Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

You have a Microsoft 365 E5 tenant that contains a user named User1. User1 is assigned the Compliance Administrator role. User1 cannot view the regular expression in the IP Address sensitive info type. You need to ensure that User! can view the regular expression. What should you do?

A.

Assign Used to the Reviewer role group

B.

Create a copy of the IP Address sensitive info type and instruct User1 to edit the copy.

C.

Instruct User1 to use the Test function on the sensitive info type.

D.

Assign User1 the Global Reader role.

Full Access
Question # 5

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need ensure that an incident will be generated when a user visits a phishing website.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 6

You are creating a custom trainable classifier to Identify organizational product codes referenced in Microsoft 36S content. You identify 300 files to use as seed content When? should you store the seed content?

A.

a Microsoft OneDrive folder

B.

a Microsoft Exchange Online shared mailbox

C.

an Azure file share

D.

a Microsoft SharePoint Online folder

Full Access
Question # 7

DRAG DROP

You need to create a trainable classifier that can be used as a condition in an auto-apply retention label policy.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 8

You have a Microsoft J65 subscription linked to a Microsoft Entra tenant that contains a user named User1. You need to grant User1 permission to search Microsoft 365 audit logs. The solution must use the principle of least privilege. Which role should you assign to User1?

A.

the Security Reader role in the Microsoft Entra admin center

B.

the Compliance Management role in the Exchange admin center

C.

the View Only Audit Logs role in the Exchange admin center

D.

the Reviewer role in the Microsoft Purview portal

Full Access
Question # 9

You have a Microsoft 365 E5 subscription.

You need to ensure that encrypted email messages sent to an external recipient can be revoked or will expire within seven days.

What should you configure first?

A.

a custom branding template

B.

a mail flow rule

C.

a sensitivity label

D.

a Conditional Access policy

Full Access
Question # 10

You have a Microsoft 365 E5 subscription.

You need to create static retention policies for the following locations:

● Teams chats

● Exchange email

● SharePoint sites

● Microsoft 365 Groups

● Teams channel messages

What is the minimum number of retention policies required?

A.

1

B.

2

C.

3

D.

4

E.

5

Full Access
Question # 11

You have a Microsoft 36S subscription that contains the sensitive information types (SITs) shown in the following exhibit.

Use the drop-down menus To select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct flection is worth one point.

Full Access
Question # 12

You are planning a data loss prevention (DLP) solution that will apply to Windows Client computers.

You need to ensure that when users attempt to copy a file that contains sensitive information to a USB storage device, the following requirements are met:

● If the users are members of a group named Group1, the users must be allowed to copy the file, and an event must be recorded in the audit log.

● All other users must be blocked from copying the file.

What should you create?

A.

one DLP policy that contains one DLP rule

B.

one DLP policy that contains two DLP rules

C.

two DLP policies that each contains one DLP rule

Full Access
Question # 13

You are implementing Microsoft Purview Advanced Message Encryption for a Microsoft 365 tenant named contoso.com You need to meet the following requirements:

• All email to a domain named (abrikam.com must be encrypted automatically.

• Encrypted emails must expire seven days after they are sent

What should you configure for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 14

You have a Microsoft 365 E5 subscription that contains a retention policy named RP1 as shown in the following table.

You place a preservation lock on RP1.

You need to modify RP1.

Which two modifications can you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Add locations to the policy.

B.

Delete the policy.

C.

Remove locations from the policy.

D.

Decrease the retention period of the policy.

E.

Disable the policy.

F.

Increase the retention period of the policy.

Full Access
Question # 15

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 16

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

A.

1

B.

2

C.

3

D.

4

E.

6

Full Access
Question # 17

HOTSPOT

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

You plan to create a Microsoft Purview insider risk management case named Case1.

Which insider risk management object should you select first, and which users will be added as contributors for Case1 by default?

To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 18

HOTSPOT

You have a Microsoft SharePoint Online site that contains the following files.

Users are assigned roles for the site as shown in the following table.

Which files can User1 and User2 open? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access
Question # 19

You need to be alerted when users share sensitive documents from Microsoft OneDrive to any users outside your company.

What should you do?

A.

From the Microsoft Purview portal create an insider risk policy

B.

From the Microsoft Defender portal create a file policy

C.

From the Microsoft Defender portal, create an activity policy.

D.

From the Microsoft Purview portal, start a data investigation.

Full Access
Question # 20

You have a Microsoft 365 E5 subscription. The subscription contains 500 devices that are onboarded to Microsoft Purview.

You select Activate Microsoft Purview Audit.

You need to ensure that you can track interactions between users and generative AI websites.

What should you deploy to the devices?

A.

the Microsoft Purview extension

B.

the Microsoft Purview Information Protection client

C.

the Microsoft Defender Browser Protection extension

D.

Endpoint analytics

Full Access
Question # 21

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Full Access
Question # 22

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 23

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Full Access
Question # 24

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Full Access