What should you do?
You need to configure Office on the web to meet the technical requirements. What should you do?A . Assign the Global reader role to User1.B . Enable sensitivity labels for Office files in SharePoint Online and OneDrive.C . Configure an auto-labeling policy to apply the sensitivity labels.D . Assign the...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
To which role group should you add User2, and what should you use?
HOTSPOT You need to ensure that User2 can review the audit logs. The solutions must meet the technical requirements. To which role group should you add User2, and what should you use? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....
Which type of policy should you configure, and how many policies should you configure?
HOTSPOT You need to configure the information governance settings to meet the technical requirements. Which type of policy should you configure, and how many policies should you configure? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:
What should you create?
You need to protect the U.S. PII data to meet the technical requirements. What should you create?A . a data loss prevention (DLP) policy that contains a domain exceptionB . a Security & Compliance retention policy that detects content containing sensitive dataC . a Security & Compliance alert policy that...
Which DNS record should you recommend?
Topic 4, Fabrikam Overview Fabrikam, Inc. is an electronics company that produces consumer products. Fabrikam has 10,000 employees worldwide. Fabrikam has a main office in London and branch offices in major cities in Europe, Asia, and the United States. Existing Environment Active Directory Environment The network contains an Active Directory...
Which users should you identify?
HOTSPOT You have a Microsoft 365 E5 tenant that contains the users shown in the following table. You provision the private store in Microsoft Store for Business. You assign Microsoft Store for Business roles to the users as shown in the following table. You need to identify which users can...
You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit
HOTSPOT You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Using...
What should you use?
You need to configure just in time access to meet the technical requirements. What should you use?A . entitlement managementB . Azure AD Privileged Identity Management (PIM)C . access reviewsD . Azure AD Identity ProtectionView AnswerAnswer: B
What is the result of the DLP policies when the user sends an email?
DRAG DROP You have a Microsoft 365 subscription. In the Exchange admin center, you have a data loss prevention (DLP) policy named Policy1 that has the following configurations: - Block emails that contain financial data. - Display the following policy tip text: Message blocked. From the Security & Compliance admin...