Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

SC-401 Administering Information Security in Microsoft 365 Questions and Answers

Questions 4

You have a Microsoft 36S ES subscription that contains two Windows devices named Devicel1and Device2 Device1 has the default browser set to Microsoft Edge. Devke2 has the default browser set to Google Chrome.

You need to ensure that Microsoft Purview insider risk management can collect signals when a user copies files to a USB device by using their default browser.

What should you deploy to each device? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 4

Options:

Buy Now
Questions 5

You have a Microsoft 365 E5 subscription. The subscription contains a user named User1 and the sensitivity labels shown in the following table.

SC-401 Question 5

You publish the labels to User1.

The subscription contains the files shown in the following table.

SC-401 Question 5

Which files can Microsoft 365 Copilot summarize for User1?

Options:

A.

File2only

B.

File3 only

C.

File2 and File3 only

D.

File1, File2. and File3

Buy Now
Questions 6

You have a Microsoft 36S ES subscription

You plan to create an met data match (EDM) classifier named EDM1.

You need to grant permissions to hash and upload the sensitive ^formation source table for EDMI. What should you create first?

Options:

A.

a Microsoft Entra enterprise application named EDM.DataUploaders

B.

a Microsoft Purview role group named EDM.DataUploaders

C.

a security group named EDM.DataUploaders

D.

a Microsoft Entra app registration named EDM.DataUploaders

E.

a Microsoft 365 group named EDM.Datauploaders

Buy Now
Questions 7

You have a Microsoft 365 E5 subscription that contains the adaptive scopes shown in the following table.

SC-401 Question 7

You create the retention policies shown in the following table.

SC-401 Question 7

Which retention policies support a preservation lock?

Options:

A.

RPolicy2only

B.

RPolicy3on1y

C.

RPolicy1 and RPolicy2 only

D.

RPolicy1 and RPolicy3 only

E.

RPolicy1, RPolicy2, and RPolicy3

Buy Now
Questions 8

You have a Microsoft 565 E5 subscription.

You plan to use Microsoft Purview insider risk management.

You need to create an insider risk management policy that will detect data theft from Microsoft SharePoint Online by users that submitted their resignation or are near their employment termination date.

What should you do first?

Options:

A.

Configure a HR data connector.

B.

Configure Office indicators.

C.

Configure a Physical badging connector.

D.

Onboard devices to Microsoft Defender for Endpoint.

Buy Now
Questions 9

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need ensure that an incident will be generated when a user visits a phishing website.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 9

Options:

Buy Now
Questions 10

You have a Microsoft 36S ES subscription that contains the devices shown in the following table.

SC-401 Question 10

You publish Microsoft Purview Information Protection sensitivity labels.

You plan to deploy the information protection client to the devices. The solution must ensure that the labels can be applied to sensitive images and documents

On which devices can you install the information protection client, and what should users use to apply labels? To answer, select the appropriate options in the answer area.

SC-401 Question 10

Options:

Buy Now
Questions 11

You have a Microsoft 365 E5 subscription. The subscription contains 500 Windows devices that are onboarded to Microsoft Purview.

You need to prevent users from sharing sensitive information with third-party generative Al websites. Which Microsoft Purview solution should you use?

Options:

A.

Information Protection

B.

Information Barriers

C.

Insider Risk Management

D.

Data Loss Prevention

Buy Now
Questions 12

You have a Microsoft 365 E5 subscription that contains two users named User! and User2.

You need to implement insider risk management. The solution must meet the following requirements:

• Ensure that User1 can create insider risk management policies.

• Ensure that User2 can use content captured by using insider risk management policies

• Follow the principle of least privilege.

To which role group should you add each user? To answer, drag the appropriate role groups to the correct users. Each role group may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

SC-401 Question 12

Options:

Buy Now
Questions 13

You have a Microsoft SharePoint Online site named Site1 that has the users shown in the following table.

SC-401 Question 13

You create the retention labels shown in the following table.

SC-401 Question 13

You publish the retention labels to Site1.

On March 1,2023, you assign the retention labels to the files shown in the following table.

SC-401 Question 13

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-401 Question 13

Options:

Buy Now
Questions 14

You have a Microsoft 365 E5 subscription.

You are implementing insider risk management.

You need to maximize the amount of historical data that is collected when an event is triggered.

What is the maximum number of days that historical data can be collected?

Options:

A.

30

B.

60

C.

90

D.

180

Buy Now
Questions 15

You have a Microsoft 365 subscription that contains a sensitivity label named Contoso Confidential.

You publish Contoso Confidential to all users.

Contoso Confidential is configured as shown in the Configuration exhibit. (Click the Configuration tab.)

SC-401 Question 15

The Access control settings of Contoso Confidential are configured as shown in the Access control exhibit. (Click the Access control tab.)

SC-401 Question 15

SC-401 Question 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-401 Question 15

Options:

Buy Now
Questions 16

You need to create a retention policy to delete content after seven years from the following locations:

• Exchange Online email

• SharePoint Online sites

• OneDrive accounts

• Microsoft 365 Groups

• Teams channel messages

• Teams chats

What is the minimum number of retention policies that you should create?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 17

DRAG DROP

You need to create a trainable classifier that can be used as a condition in an auto-apply retention label policy.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-401 Question 17

Options:

Buy Now
Questions 18

You are creating a DLP policy named Policy1 that will be applied to the locations as shown in the following exhibit.

SC-401 Question 18

Policy1 contains an advanced data loss prevention (DLP) rule named Rule1.

Which two conditions can you use in Rule1? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Document property is

B.

Attachment ' s file extension is

C.

Document size equals or is greater than

D.

Content is shared from Microsoft 365

E.

Content contains

Buy Now
Questions 19

You are creating a data loss prevention (DLP) policy that will apply to all available locations except Fabric and Power BI workspaces.

You configure an advanced DLP rule in the policy.

Which type of condition can you use in the rule?

Options:

A.

Sensitive info type

B.

Content search query

C.

Sensitive label

D.

Keywords

Buy Now
Questions 20

You have a Microsoft 365 subscription.

You identify the following data loss prevention (DLP) requirements:

• Send notifications to users if they attempt to send attachments that contain an EU Social Security Number (SSN) or Equivalent ID.

• Prevent any email messages that contain credit card numbers from being sent outside your organization.

• Block the external sharing of Microsoft OneDrive content that contains EU passport numbers.

• Send administrators email alerts if any rule matches occur.

What is the minimum number of DLP policies and rules you must create to meet the requirements? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 20

Options:

Buy Now
Questions 21

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.

SC-401 Question 21

You have the data loss prevention (DLP) policies shown in the following table.

SC-401 Question 21

From Insider risk management, you configure a priority user group named PriGroup1 that contains User3 as a member. You have the insider risk policies shown in the following table.

SC-401 Question 21

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-401 Question 21

Options:

Buy Now
Questions 22

You have a Microsoft 365 E5 subscription.

You plan to implement Microsoft Purview Insider Risk Management.

You obtain a file named File1.csv that contains employee resignation data.

You need to implement the HR data connector and upload File1.csv by using the connector.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-401 Question 22

Options:

Buy Now
Questions 23

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).

You have computers that run Windows 11 and have Microsoft 365 Apps installed. The computers are joined to a Microsoft Entra tenant.

You need to ensure that Endpoint DLP policies can protect content on the computers.

Solution: You enroll the computers in Microsoft Intune.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 24

You are configuring a data loss prevention (DLP) policy to report when credit card data is found on a Microsoft Entra joined Windows device.

You plan to use information from the policy to restrict the ability to copy the sensitive data to the clipboard.

What should you configure in the policy advanced DLP rule?

Options:

A.

an action

B.

the incident report

C.

user notifications

D.

user overrides

Buy Now
Questions 25

You have a Microsoft 365 E5 subscription.

You plan to implement Microsoft Purview insider risk management.

You implement the HR data connector.

You need to prepare the data that will be imported by the data connector.

In which format should you prepare the data?

Options:

A.

JSON

B.

CSV

C.

TSV

D.

XML

E.

PRN

Buy Now
Questions 26

HOTSPOT

You have a Microsoft 365 E5 subscription that has data loss prevention (DLP) implemented.

You plan to export DLP activity by using Activity explorer.

The exported file needs to display the sensitive info type detected for each DLP rule match.

What should you do in Activity explorer before exporting the data, and in which file format is the file exported? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 26

Options:

Buy Now
Questions 27

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-AdminAuditLogConfig -AdminAuditLogEnabled $true -AdminAuditLogCmdlets *Mailbox* command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 28

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You recently discovered that the developers at your company emailed Azure Storage Account keys in plain text to third parties.

You need to ensure that when Azure Storage Account keys are emailed, the emails are encrypted.

Solution: You configure a mail flow rule that matches a sensitive info type.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 29

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-MailboxFolderPermission -Identity " User1 " -User User1@contoso.com -AccessRights Owner command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 30

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1. Site1 contains the files shown in the following table.

SC-401 Question 30

In the Microsoft Purview portal, you create a content search named Conlent1 and configure the search conditions as shown in the following exhibit.

SC-401 Question 30

Which files will be returned by Content1?

Options:

A.

File2.docx only

B.

File3.docx only

C.

File1.docx and File2.docx only

D.

File1 .docx and File3.docx only

E.

File1 .docx, File2.docx, and File3.docx

Buy Now
Questions 31

You need to meet the retention requirement for the users ' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Buy Now
Questions 32

HOTSPOT

You need to meet the technical requirements for the confidential documents.

What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 32

Options:

Buy Now
Questions 33

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Buy Now
Questions 34

HOTSPOT

You are reviewing policies for the SharePoint Online environment.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-401 Question 34

Options:

Buy Now
Questions 35

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-401 Question 35

Options:

Buy Now
Questions 36

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 36

Options:

Buy Now
Exam Code: SC-401
Exam Name: Administering Information Security in Microsoft 365
Last Update: Apr 14, 2026
Questions: 203

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99