SC-400 無料問題集「Microsoft Information Protection Administrator」
You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.
On January 1, you create the sensitivity label shown in the following table.
On January 2, you publish Label1 to User1.
On January 3, User1 creates a Microsoft Word document named Doc1 and applies Label1 to the document.
On January 4, User2 edits Doc1.
On January 15, you increase the content expiry period for Label1 to 28 days.
When will access to Doc1 expire for User2?
On January 1, you create the sensitivity label shown in the following table.
On January 2, you publish Label1 to User1.
On January 3, User1 creates a Microsoft Word document named Doc1 and applies Label1 to the document.
On January 4, User2 edits Doc1.
On January 15, you increase the content expiry period for Label1 to 28 days.
When will access to Doc1 expire for User2?
正解:B
解答を投票する
You have a Microsoft 365 subscription.
In Microsoft Exchange Online, you configure the mail flow rule shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
In Microsoft Exchange Online, you configure the mail flow rule shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
正解:

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.
You need to deploy a Microsoft Purview insider risk management solution that will generate an alert when users share sensitive information on Site1 with external recipients.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct answer is worth one point.
You need to deploy a Microsoft Purview insider risk management solution that will generate an alert when users share sensitive information on Site1 with external recipients.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct answer is worth one point.
正解:B、C
解答を投票する
You have a Microsoft 365 E5 tenant that contains a Microsoft SharePoint Online site named Site1 and a user named User1. The tenant has auditing enabled You need to ensure that User! can perform disposition reviews.
The solution must use the principle of the least privilege What should you do?
The solution must use the principle of the least privilege What should you do?
正解:B
解答を投票する
You have a Microsoft 365 subscription.
You are creating a retention policy named Retention1 as shown in the exhibit. (Click the Exhibit tab.) You apply Retention1 to SharePoint sites and OneDrive accounts.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
You are creating a retention policy named Retention1 as shown in the exhibit. (Click the Exhibit tab.) You apply Retention1 to SharePoint sites and OneDrive accounts.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
正解:

You have a Microsoft 365 E5 subscription and use Microsoft Purview.
The subscription contains the following users:
* User1: Must be able to investigate policy matches, but unable to view the file content related to the match.
* User2: Must be able to investigate policy matches and view the file content related to the match.
* User3: Must be able to create, update, and delete Microsoft Priva Privacy Risk Management policies.
You need to add each user to a role group. The solution must follow the principle of least privilege.
To which role group should you add each user? To answer, drag the appropriate role groups to the correct users. Each group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
The subscription contains the following users:
* User1: Must be able to investigate policy matches, but unable to view the file content related to the match.
* User2: Must be able to investigate policy matches and view the file content related to the match.
* User3: Must be able to create, update, and delete Microsoft Priva Privacy Risk Management policies.
You need to add each user to a role group. The solution must follow the principle of least privilege.
To which role group should you add each user? To answer, drag the appropriate role groups to the correct users. Each group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
正解:

You have a Microsoft E5 365 tenant.
You need to ensure that you can use sensitivity labels to declare regulatory records.
Which PowerShell cmdlet should you run, and which type of policy should you use? To answer, select the appropriate options in the answer area.
NOTE:Each correct selection is worth one point.
You need to ensure that you can use sensitivity labels to declare regulatory records.
Which PowerShell cmdlet should you run, and which type of policy should you use? To answer, select the appropriate options in the answer area.
NOTE:Each correct selection is worth one point.
正解:

Explanation:
Reference:
https://docs.microsoft.com/e HYPERLINK "https://docs.microsoft.com/en-us/microsoft-365/compliance
/declare-records?view=o365-worldwide"n-us/microsoft-365/compliance/declare-records?view=o365- worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/ HYPERLINK "https://docs.microsoft.com/en-us
/microsoft-365/compliance/get-started-with-sensitivity-labels?view=o365-worldwide"get-started-with- sensitivity-labels?view=o365-worldwide
You have a hybrid Microsoft 365 deployment that contains the users shown in the following table.
You need to perform an eDiscovery content search.
Which user's data can be included in the content search? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to perform an eDiscovery content search.
Which user's data can be included in the content search? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
正解:

You have a Microsoft 365 E5 subscription.
You create an adaptive scope named Scope 1 as shown in the following exhibit.
You create a retention policy named Policy1 that includes Scope1.
To which three locations can you apply Policy1? To answer, select the appropriate locations in the answer area.
NOTE: Each correct selection is worth one point.
You create an adaptive scope named Scope 1 as shown in the following exhibit.
You create a retention policy named Policy1 that includes Scope1.
To which three locations can you apply Policy1? To answer, select the appropriate locations in the answer area.
NOTE: Each correct selection is worth one point.
正解:

You have a Microsoft 365 E5 tenant.
You create sensitivity labels as shown in the Sensitivity Labels exhibit.
The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content.
The sensitivity labels are published as shown in the Published exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE:Each correct selection is worth one point.
You create sensitivity labels as shown in the Sensitivity Labels exhibit.
The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content.
The sensitivity labels are published as shown in the Published exhibit.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE:Each correct selection is worth one point.
正解:

Explanation:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/complian HYPERLINK "https://docs.microsoft.com/en-us
/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide"ce/sensitivity HYPERLINK
"https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide"- labels?view=o365-worldwide
You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.
You create a sensitivity label that has the following settings:
* Name: Sensitivity1
* Define the scope for this label: Items
* Choose protection settings for files and emails: Mark the content of files o Add custom headers, footers, and watermarks to files and emails that have this label applied You make Sensitivity1 available to User1. User1 performs the following actions:
* Creates a new email
* Adds a file named File1 .docx as an attachment to the email
* Applies Sensitivity1 to the email
* Sends the email to User2
How will the email and the attachment be marked? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You create a sensitivity label that has the following settings:
* Name: Sensitivity1
* Define the scope for this label: Items
* Choose protection settings for files and emails: Mark the content of files o Add custom headers, footers, and watermarks to files and emails that have this label applied You make Sensitivity1 available to User1. User1 performs the following actions:
* Creates a new email
* Adds a file named File1 .docx as an attachment to the email
* Applies Sensitivity1 to the email
* Sends the email to User2
How will the email and the attachment be marked? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
正解:

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add the application to the unallowed apps list.
Does this meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add the application to the unallowed apps list.
Does this meet the goal?
正解:A
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)