What should you recommend?

You need to recommend a solution to configuration the Microsoft 365 Records management settings by using the CSV file must meet the compliance requirements. What should you recommend?A . From the Microsoft 365 compliance center, import the CSV file to a file plan.B . Use EdmUploadAgent.exe to upload a hash...

January 27, 2025 No Comments READ MORE +

In which format should you save the list?

You receive an email that contains a list of words that will be used for a sensitive information type. You need to create a file that can be used as the source of a keyword dictionary. In which format should you save the list?A . a JSON file that has...

January 27, 2025 No Comments READ MORE +

Which PowerShell module and cmdlet should you use?

HOTSPOT You have a Microsoft 365 E5 tenant. Data loss prevention (DLP) policies are applied to Exchange email, SharePoint sites, and OneDrive accounts locations. You need to use PowerShell to retrieve a summary of the DLP rule matches from the last seven days. Which PowerShell module and cmdlet should you...

January 24, 2025 No Comments READ MORE +

What should you do?

You are implementing a data classification solution. The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort. What should you do?A . Create a custom classifier.B ....

January 24, 2025 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You have a Microsoft 365 tenant that uses data loss prevention (DLP). You have a custom employee information form named Template 1.docx. You need to create a classification rule package based on the document fingerprint of Templatel.docx. Which three actions should you perform in sequence? To answer, move...

January 23, 2025 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

January 21, 2025 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 11, 2024 No Comments READ MORE +

To which user or users must you grant the Sensitivity label administrator role?

You need to meet the technical requirements for the creation of the sensitivity labels. To which user or users must you grant the Sensitivity label administrator role?A . Admin1, Admin2, Admin4, and Admin5 onlyB . Admin1, Admin2, and Admin3 onlyC . Admin1 onlyD . Admin1 and Admin4 onlyE . Admin1...

October 11, 2024 No Comments READ MORE +

How should you configure the regular expression to detect the content?

HOTSPOT You use project codes that have a format of three alphabetical characters that represent the project type, followed by three digits, for example Abc123. You need to create a new sensitive info type for the project codes. How should you configure the regular expression to detect the content? To...

October 11, 2024 No Comments READ MORE +

What should you do?

Your company has a Microsoft 365 tenant that uses a domain named contoso. The company uses Microsoft Office 365 Message Encryption (OMI) to encrypt email sent to users in fabrikam.com. A user named User1 erroneously sends an email to user2@fabrikam You need to disable [email protected] from accessing the email. What...

October 11, 2024 No Comments READ MORE +