the goal?A. YesB. NoAnswer: BQUESTION 96Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 tenant that uses the following sensitivity labels:* Confidential* Internal* ExternalThe labels are published by using a label policy named Policy1. Users report that Microsoft Office for the wen apps do not display the Sensitivity button. The Sensitivity button appears in Microsoft 365 Apps that are installed locally.You need to ensure that the users can apply sensitivity labels to content when they use Office for the web apps.Solution: You modify the scope of the Confidential label.Does this meet the goal?A. YesB. NoAnswer: BQUESTION 97Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 tenant that uses the following sensitivity labels:* Confidential* Internal* ExternalThe labels are published by using a label policy named Policy1. Users report that Microsoft Office for the wen apps do not display the Sensitivity button. The Sensitivity button appears in Microsoft 365 Apps that are installed locally.You need to ensure that the users can apply sensitivity labels to content when they use Office for the web apps.Solution: You run the Execute-AzureAdLabelSync cmdlet.Does this meet the goal?A. YesB. NoAnswer: AQUESTION 98Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD).You need to ensure that Endpoint DLP policies can protect content on the computers. Solution: You onboard the computers to Microsoft Defender fur Endpoint.Does this meet the goal?A. YesB. NoAnswer: AQUESTION 99Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD).You need to ensure that Endpoint DLP policies can protect content on the computers.Solution: You enroll the computers in Microsoft intune.Does this meet the goal?A. YesB. NoAnswer: BExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwideQUESTION 100Hotspot QuestionYou have the retention label policy shown in the Policy exhibit. (Click the Policy tab.) Users apply the retention label policy to files and set the asset ID as shown in the following table. On December 1. 2020. you create the event shown in the Event exhibit. (Click the Event tab.): For each of the following statements, select Yes if the statement is true. Otherwise, select No.NOTE: Each correct selection is worth one point. Answer: QUESTION 101Hotspot QuestionAt the end of a project you upload project documents to a Microsoft SharePoint Online library that contains many fifes. Files that have the following naming format must be labeled as Project Documents:- aei_AA989.docx- bci_WS098.docx- cei_DF112.docx- ebc_QQ454.docx- ecc_BB565.docxYou plan to create an auto-apply retention label policy.What should you use to identify the files, and which regular expression should you use? To answer, select the appropriate options in the answer area. Answer: QUESTION 102Hotspot QuestionYou plan to create a custom trainable classifier based on an organizational form template.You need to identity which role based access control (RBAC) role is required to create the trainable classifier and where to classifier. The solution must use the principle of least privilege. What should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Answer: Explanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-get-started-with?view=o365-worldwide#prepare-for-a-custom-trainable-classifierQUESTION 103Drag and Drop QuestionYou have a Microsoft 365 tenant that uses data loss prevention (DLP).You have a custom employee information form named Template 1.docx.You need to create a classification rule package based on the document fingerprint of Templatel.docx.Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Answer: QUESTION 104Hotspot QuestionYou plan to create a custom sensitive information type that will use Exact Data Match (EDM).You need to identify what to upload to Microsoft 365, and which tool to use for the upload.What should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Answer: Explanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/create-custom-sensitive-information-types-with-exact-data-match-based-classification?view=o365-worldwideQUESTION 105Hotspot QuestionYou plan to implement a sensitive information type based on a trainable classifier. The sensitive information type will identify employment contracts.You need to copy the required files to Microsoft SharePoint Online folders to train the classifier. What should you use to seed content and test the classifier? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Answer: Explanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-get-started-with?view=o365-worldwideQUESTION 106You have a Microsoft 365 tenant that uses Microsoft Office 365 Message Encryption (OME).You need to ensure that any emails containing attachments and sent to user1@contoso.com are encrypted automatically by using OME.What should you do?A. From the Exchange admin center, create a new sharing policy.B. From the Microsoft 365 security center, create a Safe Attachments policy.C. From the Exchange admin center, create a mail flow rule.D. From the Microsoft 365 compliance center, configure an auto-apply retention label policy.Answer: CExplanation:You can create mail flow rules to help protect email messages you send and receive. You can set up rules to encrypt any outgoing email messages and remove encryption from encrypted messages coming from inside your organization or from replies to encrypted messages sent from your organization.Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/define-mail-flow-rules-to-encrypt-email?view=o365-worldwideQUESTION 107You need to protect documents that contain credit card numbers from being opened by users outside your company. The solution must ensure that users at your company can open the documents.What should you use?A. a sensitivity label policyB. a sensitivity labelC. a retention policyD. a data loss prevention (DLP) policyAnswer: DExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwideQUESTION 108You have a Microsoft 365 tenant that contains a Microsoft SharePoint Online site named Site1.You have the users shown in the following table. You create a data loss prevention (DLP) policy for Site1 that detects credit card number information. You configure the policy to use the following protection action:When content matches the policy conditions, show policy tips to users and send them an email notification.You use the default notification settings.To Site1, User1 uploads a file that contains a credit card number.Which users receive an email notification?A. Used and User2 onlyB. Used and User4 onlyC. Used, User2, User3, and User4D. Used onlyE. Used and User3 onlyAnswer: DExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-the-default-dlp-policy?view=o365-worldwideQUESTION 109You have a Microsoft 365 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table. You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).Which devices support Endpoint DLP?A. Device5 onlyB. Device2 onlyC. Device 1, Device2, Device3, Device4, and Device5D. Device3 and Device4 onlyE. Device1 and Device2 onlyAnswer: BExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwideQUESTION 110A compliance administrator recently created several data loss prevention (DLP) policies.After the policies are created, you receive a higher than expected volume of DLP alerts.You need to identify which rules are generating the alerts.Which DLP report should you use?A. Third-party DLP policy matchesB. DLP policy matchesC. DLP incidentsD. False positive and overrideAnswer: BExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwideQUESTION 111Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.Solution: From the Cloud App Security portal, you create an app discovery policy.Does this meet the goal?A. YesB. NoAnswer: BExplanation:You can create app discovery policies to alert you when new apps are detected within your organization.Use the unallowed apps list instead.Reference:https://docs.microsoft.com/en-us/cloud-app-security/cloud-discovery-policieshttps://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwideQUESTION 112Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add a folder path to the file path exclusions.Does this meet the goal?A. YesB. NoAnswer: BExplanation:Folder path to the file path exclusions excludes certain paths and files from DLP monitoring.Use the unallowed apps list instead.Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwideQUESTION 113Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add the application to the unallowed apps list.Does this meet the goal?A. YesB. NoAnswer: AExplanation:Unallowed apps is a list of applications that you create which will not be allowed to access a DLP protected file.Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwideQUESTION 114Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring a file policy in Microsoft Cloud App Security.You need to configure the policy to apply to all files. Alerts must be sent to every file owner who is affected by the policy. The policy must scan for credit card numbers, and alerts must be sent to the Microsoft Teams site of the affected department.Solution: You use the Built-in DLP inspection method and send alerts as email.Does this meet the goal?A. YesB. NoAnswer: BExplanation:Alerts must be sent to the Microsoft Teams site of the affected department. A Microsoft Power Automate playbook should be used.Reference:https://docs.microsoft.com/en-us/cloud-app-security/content-inspection-built-inhttps://docs.microsoft.com/en-us/cloud-app-security/flow-integrationQUESTION 115You plan to import a file plan to the Microsoft 365 compliance center.Which object type can you create by importing a records management file plan?A. retention label policiesB. sensitive info typesC. sensitivity labelsD. retention labelsAnswer: DExplanation:File plan in Records management allows you to bulk-create retention labels by importing the relevant information from a spreadsheet.Reference:https://docs.microsoft.com/en-us/microsoft-365/compliance/file-plan-manager?view=o365-worldwideQUESTION 116You have a Microsoft 365 tenant.You discover that email does NOT use Microsoft Office 365 Message Encryption (OME).You need to ensure that OME can be applied to email.What should you do first?A. Enable Microsoft Defender for Office 365.B. Activate Azure Information Protection.C. Activate Azure Rights Management (Azure RMS).D. Create an Azure key vault.Answer: CExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/set-up-new-message-encryption-capabilities?view=o365-worldwideQUESTION 117You have a Microsoft 365 subscription that uses Microsoft Exchange Online. You need to receive an alert if a user emails sensitive documents to specific external domains.What should you create?A. a data loss prevention (DLP) policy that uses the Privacy categoryB. a Microsoft Cloud App Security activity policyC. a Microsoft Cloud App Security file policyD. a data loss prevention (DLP) alert filterAnswer: AExplanation:https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-policy-reference?view=o365-worldwideResources From:1.2023 Latest Braindump2go SC-400 Exam Dumps (PDF & VCE) Free Share:https://www.braindump2go.com/sc-400.html2.2023 Latest Braindump2go SC-400 PDF and SC-400 VCE Dumps Free Share:https://drive.google.com/drive/folders/1TNUsggolzUGOjp9tqvmMQRofUYZjYJ9z?usp=sharing3.2023 Free Braindump2go SC-400 Exam Questions Download:https://www.braindump2go.com/free-online-pdf/SC-400-PDF-Dumps(Q87-Q117).pdfFree Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams! --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2023-04-20 09:08:34 Post date GMT: 2023-04-20 09:08:34 Post modified date: 2023-04-20 09:08:34 Post modified date GMT: 2023-04-20 09:08:34 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com