What should you do?
Your company has a Microsoft 365 tenant that uses a domain named contoso. The company uses Microsoft Office 365 Message Encryption (OMI) to encrypt email sent to users in fabrikam.com. A user named User1 erroneously sends an email to user2@fabrikam You need to disable [email protected] from accessing the email. What...
Which two conditions can you use in the rule?
You are creating an advanced data loss prevention (DLP) rule in a DLP policy named Policy 1 that will have all locations selected. Which two conditions can you use in the rule? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. (Choose two.)A ....
What is the minimum number of sensitivity labels and auto-labeling policies you should create?
HOTSPOT You need to implement an information compliance policy to meet the following requirements: Documents that contain passport numbers from the United States, Germany, Australia, and Japan must be identified automatically. When a user attempts to send an email or an attachment that contains a passport number, the user must...
How should you complete the PowerShell script?
HOTSPOT While creating a retention label, you discover that the following options are missing: ✑ Mark items as a record ✑ Mark items as a regulatory record You need to ensure that the options are available when you create retention labels in the Microsoft 365 compliance center. How should you...
Which files can User1 and User2 view?
HOTSPOT You have a Microsoft SharePoint Online site that contains the following files. Users are assigned roles for the site as shown in the following table. Which files can User1 and User2 view? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one...
What should you use?
You have a Microsoft 365 tenant. All Microsoft OneDrive for Business content is retained roe five years. A user named User1 left your company a year ago, after which the account of User 1 was deleted from Azure Active Directory (Azure AD) You need to recover an important file that...
What should you create?
You are planning a data loss prevention (DLP) solution that will apply to computers that run Windows 10. You need to ensure that when users attempt to copy a file that contains sensitive information to a USB storage device, the following requirements are met: * If the users are members...
To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?
You have a Microsoft 365 E5 tenant and the Windows 10 devices shown in the following table. To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?A . Device1, Device3, and Device4 onlyB . Device1, Device2, Device3, and Device4C . Device1 and Device2 onlyD ....
Does this meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP). You have computers that run Windows 10 and have Microsoft 365...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...