You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information Protection as shown in the following exhibit
HOTSPOT You have a document in Microsoft OneDrive that is encrypted by using Microsoft Azure Information Protection as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth...
What should you create?
You need to protect the U.S. PII data to meet the technical requirements. What should you create?A . a data loss prevention (DLP) policy that contains a domain exceptionB . a Security & Compliance retention policy that detects content containing sensitive dataC . a Security & Compliance alert policy that...
You configure an anti-phishing policy as shown in the following exhibit
HOTSPOT You configure an anti-phishing policy as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/set-up-anti-phishing-policies#learn-about-atp-anti-phishing-policy-options
What should you do?
You have a Microsoft 365 subscription. You plan to enable Microsoft Azure Information Protection. You need to ensure that only the members of a group named PilotUsers can protect content What should you do?A . From the AADRM PowerShell module, run the set-AadrmonboardingControlPolicy cmdlet.B . From Azure Information Protection, create...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you do from the Security & Compliance admin center?
Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data. You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted. What should you...
On which server should you use the Defender for identity sensor?
On which server should you use the Defender for identity sensor?A . Server1B . Server2C . Server3D . Server4E . Servers5View AnswerAnswer: A Explanation: However, if the case study had required that the DCs can't have any s/w installed, then the answer would have been a standalone sensor on Server2....
You have a Microsoft 365 tenant named contoso.com
HOTSPOT You have a Microsoft 365 tenant named contoso.com. The tenant contains teasers shown in the following table. You have the eDiscovery cases shown in the following table. For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth...
Which three settings should you modify in the compliance policy?
HOTSPOT You have a Microsoft 365 E5 tenant that contains 500 Windows 10 devices and a Windows 10 compliance policy. You deploy a third-party antivirus solution to the devices. You need to ensure that the devices are marked as compliant. Which three settings should you modify in the compliance policy?...
Which profiles will be applied to each device?
HOTSPOT You have a Microsoft 365 E5 subscription that uses Microsoft Intune. You have devices enrolled in Intune as shown in the following table. You create the device configuration profiles shown in the following table. Which profiles will be applied to each device? To answer, select the appropriate options in...