Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while
others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From the Microsoft Defender for Cloud Apps portal, you create an app discovery policy.
Does this meet the goal?
A. Yes
B. No
You have a Microsoft 365 E5 subscription.
You need to create a Microsoft Defender for Cloud Apps policy that will detect data loss prevention (DLP) violations.
What should you create?
A. a Cloud Discovery anomaly detection policy
B. an activity policy
C. a session policy
D. a file policy
You have a Microsoft SharePoint Online site named Site1 that contains the following files:
File1.docx
File2.xlsx
File3.pdf
You have a retention label named Retention1.
You plan to use an auto-labeling policy to apply Retention1 to any content on Site1 that matches the Targeted Harassment trainable classifier.
To which files will Retention1 be applied?
A. File1.docx only
B. File1.docx and File2.xlsx
C. File1.docx and File3.pdf only
D. File1.docx, File2.xlsx, and File3.pdf
You have a Microsoft 365 E5 tenant.
You create a data loss prevention (DLP) policy.
You need to ensure that the policy protects documents in Microsoft Teams chat sessions.
Which location should you enable in the policy?
A. OneDrive accounts
B. Exchange email
C. Teams chat and channel messages
D. SharePoint sites
You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From the Microsoft Defender for Cloud Apps, you mark the application as Unsanctioned.
Does this meet the goal?
A. Yes
B. No
You have a Microsoft 365 subscription that contains a Microsoft SharePoint Online site named Site1.
You need to create a data loss prevention (DLP) policy to prevent the sharing of files that contain source code. The solution must minimize administrative effort.
What should you include in the solution?
A. an exact data match (EDM) data classification
B. a sensitive info type that uses a keyword dictionary
C. a sensitive info type that uses regular expressions
D. a trainable classifier
You have a Microsoft 365 E5 subscription that contains a data loss prevention (DLP) policy named DLP1.
DLP1 has a rule that triggers numerous alerts.
You need to reduce the number of alert notifications that are generated. The solution must maintain the sensitivity of DLP1.
What should you do?
A. Change the mode of DLP1 to Test without notifications.
B. Modify the rule and increase the instance count.
C. Modify the rule and configure an alert threshold.
D. Modify the rule and set the priority to the highest value.
You need to be alerted when users share sensitive documents from Microsoft OneDrive to any users outside your company. What should you do?
A. From the Microsoft Purview compliance portal, start a data investigation.
B. From the Microsoft Defender for Cloud Apps portal, create a file policy.
C. From the Azure Active Directory admin center, configure an Identity Protection policy.
D. From the Exchange admin center, create a data loss prevention (DLP) policy.
You are creating a data loss prevention (DLP) policy that will apply to all available locations. You configure an advanced DLP rule in the policy. Which type of condition can you use in the rule?
A. Keywords
B. Content search query
C. Sensitive info type
D. Sensitive label
You plan to implement Microsoft Office 365 Advanced Message Encryption.
You need to ensure that encrypted email sent to external recipients expires after seven days.
What should you create first?
A. a custom branding template
B. a remote domain in Microsoft Exchange
C. a mail flow rule
D. an X.509 version 3 certificate
E. a connector in Microsoft Exchange
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SC-400 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.