Exam Details

  • Exam Code
    :SC-400
  • Exam Name
    :Microsoft Information Protection Administrator
  • Certification
    :Role-based
  • Vendor
    :Microsoft
  • Total Questions
    :309 Q&As
  • Last Updated
    :May 11, 2024

Microsoft Role-based SC-400 Questions & Answers

  • Question 11:

    You have a Microsoft 365 tenant that uses the following sensitivity labels:

    1.

    Confidential

    2.

    Internal

    3.

    External

    The labels are published by using a label policy named Policy1.

    Users report that Microsoft Office for the web apps do not display the Sensitivity button. The Sensitivity button appears in Microsoft 365 Apps that are installed locally.

    You need to ensure that the users can apply sensitivity labels to content when they use Office for the web apps.

    What should you do?

    A. Modify the scope of the confidential label.

    B. Modify the publishing settings of Policy1.

    C. Enable sensitivity label support for Office files in Microsoft SharePoint Online and OneDrive.

    D. Run the Execute-AzureAdiabelSync cmdlet.

  • Question 12:

    You have a Microsoft 365 E5 tenant that contains a user named User1.

    You need to identify the type and number of holds placed on the mailbox of User1.

    What should you do first?

    A. From the Microsoft 365 compliance center, create an eDiscovery case.

    B. From Exchange Online PowerShell, run the Get-Mailbox cmdlet.

    C. From the Microsoft 365 compliance center, run a content search.

    D. From Exchange Online PowerShell, run the Get-HoldCompliancePolicy cmdlet.

  • Question 13:

    You have a Microsoft 365 tenant that uses Microsoft Teams.

    You need to ensure that all internal communication is stored for a minimum of seven years.

    What should you create first?

    A. a retention label

    B. a Microsoft SharePoint Online site

    C. a Microsoft Exchange Online shared mailbox

    D. a retention label policy

  • Question 14:

    You have a Microsoft 365 E5 tenant that contains the policies shown in the following table.

    A file named File1 has all the policies applied. How long will File1 be retained?

    A. File1 will be deleted automatically after seven years.

    B. File1 will be deleted automatically after five years.

    C. File1 will be retained until the file is deleted manually.

    D. File1 will be deleted automatically after 10 years.

  • Question 15:

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

    You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

    You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

    Solution: From the Cloud App Security portal, you create an app discovery policy.

    Does this meet the goal?

    A. Yes

    B. No

  • Question 16:

    You need to protect documents that contain credit card numbers from being opened by users outside your company. The solution must ensure that users at your company can open the documents. What should you use?

    A. a sensitivity label policy

    B. a sensitivity label

    C. a retention policy

    D. a data loss prevention (DLP) policy

  • Question 17:

    You have a Microsoft OneDrive for Business folder that contains the files shown in the following table.

    In Microsoft Cloud App Security, you create a file policy to automatically apply a classification. What is the effect of applying the policy?

    A. The policy will apply to only the .docx and .txt files. The policy will classify the files within 24 hours.

    B. The policy will apply to all the files. The policy will classify only 100 files daily.

    C. The policy will apply to only the .docx files. The policy will classify only 100 files daily.

    D. The policy will apply to only the .docx and .txt files. The policy will classify the files immediately.

  • Question 18:

    You have a Microsoft 365 tenant that contains a Microsoft SharePoint Online site named Site1. You have the users shown in the following table.

    You create a data loss prevention (DLP) policy for Site1 that detects credit card number information. You configure the policy to use the following protection action:

    When content matches the policy conditions, show policy tips to users and send them an email notification.

    You use the default notification settings.

    To Site1, User1 uploads a file that contains a credit card number.

    Which users receive an email notification?

    A. Used and User2 only

    B. Used and User4 only

    C. Used, User2, User3, and User4

    D. Used only

    E. Used and User3 only

  • Question 19:

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while

    others might not have a correct solution.

    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

    You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

    You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

    You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

    Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add the application to the unallowed apps list.

    Does this meet the goal?

    A. Yes

    B. No

  • Question 20:

    You have a Microsoft 365 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.

    You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP). Which devices support Endpoint DLP?

    A. Device5 only

    B. Device2 only

    C. Device 1, Device2, Device3, Device4, and Device5

    D. Device3 and Device4 only

    E. Device1 and Device2 only

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SC-400 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.