Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
To which user or users must you grant the Sensitivity label administrator role?
You need to meet the technical requirements for the creation of the sensitivity labels. To which user or users must you grant the Sensitivity label administrator role?A . Admin1, Admin2, Admin4, and Admin5 onlyB . Admin1, Admin2, and Admin3 onlyC . Admin1 onlyD . Admin1 and Admin4 onlyE . Admin1...
How should you configure the regular expression to detect the content?
HOTSPOT You use project codes that have a format of three alphabetical characters that represent the project type, followed by three digits, for example Abc123. You need to create a new sensitive info type for the project codes. How should you configure the regular expression to detect the content? To...
What should you do?
Your company has a Microsoft 365 tenant that uses a domain named contoso. The company uses Microsoft Office 365 Message Encryption (OMI) to encrypt email sent to users in fabrikam.com. A user named User1 erroneously sends an email to user2@fabrikam You need to disable [email protected] from accessing the email. What...
What is the effect of applying the policy?
You have a Microsoft OneDrive for Business folder that contains the files shown in the following table. In Microsoft Cloud App Security, you create a file policy to automatically apply a classification. What is the effect of applying the policy?A . The policy will apply to only the .docx and...
What should you configure in the policy rule?
You are configuring a data loss prevention (DLP) policy to report when credit card data is found on a Windows 10 device joined to Azure Active Directory (Azure AD). You plan to use information from the policy to restrict the ability to copy the sensitive data to the clipboard. What...
To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?
You have a Microsoft 365 E5 tenant and the Windows 10 devices shown in the following table. To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?A . Device1, Device3, and Device4 onlyB . Device1, Device2, Device3, and Device4C . Device1 and Device2 onlyD ....
What should you recommend?
You need to recommend a solution to configuration the Microsoft 365 Records management settings by using the CSV file must meet the compliance requirements. What should you recommend?A . From the Microsoft 365 compliance center, import the CSV file to a file plan.B . Use EdmUploadAgent.exe to upload a hash...
Does this meet the goal?
You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP). You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD). You need to ensure that Endpoint DLP policies can protect content on the computers. Solution: You enroll...
How should you complete the command?
HOTSPOT You create a retention label policy named Contoso_policy that contains the following labels. ✑ 10 years then delete ✑ 5 years then delete ✑ Do not retain Contoso_Policy is applied to content In Microsoft Sharepoint Online sites. After a couple of days, yon discover the following messages on the...