HOTSPOT -You are implementing Microsoft Office 365 Message Encryption (OME) for a Microsoft 365 tenant named contoso.com.You need to meet the following requirements:✑ All email to a domain named fabrikam.com must be encrypted automatically.✑ Encrypted emails must expire seven days after they are sent.What should you configure for each requirement? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx.From the Cloud App Security portal, you discover the alert shown in the exhibit.You restore the file from quarantine.You need to prevent files that match the policy from being quarantined. Files that match the policy must generate an alert.What should you do?
You need to automatically apply a sensitivity label to documents that contain information about your company's network including computer names, IP addresses, and configuration information.Which two objects should you use? Each correct answer presents part of the solution. (Choose two.)NOTE: Each correct selection is worth one point.
HOTSPOT -You have a Microsoft SharePoint Online site named Site1 and a sensitivity label named Sensitivity1. Sensitivity1 adds a watermark and a header to content.You create a policy to automatically apply Sensitivity1 to emails in Microsoft Exchange Online and Site1.How will Sensitivity1 mark matching emails and Site1 documents? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:
You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.A user named User1 sends link-based, branded emails that are encrypted by using Microsoft Office 365 Advanced Message Encryption to the recipients shown in the following table.For which recipients can User1 revoke the emails?
You have a new Microsoft 365 tenant.You need to ensure that custom trainable classifiers can be created in the tenant.To which role should you be assigned to perform the configuration?