Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Task 7

You need to create a retention policy that meets the following requirements:

• Applies to Microsoft Teams chat and Teams channel messages of users that have a department attribute of Sales.

• Retains item for five years from the date they are created, and then deletes them.

Full Access
Question # 5

Task 3

You plan to automatically apply a watermark to the document1 of a project named Falcon.

You need to create a label that will add a watermark of "Project falcon' in red. size-12 font diagonally across the documents.

Full Access
Question # 6

Task 9

You are investigating a data breach.

You need to retain all Microsoft Exchange items in the mailbox of Alex Wilber that contain the word Falcon and were created in the year 2021.

Full Access
Question # 7

Task 1

You need to provide users with the ability to manually classify files that contain product information that are stored in SharePoint Online sites. The solution must meet the following requirements:

• The users must be able to apply a classification of Product1 to the files.

• Any authenticated user must be able to open files classified as Product1.

• files classified as Product1 must be encrypted.

Full Access
Question # 8

You are evaluating the technical requirements for the DLP reports.

Which user can currently view the DLP reports?

A.

Admin4

B.

Admin1

C.

Admin5

D.

Admin2

E.

Admin3

Full Access
Question # 9

How many files in Site2 will be visible to User1 and User2 after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Full Access
Question # 10

You have a Microsoft 365 E5 subscription.

You receive the data loss prevention (DIP) alert shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graph.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

You are implementing a data classification solution.

The research department at your company requires that documents containing programming code be labeled

as Confidential. The department provides samples of the code from its document library. The solution must

minimize administrative effort.

What should you do?

A.

Create a custom classifier.

B.

Create a sensitive info type that uses Exact Data Match (EDM).

C.

Use the source code classifier.

D.

Create a sensitive info type that uses a regular expression.

Full Access
Question # 12

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You need to prevent users in the finance department from sharing files with users in the research department. Which type of policy should you configure?

A.

communication compliance

B.

information barrier

C.

Conditional Access

D.

insider risk management

Full Access
Question # 13

You have a Microsoft 365 E5 tenant that contains a Microsoft SharePoint Online site named Site1 and a user named User1. The tenant has auditing enabled You need to ensure that User! can perform disposition reviews. The solution must use the principle of the least privilege What should you do?

A.

Assign User1 the Compliance Data Administrator role.

B.

Add User1 to the Records Management role group.

C.

Assign User1 the Data Investigator role.

D.

Add User1 to the Content Explorer Content Viewer role group.

Full Access
Question # 14

You have a Microsoft 365 E5 subscription that uses Yammer.

You need to create a Microsoft Purview communication compliance policy that will detect inappropriate images in Yammer conversations.

What should you do first?

A.

Configure Hybrid Mode for Yammer.

B.

Configure the Yammer network admin settings.

C.

Assign each user a Yammer license.

D.

Configure Native Mode for Yammer.

Full Access
Question # 15

You have a Microsoft 365 E5 subscription that contains the devices shown in the following table.

You need to onboard the devices to Microsoft Purview. The solution must ensure that you can apply Endpoint data loss prevention (Endpoint DLP) policies to the devices. What can you use to onboard each device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

Vou have a Microsoft 365 ES subscription that contains a Microsoft SharePoint Online site named Site1.

You need to implement a records management solution for the files stored on Site1. The solution must meet the following requirements:

• The files must be retained for seven years.

• Files older than seven years must be deleted automatically.

What should you use to manage the files?

A.

an adaptive scope

B.

a file plan

C.

a disposition review

D.

a label policy

Full Access
Question # 17

A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx.

From the Cloud App Security portal, you discover the alert shown in the exhibit.

You restore the file from quarantine.

You need to prevent files that match the policy from being quarantined. Files that match the policy must generate an alert.

What should you do?

A.

Modify the policy template.

B.

Assign the Global reader role to the file owners.

C.

Exclude file matching by using a regular expression.

D.

Update the governance action.

Full Access
Question # 18

You need to meet the technical requirements for the confidential documents.

What should you created first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 19

You need to meet the technical requirements for the Site3 documents.

What should you create?

A.

a retention label policy and a retention label that uses an event

B.

a sensitive info type that uses a dictionary and a sensitivity label

C.

a sensitive info type that uses a regular expression and a sensitivity label

D.

a retention policy that has Only delete items when they reach a certain age selected

Full Access
Question # 20

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you grant the Sensitivity label administrator role?

A.

Admin1, Admin2, Admin4, and Admin5 only

B.

Admin1, Admin2, and Admin3 only

C.

Admin1 only

D.

Admin1 and Admin4 only

E.

Admin1 and Admin5 only

Full Access
Question # 21

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

Full Access
Question # 22

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 23

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth is worth one point.

Full Access
Question # 24

You need to meet the technical requirements for the creation of the sensitivity labels. Which administrative users are currently missing the Sensitivity label administrator role?

A.

Admin1 only

B.

Admm1, Admin2, Admin4, and Admin5 only

C.

Admin 1. Admin2, and Admin3 only

D.

Admin 1 and Admin5 only

E.

Admin 1 and Admin4 only

Full Access
Question # 25

You have a Microsoft 365 ES tenant that uses Microsoft Teams and contains two users named User1 and User2.

You create a data loss prevention (DLP) policy that is applied to the Teams chat and channel messages location for user1 and user2.

Which Teams entities will have DLP protection? Purview compliance portal?

A.

1:1/n chats and general channels only

B.

1:1/chats and private channels only

C.

1:1/ chats, general channels, and private channels

D.

DLP policy matches

Full Access
Question # 26

You have a Microsoft 365 E5 subscription that contains a trainable classifier named Trainable1. You plan to create the items shown in the following table.

Which items can use Trainable1?

A.

Label2 only

B.

Label1 and Label2 only

C.

Label1 and Policy1 only

D.

Label2 Policy1, and DLP1 only

E.

Label1, Label2, Policy1, and DLP1

Full Access
Question # 27

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview compliance portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-AdminAuditLogConfig -AdminAuditLogEnabled Strue -AdminAuditLogCmdlets "Mailbox" command.

Does that meet the goal?

A.

Yes

B.

NO

Full Access
Question # 28

You create a retention label policy named Contoso_policy that contains the following labels.

    10 years then delete

    5 years then delete

    Do not retain

Contoso_Policy is applied to content In Microsoft Sharepoint Online sites.

After a couple of days, yon discover the following messages on the Properties page of the label policy.

* Statue Off (Error)

* It's taking longer than expected to deploy the policy

You need to reinitiate the policy.

How should you complete the command? To answer, select the appropriate options in the; answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 29

Your company has a Microsoft 365 tenant that uses a domain named contoso.

The company uses Microsoft Office 365 Message Encryption (OMI ) to encrypt email sent to users in fabrikam.com.

A user named User1 erroneously sends an email to user2@fabrikam

You need to disable user2@fabrikam.com from accessing the email.

What should you do?

A.

Run the New-ComplianceSearchAction cmdlet.

B.

Instruct User1 to delete the email from her Sent Items folder from Microsoft Outlook.

C.

Run the Get-MessageTrace Cmdlet.

D.

Run the Set-OMEMessageRevocation Cmdlet.

E.

instruct User1 to select Remove external access from Microsoft Outlook on the web.

Full Access
Question # 30

You create a data loss prevention (DLP) policy. The Advanced DLP rules page is shown in the Rules exhibit.

The Review your settings page is shown in the review exhibit.

You need to review the potential impact of enabling the policy without applying the actions.

What should you do?

A.

Edit the policy, remove all the actions in DLP rule 1, and select I'd like to test it out first.

B.

Edit the policy, remove the Restrict access to the content and Send incident report to Administrator actions,

and then select Yes, turn it on right away.

C.

Edit the policy, remove all the actions in DLP rule 1, and select Yes, turn it on right away.

D.

Edit the policy, and then select I'd like to test it out first.

Full Access
Question # 31

You have a Microsoft 36d tenant.

You need to create a new sensitive info type for items that contain the following:

• An employee ID number that consists of the hire date of the employee followed by a three-digit number

• The words "Employee", "ID", or "Identification" within 300 characters of the employee ID number

What should you use for the primary and secondary elements? To answer, select the appropriate options in the answer area.

Full Access
Question # 32

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question setsmight have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.

You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.

Solution: You configure a mail flow rule that matches the text patterns.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 33

You have a Microsoft 365 E5 subscription.

You need to apply data loss prevention (DLP) policies to the following:

• Microsoft Exchange Online mailboxes

• Microsoft SharePoint Online sites

• Microsoft Power BI workspaces

• Microsoft OneDrive accounts

• On-premises repositories

What is the minimum number of DLP policies required to achieve the goal?

A.

1

B.

2

C.

3

D.

4

E.

5

Full Access
Question # 34

You create a retention label policy named Contoso_policy that contains the following labels.

    10 years then delete

    5 years then delete

    Do not retain

Contoso_Policy is applied to content In Microsoft Sharepoint Online sites.

After a couple of days, yon discover the following messages on the Properties page of the label policy.

* Statue Off (Error)

* It's taking longer than expected to deploy the policy

You need to reinitiate the policy.

How should you complete the command? To answer, select the appropriate options in the; answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 35

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Cloud App Security portal, you create an app discovery policy.

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 36

You have a Microsoft 365 E5 tenant that contains three groups named Group1, Group2, and Group3.

You have the users shown in the following table.

You have the sensitivity labels shown in the following exhibit.

You have the label policies shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

Full Access
Question # 37

You plan to implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You need to identify which end user activities can be audited on the endpoints, and which activities can be restricted on the endpoints.

What should you identify for each activity? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

Full Access
Question # 38

You have a Microsoft 365 ES subscription.

You plan to create a custom trainable classifier by uploading 1,000 machine-generated files as seed content.

The files have sequential names and are uploaded in one-minute intervals as shown in the following table.

Which files were processed first and last when you created the custom trainable classifier? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 39

You plan to import a file plan to the Microsoft 365 compliance center.

Which object type can you create by importing a records management file plan?

A.

retention label policies

B.

sensitive info types

C.

sensitivity labels

D.

retention labels

Full Access
Question # 40

You have a Microsoft 365 E5 subscription.

You create an adaptive scope named Scope 1 as shown in the following exhibit.

You create a retention policy named Policy1 that includes Scope1.

To which three locations can you apply Policy1? To answer, select the appropriate locations in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 41

You need to recommend a solution to configuration the Microsoft 365 Records management settings by using the CSV file must meet the compliance requirements.

What should you recommend?

A.

From the Microsoft 365 compliance center, import the CSV file to a file plan.

B.

Use EdmUploadAgent.exe to upload a hash of the CSV to a datastore.

C.

Use a PowerShell command that pipes the import csv cmdlet to the New-RetentionPolicy cmdlet.

D.

Use a PowerShell command that pipes the import-csv cmdlet to the New-Label cmdlet.

Full Access
Question # 42

You create a label that encrypts email data.

Users report that they cannot use the label in Outlook on the web to protect the email messages they send.

You need to ensure that the users can use the new label to protect their email.

What should you do?

A.

Wait six hours and ask the users to try again.

B.

Create a label policy.

C.

Create a new sensitive information type.

D.

Modify the priority order of label policies

Full Access
Question # 43

You need to recommend a solution that meets the sales requirements.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 44

You need to implement a solution that meets the compliance requirements for the Windows 10 computers.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each coned selection is worth one point.

A.

Deploy a Microsoft 36S Endpoint data loss prevention (Endpoint DLP) configuration package to the computers.

B.

Configure hybrid Azure AD join for all the computers.

C.

Configure the Microsoft Intune device enrollment settings.

D.

Configure a compliance policy in Microsoft Intune.

E.

auto in Microsoft Defender for Endpoint protection.

Full Access
Question # 45

You need to recommend a solution that meets the Data Loss Prevention requirements for the HR department.

Which three actions should you perform? Each correct answer presents part of the solution. (Choose three.)

NOTE: Each correct selection is worth one point.

A.

Schedule EdmUploadAgent.exe to hash and upload a data file that contains employee information.

B.

Create a sensitive info type rule package that contains the EDM classification.

C.

Define the sensitive information database schema in the XML format.

D.

Create a sensitive info type rule package that contains regular expressions.

E.

Define the sensitive information database schema in the CSV format.

Full Access
Question # 46

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder. What should you recommend?

A.

From the Microsoft 365 compliance center, configure a DLP policy.

B.

From the Microsoft 365 compliance center, configure a Content Search query.

C.

From the Microsoft 365 compliance center, configure an auto-labeling policy.

D.

From Azure Information Protection, configure a content scan job.

Full Access
Question # 47

You need to recommend a solution that meets the compliance requirements for viewing DLP tooltip

justifications.

What should you recommend?

A.

Instruct the compliance department users to review the False positive and override report.

B.

Configure a Microsoft Power Automate workflow to route DLP notification emails to the compliance

department.

C.

Instruct the compliance department users to review the DLP incidents report.

D.

Configure an Azure logic app to route DLP notification emails to the compliance department.

Full Access
Question # 48

Task 8

You need to retain Microsoft SharePoint files that contain the word Falcon for two years from the date they were created, and then delete them.

Full Access
Question # 49

Task 5

You need to ensure that a group named U.S. Sales can store files containing information subject to General Data Protection Regulation (GDPR) in their OneDrive accounts. All other current GDPR restrictions must remain in effect.

Full Access
Question # 50

Task 6

You plan to implement Endpoint data loss prevention (Endpoint DLP) policies for computers that run Windows.

Users have an application named App1 that stores data locally in a folder named C:\app1\data.

You need to prevent the folder from being monitored by Endpoint DLP.

Full Access