00:00

QUESTION 41

HOTSPOT - (Topic 1)
You have a Microsoft 365 E5 tenant that contains three groups named Group1, Group2, and Group3.
You have the users shown in the following table.
SC-400 dumps exhibit
You have the sensitivity labels shown in the following exhibit.
SC-400 dumps exhibit
You have the label policies shown in the following table.
SC-400 dumps exhibit
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
SC-400 dumps exhibit
Solution:
SC-400 dumps exhibit

Does this meet the goal?

Correct Answer: A

QUESTION 42

- (Topic 1)
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings,
you add the application to the unallowed apps list. Does this meet the goal?

Correct Answer: A
Unallowed apps is a list of applications that you create which will not be allowed to access a DLP protected file.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365- worldwide

QUESTION 43

HOTSPOT - (Topic 1)
You have a Microsoft 365 E5 tenant.
You create sensitivity labels as shown in the Sensitivity Labels exhibit.
SC-400 dumps exhibit
The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content.
The sensitivity labels are published as shown in the Published exhibit.
SC-400 dumps exhibit
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
SC-400 dumps exhibit
Solution:
SC-400 dumps exhibit

Does this meet the goal?

Correct Answer: A

QUESTION 44

- (Topic 1)
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted. Solution: You configure a mail flow rule that matches a sensitive info type.
Does this meet the goal?

Correct Answer: A

QUESTION 45

HOTSPOT - (Topic 1)
You have a Microsoft SharePoint Online site named Site1 that contains the files shown in the following table.
SC-400 dumps exhibit
You have a data loss prevention (DLP) policy named DLP1 that has the advanced DIP rules shown in the following table.
SC-400 dumps exhibit
You apply DLP1 to Site1.
For each of the following statements, select Yes if the statement is true. Otherwise, select No,
NOTE: Each correct selection is worth one point.
SC-400 dumps exhibit
Solution:
SC-400 dumps exhibit

Does this meet the goal?

Correct Answer: A