Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

microsoft SC_400

Custom view settings

Exam contains 345 questions

Page 7 of 58
Question 37 🔥

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring a file policy in Microsoft Cloud App Security.You need to configure the policy to apply to all files. Alerts must be sent to every file owner who is affected by the policy. The policy must scan for credit card numbers, and alerts must be sent to the Microsoft Teams site of the affected department.Solution: You use the Data Classification service inspection method and send alerts to Microsoft Power Automate.Does this meet the goal?

Highly voted
Discussion of the question
Question 38 🔥

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring a file policy in Microsoft Cloud App Security.You need to configure the policy to apply to all files. Alerts must be sent to every file owner who is affected by the policy. The policy must scan for credit card numbers, and alerts must be sent to the Microsoft Teams site of the affected department.Solution: You use the Build-in DLP inspection method and send alerts to Microsoft Power Automate.Does this meet the goal?

Highly voted
Discussion of the question
Question 39 🔥

Your company has a Microsoft 365 tenant that uses a domain named contoso.com.You are implementing data loss prevention (DLP).The company's default browser is Microsoft Edge.During a recent audit, you discover that some users use Firefox and Google Chrome browsers to upload files labeled as Confidential to a third-party MicrosoftSharePoint Online site that has a URL of https://m365x076709.sharepoint.com. Users are blocked from uploading the confidential files to the site from MicrosoftEdge.You need to ensure that the users cannot upload files labeled as Confidential from Firefox and Google Chrome to any cloud services.Which two actions should you perform? Each correct answer presents part of the solution. (Choose two.)NOTE: Each correct selection is worth one point.

Highly voted
Highly voted
Discussion of the question
Question 40 🔥

HOTSPOT -You have a Microsoft 365 tenant that uses Microsoft Teams.You create a data loss prevention (DLP) policy to prevent Microsoft Teams users from sharing sensitive information.You need to identify which locations must be selected to meet the following requirements:✑ Documents that contain sensitive information must not be shared inappropriately in Microsoft Teams.✑ If a user attempts to share sensitive information during a Microsoft Teams chat session, the message must be deleted immediately.Which three locations should you select? To answer, select the appropriate locations in the answer area. (Choose three.)NOTE: Each correct selection is worth one point.Hot Area:

Discussion of the question
Question 41 🔥

HOTSPOT -You have a data loss prevention (DLP) policy that has the advanced DLP rules shown in the following table.You need to identify which rules will apply when content matches multiple advanced DLP rules.Which rules should you identify? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area:

Discussion of the question
Question 42 🔥

You receive an email that contains a list of words that will be used for a sensitive information type.You need to create a file that can be used as the source of a keyword dictionary.In which format should you save the list?

Highly voted
Discussion of the question

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.
SC_400 questions • Exam prepare