Which report should the New York office auditors view?
Which report should the New York office auditors view?A . DLP policy matchesB . DLP false positives and overridesC . DLP incidentsD . Top Senders and RecipientsView AnswerAnswer: C Explanation: Reference: https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies This report also shows policy matches over time, like the policy matches report. However, the policy matches report...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which role should you assign to User1?
Which role should you assign to User1? Available Choices (select all choices that are correct)A . Hygiene ManagementB . Security ReaderC . Security AdministratorD . Records ManagementView AnswerAnswer: B
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which users can add apps to the private store in Microsoft Store for Business, and which users can install apps from the private store?
HOTSPOT You have a Microsoft 365 E5 tenant that contains the users shown in the following table. Users are assigned Microsoft Store for Business roles as shown in the following table. Which users can add apps to the private store in Microsoft Store for Business, and which users can install...
What should you create?
You need to meet the technical requirement for large-volume document retrieval. What should you create?A . a data loss prevention (DLP) policy from the Security & Compliance admin centerB . an alert policy from the Security & Compliance admin centerC . a file policy from Microsoft Cloud App SecurityD ....
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you create to ensure that the DLP policy can detect the customer IDs?
You have a Microsoft 365 subscription. Your company has a customer ID associated to each customer. The customer IDs contain 10 numbers followed by 10 characters. The following is a sample customer ID: 12-456-7890-abc-de-fghij. You plan to create a data loss prevention (DLP) policy that will detect messages containing customer...
What should you identify?
HOTSPOT You plan to implement the endpoint protection device configuration profiles to support the planned changes. You need to identify which devices will be supported, and how many profiles you should implement. What should you identify? To answer, select the appropriate options in the answer area. NOTE: Each correct selection...
Which authentication strategy should you implement for the pilot projects?
You need to ensure that all the sales department users can authenticate successfully during Project1 and Project2. Which authentication strategy should you implement for the pilot projects?A . pass-through authenticationB . pass-through authentication and seamless SSOC . password hash synchronization and seamless SSOD . password hash synchronizationView AnswerAnswer: C Explanation:...