Which users should you identify?

HOTSPOT You have a Microsoft 365 E5 tenant that contains the users shown in the following table. You provision the private store in Microsoft Store for Business. You assign Microsoft Store for Business roles to the users as shown in the following table. You need to identify which users can...

September 20, 2024 No Comments READ MORE +

You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit

HOTSPOT You configure a data loss prevention (DLP) policy named DLP1 as shown in the following exhibit. Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Using...

September 20, 2024 No Comments READ MORE +

What should you use?

You need to configure just in time access to meet the technical requirements. What should you use?A . entitlement managementB . Azure AD Privileged Identity Management (PIM)C . access reviewsD . Azure AD Identity ProtectionView AnswerAnswer: B

September 19, 2024 No Comments READ MORE +

What is the result of the DLP policies when the user sends an email?

DRAG DROP You have a Microsoft 365 subscription. In the Exchange admin center, you have a data loss prevention (DLP) policy named Policy1 that has the following configurations: - Block emails that contain financial data. - Display the following policy tip text: Message blocked. From the Security & Compliance admin...

September 19, 2024 No Comments READ MORE +

What should you do?

You have a Microsoft 365 tenant. You need to retain Azure Active Directory (Azure AD) audit logs for two years. Administrators must be able to query the audit log information by using the Azure Active Directory admin center. What should you do? To answer, select the appropriate options in the...

September 19, 2024 No Comments READ MORE +

What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security?

HOTSPOT You need to meet the technical requirement for log analysis. What is the minimum number of data sources and log collectors you should create from Microsoft Cloud App Security? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer:...

September 18, 2024 No Comments READ MORE +

To which resources can you apply a sensitivity label by using an auto-labeling policy?

You have a Microsoft 365 E5 tenant that contains the resources shown in the following table. To which resources can you apply a sensitivity label by using an auto-labeling policy?A . Mailbox1 and Site1 onlyB . Mailbox1, Account1, and Site1 onlyC . Account1 and Site1 onlyD . Mailbox1, Account1, Site1,...

September 18, 2024 No Comments READ MORE +

What should you do in the Microsoft Endpoint Manager admin center?

You need to configure the compliance settings to meet the technical requirements. What should you do in the Microsoft Endpoint Manager admin center?A . From Compliance policies, modify the Notifications settings.B . From Locations, create a new location for noncompliant devices.C . From Retire Noncompliant Devices, select Clear All Devices...

September 18, 2024 No Comments READ MORE +

You have a Microsoft 365 tenant that contains a Windows 10 device named Device1 and the Microsoft Endpoint Manager policies shown in the following table.

You have a Microsoft 365 tenant that contains a Windows 10 device named Device1 and the Microsoft Endpoint Manager policies shown in the following table. A . only the settings of Policy!B . only the settings of Policy2C . only the settings of Policy3D . no settingsView AnswerAnswer: C

September 18, 2024 No Comments READ MORE +

Which two actions can you perform on the retention policy? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point?

You have a Microsoft 365 subscription that uses Security & Compliance retention policies. You implement a preservation lock on a retention policy that is assigned to all executive users. Which two actions can you perform on the retention policy? Each correct answer presents a complete solution. NOTE: Each correct selection...

September 18, 2024 No Comments READ MORE +