SC-400Free trialFree trial

By microsoft
Aug, 2025

Verified

25Q per page

Question 1

You create three sensitivity labels named Sensitivity1, Sensitivity2, and Sensitivity3 and perform the following actions:
✑ Publish Sensitivity1.
✑ Create an auto-labeling policy for Sensitivity2.
You plan to create a file policy named Policy1 in Microsoft Cloud App Security.
Which sensitivity labels can you apply to Microsoft SharePoint Online in Policy1?

  • A: Sensitivity1 only
  • B: Sensitivity1, Sensitivity2, and Sensitivity3
  • C: Sensitivity2 only
  • D: Sensitivity1 and Sensitivity2 only

Question 2

You need to automatically apply a sensitivity label to documents that contain information about your company's network including computer names, IP addresses, and configuration information.
Which two objects should you use? Each correct answer presents part of the solution. (Choose two.)
NOTE: Each correct selection is worth one point.

  • A: an Information protection auto-labeling policy
  • B: a custom trainable classifier
  • C: a sensitive info type that uses a regular expression
  • D: a data loss prevention (DLP) policy
  • E: a sensitive info type that uses keywords
  • F: a sensitivity label that has auto-labeling

Question 3

You are creating a custom trainable classifier to identify organizational product codes referenced in Microsoft 365 content.
You identify 300 files to use as seed content.
Where should you store the seed content?

  • A: a Microsoft SharePoint Online folder
  • B: a Microsoft OneDrive for Business folder
  • C: an Azure file share
  • D: Microsoft Exchange Online shared mailbox

Question 4

Each product group at your company must show a distinct product logo in encrypted emails instead of the standard Microsoft Office 365 logo.
What should you do to create the branding templates?

  • A: Create a Transport rule.
  • B: Create an RMS template.
  • C: Run the Set-IRMConfiguration cmdlet.
  • D: Run the New-OMEConfiguration cmdlet.

Question 5

You create a custom sensitive info type that uses Exact Data Match (EDM).
You plan to periodically update and upload the data used for EDM.
What is the maximum frequency with which the data can be uploaded?

  • A: twice per week
  • B: twice per day
  • C: once every six hours
  • D: once every 48 hours
  • E: twice per hour

Question 6

HOTSPOT -
You are implementing Microsoft Office 365 Message Encryption (OME) for a Microsoft 365 tenant named contoso.com.
You need to meet the following requirements:
✑ All email to a domain named fabrikam.com must be encrypted automatically.
✑ Encrypted emails must expire seven days after they are sent.
What should you configure for each requirement? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 7

A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx.
From the Cloud App Security portal, you discover the alert shown in the exhibit.

Image 1

You restore the file from quarantine.
You need to prevent files that match the policy from being quarantined. Files that match the policy must generate an alert.
What should you do?

  • A: Modify the policy template.
  • B: Assign the Global reader role to the file owners.
  • C: Exclude file matching by using a regular expression.
  • D: Update the governance action.

Question 8

HOTSPOT -
You create a sensitivity label as shown in the Sensitivity Label exhibit.

Image 1

You create an auto-labeling policy as shown in the Auto Labeling Policy exhibit.

Image 2

A user sends the following email:

From: user1@contoso.com -

To: user2@fabrikam.com -

Subject: Address List -
Message Body:
Here are the lists that you requested.
Attachments:
<<File1.docx>>
<<File2.xml>>
Both attachments contain lists of IP addresses.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 3

Question 9

You receive an email that contains a list of words that will be used for a sensitive information type.
You need to create a file that can be used as the source of a keyword dictionary.
In which format should you save the list?

  • A: a JSON file that has an element for each word
  • B: an ACCDB database file that contains a table named Dictionary
  • C: an XML file that contains a keyword tag for each word
  • D: a CSV file that contains words separated by commas

Question 10

You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.
A user named User1 sends link-based, branded emails that are encrypted by using Microsoft Office 365 Advanced Message Encryption to the recipients shown in the following table.

Image 1

For which recipients can User1 revoke the emails?

  • A: Recipient4 only
  • B: Recipient1 only
  • C: Recipient1, Recipient2, Recipient3, and Recipient4
  • D: Recipient3 and Recipient4 only
  • E: Recipient1 and Recipient2 only

Question 11

You need to test Microsoft Office 365 Message Encryption (OME) capabilities for your company. The test must verify the following information:
✑ The acquired default template names
✑ The encryption and decryption verification status
Which PowerShell cmdlet should you run?

  • A: Test-ClientAccessRule
  • B: Test-Mailflow
  • C: Test-OAuthConnectivity
  • D: Test-IRMConfiguration

Question 12

You have a Microsoft OneDrive for Business folder that contains the files shown in the following table.

Image 1

In Microsoft Cloud App Security, you create a file policy to automatically apply a classification.
What is the effect of applying the policy?

  • A: The policy will apply to only the .docx and .txt files. The policy will classify the files within 24 hours.
  • B: The policy will apply to all the files. The policy will classify only 100 files daily.
  • C: The policy will apply to only the .docx files. The policy will classify only 100 files daily.
  • D: The policy will apply to only the .docx and .txt files. The policy will classify the files immediately.

Question 13

You have a Microsoft 365 tenant that uses trainable classifiers.
You are creating a custom trainable classifier.
You collect 300 sample file types from various geographical locations to use as seed content. Some of the file samples are encrypted.
You organize the files into categories as shown in the following table.

Image 1

Which file categories can be used as seed content?

  • A: Category2, Category3, and Category5 only
  • B: Category3 and Category5 only
  • C: Category1 and Category3 only
  • D: Category3 only
  • E: Category1, Category2, Category3, Category4, and Category5

Question 14

You have a Microsoft 365 tenant that uses Microsoft Office 365 Message Encryption (OME).
You need to ensure that any emails containing attachments and sent to user1@contoso.com are encrypted automatically by using OME.
What should you do?

  • A: From the Exchange admin center, create a new sharing policy.
  • B: From the Microsoft 365 security center, create a Safe Attachments policy.
  • C: From the Exchange admin center, create a mail flow rule.
  • D: From the Microsoft 365 compliance center, configure an auto-apply retention label policy.

Question 15

You plan to implement sensitivity labels for Microsoft Teams.
You need to ensure that you can view and apply sensitivity labels to new Microsoft Teams sites.
What should you do first?

  • A: Run the Set-SPOSite cmdlet.
  • B: Create a new sensitivity label scoped to Groups & sites.
  • C: Run the Execute-AzureAdLabelSync cmdlet.
  • D: Configure the EnableMIPLabels Azure Active Directory (Azure AD) setting.

Question 16

HOTSPOT -
You have Microsoft 365 E5 tenant that has a domain name of M365x925027.onmicrosoft.com.
You have a published sensitivity label.
The Encryption settings for the sensitivity label are configured as shown in the exhibit.

Image 1

For each of the following statements, select Yes if statement is true. Otherwise, select No
NOTE: Each correct selection is worth one point.
Hot Area:

Image 2

Question 17

HOTSPOT -
You plan to create a custom sensitive information type that will use Exact Data Match (EDM).
You need to identify what to upload to Microsoft 365, and which tool to use for the upload.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 18

DRAG DROP -
You have a Microsoft 365 tenant that uses data loss prevention (DLP).
You have a custom employee information form named Template1.docx.
You need to create a classification rule package based on the document fingerprint of Template1.docx.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:

Image 1

Question 19

Your company has a Microsoft 365 tenant that uses a domain named contoso.com.
The company uses Microsoft Office 365 Message Encryption (OME) to encrypt email sent to users in fabrikam.com.
A user named User1 erroneously sends an email to user2@fabrikam.com.
You need to prevent user2@fabrikam.com from accessing the email.
What should you do?

  • A: Run the Get-MessageTrace cmdlet.
  • B: Run the Set-OMEMessageRevocation cmdlet.
  • C: Instruct User1 to delete the email from her Sent Items folder from Microsoft Outlook.
  • D: Run the New-ComplianceSearchAction cmdlet.
  • E: Instruct User1 to select Remove external access from Microsoft Outlook on the web.

Question 20

You have a Microsoft 365 tenant.
You discover that email does NOT use Microsoft Office 365 Message Encryption (OME).
You need to ensure that OME can be applied to email.
What should you do first?

  • A: Enable Microsoft Defender for Office 365.
  • B: Activate Azure Information Protection.
  • C: Activate Azure Rights Management (Azure RMS).
  • D: Create an Azure key vault.

Question 21

HOTSPOT -
You plan to implement a sensitive information type based on a trainable classifier. The sensitive information type will identify employment contracts.
You need to copy the required files to Microsoft SharePoint Online folders to train the classifier.
What should you use to seed content and test the classifier? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 22

HOTSPOT -
You plan to create a custom trainable classifier based on an organizational from template.
You need to identify which role-based access control (RBAC) role is required to create the trainable classifier and where to store the seed content for the trainable classifier. The solution must use the principle of least privilege.
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 23

HOTSPOT -
You have a Microsoft 365 tenant named contoso.com that contains two users named User1 and User2. The tenant uses Microsoft Office 365 Message Encryption
(OME).
User1 plans to send emails that contain attachments as shown in the following table.

Image 1

User2 plans to send emails that contain attachments as shown in the following table.

Image 2

For which emails will the attachments be protected? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 3

Question 24

You have a Microsoft 365 tenant.
You create the following:
✑ A sensitivity label
✑ An auto-labeling policy
You need to ensure that the sensitivity label is applied to all the data discovered by the auto-labeling policy.
What should you do first?

  • A: Enable insider risk management.
  • B: Create a trainable classifier.
  • C: Run the Enable-TransportRule cmdlet.
  • D: Run the policy in simulation mode.

Question 25

HOTSPOT -
You have the retention label policy shown in the Policy exhibit. (Click the Policy tab.)

Image 1

Users apply the retention label policy to files and set the asset ID as shown in the following table.

Image 2

On December 1, 2020, you create the event shown in the Event exhibit. (Click the Event tab.)

Image 3

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 4
Page 1 of 14 • Questions 1-25 of 345

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!