You are configuring a data loss prevention (DLP) policy to report when credit card data is found on a Windows
You are configuring a data loss prevention (DLP) policy to report when credit card data is found on a Windows 10 device joined to Azure Active Directory (Azure AD). You plan to use information from the policy to restrict the ability to copy the sensitive data to the clipboard. What should you configure in the […]
Each product group at your company must show a distinct product logo in encrypted emails instead of the standa
Each product group at your company must show a distinct product logo in encrypted emails instead of the standard Microsoft Office 365 logo. What should you do to create the branding templates? A. Create a Transport rule. B. Create an RMS template. C. Run the Set-IRMConfiguration cmdlet. D. Run the New-OMEConfiguration cmdlet. Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/add-your-organization-brand-to-encrypted-messages?view=o365-worldwide
You are creating a custom trainable classifier to identify organizational product codes referenced in Microsof
You are creating a custom trainable classifier to identify organizational product codes referenced in Microsoft 365 content. You identify 300 files to use as seed content. Where should you store the seed content? A. a Microsoft SharePoint Online folder B. a Microsoft OneDrive for Business folder C. an Azure file share D. Microsoft Exchange Online […]
You need to automatically apply a sensitivity label to documents that contain information about your company
You need to automatically apply a sensitivity label to documents that contain information about your company’s network including computer names, IP addresses, and configuration information. Which two objects should you use? Each correct answer presents part of the solution. (Choose two.) NOTE: Each correct selection is worth one point. A. an Information protection auto-labeling policy […]
You have a new Microsoft 365 tenant.
You have a new Microsoft 365 tenant. You need to ensure that custom trainable classifiers can be created in the tenant. To which role should you be assigned to perform the configuration? A. Security administrator B. Security operator C. Global administrator D. Compliance administrator Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-get-started-with?view=o365-worldwide
You are implementing a data classification solution.
You are implementing a data classification solution. The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort. What should you do? A. Create a custom classifier. B. Create a sensitive info type […]
You have a Microsoft OneDrive for Business folder that contains the files shown in the following table.
You have a Microsoft OneDrive for Business folder that contains the files shown in the following table. In Microsoft Cloud App Security, you create a file policy to automatically apply a classification. What is the effect of applying the policy? A. The policy will apply to only the .docx and .txt files. The policy will […]
You create three sensitivity labels named Sensitivity1, Sensitivity2, and Sensitivity3 and perform the followi
You create three sensitivity labels named Sensitivity1, Sensitivity2, and Sensitivity3 and perform the following actions: Publish Sensitivity1. Create an auto-labeling policy for Sensitivity2. You plan to create a file policy named Policy1 in Microsoft Cloud App Security. Which sensitivity labels can you apply to Microsoft SharePoint Online in Policy1? A. Sensitivity1 only B. Sensitivity1, Sensitivity2, […]
Your company has a Microsoft 365 tenant.
Your company has a Microsoft 365 tenant. The company has a call center that contains 300 users. In the call center, the users share desktop computers and might use a different computer every day. The call center computers are NOT configured for biometric identification. The users are prohibited from having a mobile phone in the […]
You configure a new Microsoft 365 tenant to use a default domain name of contoso.com.
You configure a new Microsoft 365 tenant to use a default domain name of contoso.com. You need to ensure that you can control access to Microsoft 365 resources by using conditional access policies. What should you do first? A. Disable the User consent settings. B. Disable Security defaults. C. Configure a multi-factor authentication (MFA) registration […]