What should you do?

You are implementing a data classification solution. The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort. What should you do?A . Create a custom classifier.B ....

January 24, 2025 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You have a Microsoft 365 tenant that uses data loss prevention (DLP). You have a custom employee information form named Template 1.docx. You need to create a classification rule package based on the document fingerprint of Templatel.docx. Which three actions should you perform in sequence? To answer, move...

January 23, 2025 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

January 21, 2025 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 11, 2024 No Comments READ MORE +

To which user or users must you grant the Sensitivity label administrator role?

You need to meet the technical requirements for the creation of the sensitivity labels. To which user or users must you grant the Sensitivity label administrator role?A . Admin1, Admin2, Admin4, and Admin5 onlyB . Admin1, Admin2, and Admin3 onlyC . Admin1 onlyD . Admin1 and Admin4 onlyE . Admin1...

October 11, 2024 No Comments READ MORE +

How should you configure the regular expression to detect the content?

HOTSPOT You use project codes that have a format of three alphabetical characters that represent the project type, followed by three digits, for example Abc123. You need to create a new sensitive info type for the project codes. How should you configure the regular expression to detect the content? To...

October 11, 2024 No Comments READ MORE +

What should you do?

Your company has a Microsoft 365 tenant that uses a domain named contoso. The company uses Microsoft Office 365 Message Encryption (OMI) to encrypt email sent to users in fabrikam.com. A user named User1 erroneously sends an email to user2@fabrikam You need to disable [email protected] from accessing the email. What...

October 11, 2024 No Comments READ MORE +

What is the effect of applying the policy?

You have a Microsoft OneDrive for Business folder that contains the files shown in the following table. In Microsoft Cloud App Security, you create a file policy to automatically apply a classification. What is the effect of applying the policy?A . The policy will apply to only the .docx and...

October 11, 2024 No Comments READ MORE +

What should you configure in the policy rule?

You are configuring a data loss prevention (DLP) policy to report when credit card data is found on a Windows 10 device joined to Azure Active Directory (Azure AD). You plan to use information from the policy to restrict the ability to copy the sensitive data to the clipboard. What...

October 11, 2024 No Comments READ MORE +

To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?

You have a Microsoft 365 E5 tenant and the Windows 10 devices shown in the following table. To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?A . Device1, Device3, and Device4 onlyB . Device1, Device2, Device3, and Device4C . Device1 and Device2 onlyD ....

October 11, 2024 No Comments READ MORE +