What should you recommend?
You need to recommend a solution to configuration the Microsoft 365 Records management settings by using the CSV file must meet the compliance requirements. What should you recommend?A . From the Microsoft 365 compliance center, import the CSV file to a file plan.B . Use EdmUploadAgent.exe to upload a hash...
In which format should you save the list?
You receive an email that contains a list of words that will be used for a sensitive information type. You need to create a file that can be used as the source of a keyword dictionary. In which format should you save the list?A . a JSON file that has...
Which PowerShell module and cmdlet should you use?
HOTSPOT You have a Microsoft 365 E5 tenant. Data loss prevention (DLP) policies are applied to Exchange email, SharePoint sites, and OneDrive accounts locations. You need to use PowerShell to retrieve a summary of the DLP rule matches from the last seven days. Which PowerShell module and cmdlet should you...
What should you do?
You are implementing a data classification solution. The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort. What should you do?A . Create a custom classifier.B ....
Which three actions should you perform in sequence?
DRAG DROP You have a Microsoft 365 tenant that uses data loss prevention (DLP). You have a custom employee information form named Template 1.docx. You need to create a classification rule package based on the document fingerprint of Templatel.docx. Which three actions should you perform in sequence? To answer, move...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
To which user or users must you grant the Sensitivity label administrator role?
You need to meet the technical requirements for the creation of the sensitivity labels. To which user or users must you grant the Sensitivity label administrator role?A . Admin1, Admin2, Admin4, and Admin5 onlyB . Admin1, Admin2, and Admin3 onlyC . Admin1 onlyD . Admin1 and Admin4 onlyE . Admin1...
How should you configure the regular expression to detect the content?
HOTSPOT You use project codes that have a format of three alphabetical characters that represent the project type, followed by three digits, for example Abc123. You need to create a new sensitive info type for the project codes. How should you configure the regular expression to detect the content? To...
What should you do?
Your company has a Microsoft 365 tenant that uses a domain named contoso. The company uses Microsoft Office 365 Message Encryption (OMI) to encrypt email sent to users in fabrikam.com. A user named User1 erroneously sends an email to user2@fabrikam You need to disable [email protected] from accessing the email. What...