Valid Microsoft SC-400 Exam Questions Are Recognized As the Perfect Online Resource

Valid Microsoft SC-400 Exam Questions Are Recognized As the Perfect Online Resource

Valid Microsoft SC-400 exam questions provided by the ITExamShop are becoming recongnized as the perfect online resource for the exam preparation of Microsoft Information Protection Administrator certification exam. Passing Microsoft SC-400 exam is the requirement of Microsoft Certified: Information Protection Administrator Associate certification. Microsoft SC-400 exam questions at ITExamShop covering the certification exam objectives and knowledge requirements ensure that you can pass Microsoft certification SC-400 exam in the first attempt.

First Come To Check Free Questions Below To Find SC-400 Exam Questions Are Perfect

Page 1 of 2

1. Your company manufactures parts that are each assigned a unique 12-character alphanumeric serial number. Emails between the company and its customers refer in the serial number.

You need to ensure that ail Microsoft Exchange Online emails containing the serial numbers are retained for five years.

Which three objects should you create? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

2. You have a Microsoft 365 tenant that contains the users shown in the following table.





You configure a retention label to trigger a disposition review at the end of the retention period.

Which users can access the Disposition tab in the Microsoft 365 compliance center to review the content?

3. You need to be alerted when users share sensitive documents from Microsoft OneDrive to any users outside your company.

What should you do?

4. You have a Microsoft 365 tenant.

You have a Microsoft SharePoint Online site that contains employment contracts in a folder named

EmploymentContracts. All the files in EmploymentContracts are marked as records.

You need to recommend a process to ensure that when a record is updated, the previous version of the record is kept as a version of the updated record.

What should you recommend?

5. A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx.

From the Cloud App Security portal, you discover the alert shown in the exhibit.





You restore the file from quarantine.

You need to prevent files that match the policy from being quarantined. Files that match the policy must generate an alert.

What should you do?

6. HOTSPOT

You enable archive mailboxes for all the users at your company.

The Default MRM Policy is shown in the MRM exhibit.





A Microsoft 365 retention label policy is shown in the Label Policy exhibit.





You need to identify the following:

✑ How many years until an email is archived?

✑ What should you modify to change the retention period for archiving?

What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.



7. You have a Microsoft 365 tenant that uses records management.

You use a retention label to mark legal files stored in a Microsoft SharePoint Online document library as

regulatory records.

What can you do to the legal files?

8. Your company has a Microsoft 365 tenant that uses a domain named contoso.com.

You are implementing data loss prevention (DLP).

The company's default browser is Microsoft Edge.

During a recent audit, you discover that some users use Firefox and Google Chrome browsers to upload files labeled as Confidential to a third-party Microsoft SharePoint Online site that has a URL of https://m365x076709.sharepoint.com. Users are blocked from uploading the confidential files to the site from Microsoft Edge.

You need to ensure that the users cannot upload files labeled as Confidential from Firefox and Google Chrome to any cloud services.

Which two actions should you perform? Each correct answer presents part of the solution. (Choose two.)

NOTE: Each correct selection is worth one point.

9. You have a Microsoft OneDrive for Business folder that contains the files shown in the following table.





In Microsoft Cloud App Security, you create a file policy to automatically apply a classification.

What is the effect of applying the policy?

10. 1.Topic 1, Misc. Questions



Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add the application to the unallowed apps list.

Does this meet the goal?