What should you create?
You need to protect the U.S. PII data to meet the technical requirements. What should you create?A . a data loss prevention (DLP) policy that contains a domain exceptionB . a Security & Compliance retention policy that detects content containing sensitive dataC . a Security & Compliance alert policy that...
What should you configure from the Cloud Discover settings?
You have a Microsoft 36S subscription. Your company purchases a new financial application named App1. From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and discover that many applications have a low score because they are missing information about domain registration and consumer popularity. You...
As of March, how long will the computers in each office remain supported by Microsoft?
HOTSPOT As of March, how long will the computers in each office remain supported by Microsoft? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: References: https://www.windowscentral.com/whats-difference-between-quality-updates-and-feature-updateswindows-10
What should you include in the recommendation?
You need to recommend a solution for the security administrator. The solution must meet the technical requirements. What should you include in the recommendation?A . Microsoft Azure Active Directory (Azure AD) Privileged Identity ManagementB . Microsoft Azure Active Directory (Azure AD) Identity ProtectionC . Microsoft Azure Active Directory (Azure AD)...
To which role should you assign each user?
HOTSPOT You have a Microsoft 365 subscription. You are configuring permissions for Security & Compliance. You need to ensure that the users can perform the tasks shown in the following table. The solution must use the principle of least privilege. To which role should you assign each user? To answer,...
You have a Microsoft 365 subscription that contains all the user data
HOTSPOT You have a Microsoft 365 subscription that contains all the user data. You plan to create the retention policy shown in the Locations exhibit. (Click the Locations tab.) You configure the Advanced retention settings as shown in the Retention exhibit. (Click the Retention tab.) The locations specified in the...
Which onboarding method should you use for each operating system?
DRAG DROP You have a Microsoft 365 subscription. You have the devices shown in the following table. You need to onboard the devices to Windows Defender Advanced Threat Protection (ATP). The solution must avoid installing software on the devices whenever possible. Which onboarding method should you use for each operating...
What should you do from the Security & Compliance admin center?
Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data. You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted. What should you...
Which report should the New York office auditors view?
Which report should the New York office auditors view?A . DLP policy matchesB . DLP false positives and overridesC . DLP incidentsD . Top Senders and RecipientsView AnswerAnswer: C Explanation: References: https://docs.microsoft.com/en-us/office365/securitycompliance/data-loss-prevention-policies
Which three actions should you perform in sequence from the Security & Compliance admin center?
DRAG DROP You need to meet the requirement for the legal department Which three actions should you perform in sequence from the Security & Compliance admin center? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. View...