Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

SC-400 Microsoft Information Protection Administrator Questions and Answers

Questions 4

You need to recommend a solution that meets the executive requirements. What should you recommend?

Options:

A.

From the Microsoft 365 compliance center, create a retention policy.

B.

From the Exchange admin center, enable archive mailboxes.

C.

From the Microsoft 365 compliance center, create a retention label.

D.

From the Microsoft 365 compliance center, create a DLP policy.

Buy Now
Questions 5

Task 2

You discover that all users can apply the Confidential - Finance label.

You need to ensure that the Confidential - Finance label is available only to the members of the Finance Team group.

Options:

Buy Now
Questions 6

Task 4

You need to block users from sending emails containing information that is subject to Payment Card Industry Data Security Standard (PCI OSS). The solution must affect only emails.

Options:

Buy Now
Questions 7

Task 6

You plan to implement Endpoint data loss prevention (Endpoint DLP) policies for computers that run Windows.

Users have an application named App1 that stores data locally in a folder named C:\app1\data.

You need to prevent the folder from being monitored by Endpoint DLP.

Options:

Buy Now
Questions 8

Task 3

You plan to automatically apply a watermark to the document1 of a project named Falcon.

You need to create a label that will add a watermark of "Project falcon' in red. size-12 font diagonally across the documents.

Options:

Buy Now
Questions 9

How many files in Site2 will be visible to User1 and User2 after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

SC-400 Question 9

Options:

Buy Now
Questions 10

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

SC-400 Question 10

Options:

Buy Now
Questions 11

You need to meet the technical requirements for the creation of the sensitivity labels. Which administrative users are currently missing the Sensitivity label administrator role?

Options:

A.

Admin1 only

B.

Admm1, Admin2, Admin4, and Admin5 only

C.

Admin 1. Admin2, and Admin3 only

D.

Admin 1 and Admin5 only

E.

Admin 1 and Admin4 only

Buy Now
Questions 12

You need to meet the technical requirements for the Site3 documents.

What should you create?

Options:

A.

a retention label policy and a retention label that uses an event

B.

a sensitive info type that uses a dictionary and a sensitivity label

C.

a sensitive info type that uses a regular expression and a sensitivity label

D.

a retention policy that has Only delete items when they reach a certain age selected

Buy Now
Questions 13

You need to meet the technical requirements for the confidential documents.

What should you created first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 Question 13

Options:

Buy Now
Questions 14

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-400 Question 14

Options:

Buy Now
Questions 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth is worth one point.

SC-400 Question 15

Options:

Buy Now
Questions 16

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder.

What should you configure in the Microsoft Purview compliance portal?

Options:

A.

a content scan job

B.

a Content Search query

C.

an auto-labeling policy

D.

a DLP policy

Buy Now
Questions 17

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder. What should you recommend?

Options:

A.

From the Microsoft 365 compliance center, configure a DLP policy.

B.

From the Microsoft 365 compliance center, configure a Content Search query.

C.

From the Microsoft 365 compliance center, configure an auto-labeling policy.

D.

From Azure Information Protection, configure a content scan job.

Buy Now
Questions 18

You need to recommend a solution that meets the Data Loss Prevention requirements for the HR department.

Which three actions should you perform? Each correct answer presents part of the solution. (Choose three.)

NOTE: Each correct selection is worth one point.

Options:

A.

Schedule EdmUploadAgent.exe to hash and upload a data file that contains employee information.

B.

Create a sensitive info type rule package that contains the EDM classification.

C.

Define the sensitive information database schema in the XML format.

D.

Create a sensitive info type rule package that contains regular expressions.

E.

Define the sensitive information database schema in the CSV format.

Buy Now
Questions 19

You need to recommend a solution that meets the sales requirements.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-400 Question 19

Options:

Buy Now
Questions 20

You need to recommend a solution that meets the compliance requirements for Dropbox.

What should you recommend?

Options:

A.

Create a DLP policy that applies to devices.

B.

Create a file policy in Microsoft Defender for Cloud Apps that uses the built-in DLP inspection method.

C.

Create a retention label that enforces the item deletion settings.

D.

Edit an existing retention label that enforces the item deletion settings.

Buy Now
Questions 21

You need to recommend an information governance solution that meets the HR requirements for handling employment applications and resumes.

What is the minimum number of information governance solution components that you should create? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

SC-400 Question 21

Options:

Buy Now
Questions 22

You need to recommend a solution to configuration the Microsoft 365 Records management settings by using the CSV file must meet the compliance requirements.

What should you recommend?

Options:

A.

From the Microsoft 365 compliance center, import the CSV file to a file plan.

B.

Use EdmUploadAgent.exe to upload a hash of the CSV to a datastore.

C.

Use a PowerShell command that pipes the import csv cmdlet to the New-RetentionPolicy cmdlet.

D.

Use a PowerShell command that pipes the import-csv cmdlet to the New-Label cmdlet.

Buy Now
Questions 23

You have a Microsoft 365 E5 tenant that contains the policies shown in the following table.

SC-400 Question 23

A file named File1 has all the policies applied.

How long will File1 be retained?

Options:

A.

File1 will be deleted automatically after seven years.

B.

File1 will be deleted automatically after five years.

C.

File1 will be retained until the file is deleted manually.

D.

File1 will be deleted automatically after 10 years.

Buy Now
Questions 24

You have a data loss prevention (DLP) policy that has the advanced DLP rules shown in the following table.

SC-400 Question 24

You need to identify which rules will apply when content matches multiple advanced DLP rules.

Which rules should you identify? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

SC-400 Question 24

Options:

Buy Now
Questions 25

You enable archive mailboxes for all the users at your company.

The Default MRM Policy is shown in the MRM exhibit.

SC-400 Question 25

A Microsoft 365 retention label policy is shown in the Label Policy exhibit.

SC-400 Question 25

You need to identify the following:

    How many years until an email is archived?

    What should you modify to change the retention period for archiving?

What should you identify? To answer, select the appropriate options in the answer area.

NOTE:Each correct selection is worth one point.

SC-400 Question 25

Options:

Buy Now
Questions 26

You need to recommend a solution that meets the compliance requirements for Dropbox.

What should you recommend?

Options:

A.

Create a DLP policy that applies to Cloud App Security.

B.

Edit an existing retention label that enforces the item deletion settings.

C.

Create a retention label that enforces the item deletion settings.

D.

Create a DLP policy that applies to devices.

Buy Now
Questions 27

You need to implement a solution to encrypt email. The solution must meet the compliance requirements.

What should you create in the Exchange admin center and the Microsoft 36.S compliance center? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 Question 27

Options:

Buy Now
Questions 28

You need to recommend a solution that meets the compliance requirements for viewing DLP tooltip

justifications.

What should you recommend?

Options:

A.

Instruct the compliance department users to review the False positive and override report.

B.

Configure a Microsoft Power Automate workflow to route DLP notification emails to the compliance

department.

C.

Instruct the compliance department users to review the DLP incidents report.

D.

Configure an Azure logic app to route DLP notification emails to the compliance department.

Buy Now
Questions 29

You need to implement a solution that meets the compliance requirements for the Windows 10 computers.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each coned selection is worth one point.

Options:

A.

Deploy a Microsoft 36S Endpoint data loss prevention (Endpoint DLP) configuration package to the computers.

B.

Configure hybrid Azure AD join for all the computers.

C.

Configure the Microsoft Intune device enrollment settings.

D.

Configure a compliance policy in Microsoft Intune.

E.

auto in Microsoft Defender for Endpoint protection.

Buy Now
Questions 30

You have a Microsoft 365 E5 subscription that contains two users named User1 and Admin1. Admin1 manages audit retention policies for the subscription.

You need to ensure that the audit logs of User1 will be retained for 10 years.

What should you do first?

Options:

A.

Assign a Microsoft Purview Audit (Premium) add-on license to Admin1.

B.

Assign a 10-year audit log retention add-on license to User.

C.

Assign a Microsoft Purview Audit (Premium) add-on license to User1.

D.

Assign a 10-year audit log retention add-on license to Admin1.

Buy Now
Questions 31

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring a file policy in Microsoft Cloud App Security.

You need to configure the policy to apply to all files. Alerts must be sent to every file owner who is affected by the policy. The policy must scan for credit card numbers, and alerts must be sent to the Microsoft Teams site of the affected department.

Solution: You use the Built-in DLP inspection method and send alerts as email.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 32

You have a Microsoft 365 E5 subscription that uses Microsoft Teams and contains a user named User1.

You configure Microsoft Purview Information Barriers.

You need to identify which information barrier policies apply to User1.

Which cmdlet should you use?

Options:

A.

Get-OrganizationSegaent

B.

Get-InformationBarrierPoliciesApplicationStatus

C.

Get-InformtionBarrierPolicy

D.

Get-InformtionBarrierRecipientStatus

Buy Now
Questions 33

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need to deploy a compliance solution that will detect the accidental oversharing of information outside of an organization. The solution must minimize administrative effort.

What should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 Question 33

Options:

Buy Now
Questions 34

Your company has a Microsoft 365 tenant that uses a domain named contoso.

The company uses Microsoft Office 365 Message Encryption (OMI ) to encrypt email sent to users in fabrikam.com.

A user named User1 erroneously sends an email to user2@fabrikam

You need to disable user2@fabrikam.com from accessing the email.

What should you do?

Options:

A.

Run the New-ComplianceSearchAction cmdlet.

B.

Instruct User1 to delete the email from her Sent Items folder from Microsoft Outlook.

C.

Run the Get-MessageTrace Cmdlet.

D.

Run the Set-OMEMessageRevocation Cmdlet.

E.

instruct User1 to select Remove external access from Microsoft Outlook on the web.

Buy Now
Questions 35

You have a Microsoft 365 tenant.

You discover that email does NOT use Microsoft Office 365 Message Encryption (OME).

You need to ensure that OME can be applied to email.

What should you do first?

Options:

A.

Enable Microsoft Defender for Office 365.

B.

Activate Azure Information Protection.

C.

Activate Azure Rights Management (Azure RMS).

D.

Create an Azure key vault.

Buy Now
Questions 36

You have a Microsoft 365 E5 subscription that contains a user named User1.

You need to ensure that User1 can perform the following tasks:

• View the Privacy risk management Data profile page and subject rights request reports.

• Add approvers for subject rights requests.

The solution must follow the principle of least privilege.

To which role group should you add User1 for each task? To answer, drag the appropriate role groups to the correct tasks. Each role group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

SC-400 Question 36

Options:

Buy Now
Questions 37

You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.

On January 1, you create the sensitivity label shown in the following table.

SC-400 Question 37

On January 2, you publish Label1 to User1.

On January 3, User1 creates a Microsoft Word document named Doc1 and applies Label1 to the document.

On January 4, User2 edits Doc1.

On January 15, you increase the content expiry period for Label1 to 28 days.

When will access to Doc1 expire for User2?

Options:

A.

January 23

B.

January 24

C.

January 25

D.

January 31

Buy Now
Questions 38

You receive an email that contains a list of words that will be used for a sensitive information type.

You need to create a file that can be used as the source of a keyword dictionary.

In which format should you save the list?

Options:

A.

a JSON file that has an element for each word

B.

an ACCDB database file that contains a table named Dictionary

C.

an XML file that contains a keyword tag for each word

D.

a CSV file that contains words separated by commas

Buy Now
Questions 39

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD).

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You onboard the computers to Microsoft Defender fur Endpoint.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 40

You have a Microsoft SharePoint Online site that contains employee contracts in a document library named

Contracts.

The contracts must be treated as records in accordance with your company's records management policy.

You need to implement a solution to automatically mark all the contracts as records when they are uploaded to

Contracts.

Which two actions should you perform? Each correct answer presents part of the solution. (Choose two.)

NOTE: Each correct selection is worth one point.

Options:

A.

Create a sensitivity label.

B.

Create a retention label.

C.

Configure a default label on the Contracts document library.

D.

Create a retention policy.

E.

Create a SharePoint Records Center.

F.

Create a retention lock.

Buy Now
Questions 41

You have the files shown in the following table.

SC-400 Question 41

You configure a retention policy as shown in the exhibit.

SC-400 Question 41

The start of the retention period is based on when items are created. The current date is January 01, 2021.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE:Each correct selection is worth one point.

SC-400 Question 41

Options:

Buy Now
Questions 42

You need to ensure that documents in a Microsoft SharePoint Online site that contain a reference to Project

Alpha are retained for two years, and then deleted.

Which two objects should you create? Each correct answer presents part of the solution. (Choose two.)

NOTE: Each correct selection is worth one point.

Options:

A.

a retention policy

B.

an auto-apply label policy

C.

a sensitive info type

D.

a retention label

E.

a sensitivity label

F.

a publishing label policy

Buy Now
Questions 43

A compliance administrator recently created several data loss prevention (DLP) policies.

After the policies are created, you receive a higher than expected volume of DLP alerts.

You need to identify which rules are generating the alerts.

Which DLP report should you use?

Options:

A.

Third-party DLP policy matches

B.

DLP policy matches

C.

DLP incidents

D.

False positive and override

Buy Now
Questions 44

You have a Microsoft 365 tenant that uses data loss prevention (DLP).

You have a custom employee information form named Template 1.docx.

You need to create a classification rule package based on the document fingerprint of Templatel.docx.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-400 Question 44

Options:

Buy Now
Questions 45

You have a Microsoft 365 ES subscription that uses data loss prevention (DLP) to protect sensitive information.

You need to create scheduled reports that generate.

* DLP policy matches reported over the shortest frequency of time

* DLP incidents reported over the longest frequency of time

Which frequency should you configure for each repot? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 Question 45

Options:

Buy Now
Questions 46

You have Microsoft 365 E5 tenant that has a domain name of M365x925027.onmicrosoft.com.

You have a published sensitivity label.

The Encryption settings for the sensitivity label are configured as shown in the exhibit.

SC-400 Question 46

For each of the following statements, select Yes if statement is true. Otherwise, select No

NOTE:Each correct selection is worth one point.

SC-400 Question 46

Options:

Buy Now
Questions 47

You have a Microsoft 365 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.

SC-400 Question 47

You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).

Which devices support Endpoint DLP?

Options:

A.

Device5 only

B.

Device2 only

C.

Device 1, Device2, Device3, Device4, and Device5

D.

Device3 and Device4 only

E.

Device1 and Device2 only

Buy Now
Questions 48

Your company has a Microsoft 365 tenant that uses a domain named contoso.com.

You are implementing data loss prevention (DLP).

The company's default browser is Microsoft Edge.

During a recent audit, you discover that some users use Firefox and Google Chrome browsers to upload files labeled as Confidential to a third-party Microsoft SharePoint Online site that has a URL ofhttps://m365x076709.sharepoint.com . Users are blocked from uploading the confidential files to the site from Microsoft Edge.

You need to ensure that the users cannot upload files labeled as Confidential from Firefox and Google Chrome to any cloud services.

Which two actions should you perform? Each correct answer presents part of the solution. (Choose two.)

NOTE:Each correct selection is worth one point.

Options:

A.

From the Microsoft 365 Endpoint data loss prevention (Endpoint) DLP settings, add

m365x076709.sharepoint.com as a blocked service domain.

B.

Create a DLP policy that applies to the Devices location.

C.

From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, add Firefox and Google

Chrome to the unallowed browsers list.

D.

From the Microsoft 365 compliance center, onboard the devices.

E.

From the Microsoft 365 Endpoint data loss prevention (Endpoint) DLP settings, add contoso.com as an

allowed service domain.

Buy Now
Questions 49

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add a folderpath to the file path exclusions.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 50

You have a hybrid Microsoft 365 deployment that contains the users shown in the following table.

SC-400 Question 50

You need to perform an eDiscovery content search.

Which user's data can be included in the content search? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-400 Question 50

Options:

Buy Now
Exam Code: SC-400
Exam Name: Microsoft Information Protection Administrator
Last Update: Jun 9, 2025
Questions: 329

PDF + Testing Engine

$61.25  $174.99

Testing Engine

$47.25  $134.99
buy now SC-400 testing engine

PDF (Q&A)

$40.25  $114.99
buy now SC-400 pdf