Which solution should you use for each requirement?
DRAG DROP You have a Microsoft 365 E5 tenant. You need to implement compliance solutions that meet the following requirements: • Use a file plan to manage retention labels. • Identify, monitor, and automatically protect sensitive information. • Capture employee communications for examination by designated reviewers. Which solution should you...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Which application should you use to create the template, and in which file format should the template be saved?
HOTSPOT You have a Microsoft 365 tenant. You need to create a custom Compliance Manager assessment template. Which application should you use to create the template, and in which file format should the template be saved? To answer, select the appropriate options in the answer area. NOTE: Each correct selection...
Which option should you select?
You need to create the Safe Attachments policy to meet the technical requirements. Which option should you select?A . ReplaceB . Enable redirectC . BlockD . Dynamic DeliveryView AnswerAnswer: D Explanation: Reference: https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/safe-attachments.md
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you do from the Security & Compliance admin center?
You have a Microsoft 365 subscription. You need to identify which administrative users performed eDiscovery searches during the past week. What should you do from the Security & Compliance admin center?A . Perform a content searchB . Create a supervision policyC . Create an eDiscovery caseD . Perform an audit...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you recommend?
You have a Microsoft 365 E5 tenant. You plan to deploy 1.000 new iOS devices to users. The devices will be shipped directly from the supplier to the users. You need to recommend a Microsoft Intune enrollment option that meets the following requirements: • Minimizes user interaction • Minimizes administrative...
For which activities should you search and by which field should you filter in the audit log search?
Topic 6, Misc. Questions HOTSPOT You have a Microsoft 365 subscription. Your network uses an IP address space of 51.40.15.0/24. An Exchange Online administrator recently created a role named Role1 from a computer on the network. You need to identify the name of the administrator by using an audit log...