Which three actions should you perform in sequence?
DRAG DROP You have a Microsoft 365 subscription. You have a site collection named SiteCollection1 that contains a site named Site2. Site2 contains a document library named Customers. Customers contains a document named Litware.docx. You need to remove Litware.docx permanently. Which three actions should you perform in sequence? To answer,...
Which two actions should you perform from the OneDrive admin center?
You have a Microsoft 365 subscription for a company named Contoso, Ltd. All data is in Microsoft 365. Contoso works with a partner company named Litware, Inc. Litware has a Microsoft 365 subscription. You need to allow users at Contoso to share files from Microsoft OneDrive to specific users at...
What should you do?
Your network contains an on-premises Active Directory domain. The domain contains servers that run Windows Server and have advanced auditing enabled. The security logs of the servers are collected by using a third-party SIEM solution. You purchase a Microsoft 365 subscription and plan to deploy Azure Advanced Threat Protection (ATP)...
Microsoft 365 Password: #HSP.ug?
CORRECT TEXT TION NO: 135 SIMULATION Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to...
To which groups can you apply Policy1?
HOTSPOT Your network contains an on-premises Active Directory domain named contoso.com. The domain contains the groups shown in the following table. The domain is synced to a Microsoft Azure Active Directory (Azure AD) tenant that contains the groups shown in the following table. You create an Azure Information Protection policy...
Microsoft 365 Password: #HSP.ug?
CORRECT TEXT TION NO: 135 SIMULATION Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to...
What is the effect of the policy when a user attempts to send an email messages that contains sensitive information?
You create a data loss prevention (DLP) policy as shown in the following shown: What is the effect of the policy when a user attempts to send an email messages that contains sensitive information?A . The user receives a notification and can send the email messageB . The user receives...
CORRECT TEXT
CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section....
CORRECT TEXT
CORRECT TEXT Please wait while the virtual machine loads. Once loaded, you may proceed to the lab section. This may take a few minutes, and the wait time will not be deducted from your overall test time. When the Next button is available, click it to access the lab section....
What should you create in Cloud App Security?
You have a Microsoft 365 E5 subscription You need to use Microsoft Cloud App Security to identify documents stored in Microsoft SharePomt Online that contain proprietary information. What should you create in Cloud App Security?A . a data source and a file policyB . a data source and an app...