Microsoft SC-400 Exam Practice Questions (P. 5)
- Full Access (352 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
HOTSPOT -
You have a Microsoft 365 tenant that uses Microsoft Teams.
You create a data loss prevention (DLP) policy to prevent Microsoft Teams users from sharing sensitive information.
You need to identify which locations must be selected to meet the following requirements:
✑ Documents that contain sensitive information must not be shared inappropriately in Microsoft Teams.
✑ If a user attempts to share sensitive information during a Microsoft Teams chat session, the message must be deleted immediately.
Which three locations should you select? To answer, select the appropriate locations in the answer area. (Choose three.)
NOTE: Each correct selection is worth one point.
Hot Area:

You have a Microsoft 365 tenant that uses Microsoft Teams.
You create a data loss prevention (DLP) policy to prevent Microsoft Teams users from sharing sensitive information.
You need to identify which locations must be selected to meet the following requirements:
✑ Documents that contain sensitive information must not be shared inappropriately in Microsoft Teams.
✑ If a user attempts to share sensitive information during a Microsoft Teams chat session, the message must be deleted immediately.
Which three locations should you select? To answer, select the appropriate locations in the answer area. (Choose three.)
NOTE: Each correct selection is worth one point.
Hot Area:

Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-microsoft-teams?view=o365-worldwide

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-microsoft-teams?view=o365-worldwide
send
light_mode
delete
Question #42
HOTSPOT -
You have a data loss prevention (DLP) policy that has the advanced DLP rules shown in the following table.

You need to identify which rules will apply when content matches multiple advanced DLP rules.
Which rules should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

You have a data loss prevention (DLP) policy that has the advanced DLP rules shown in the following table.

You need to identify which rules will apply when content matches multiple advanced DLP rules.
Which rules should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies?view=o365-worldwide
send
light_mode
delete
Question #43
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).
You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD).
You need to ensure that Endpoint DLP policies can protect content on the computers.
Solution: You deploy the Endpoint DLP configuration package to the computers.
Does this meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).
You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD).
You need to ensure that Endpoint DLP policies can protect content on the computers.
Solution: You deploy the Endpoint DLP configuration package to the computers.
Does this meet the goal?
- AYes
- BNo
Correct Answer:
A
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-endpoints?view=o365-worldwide
A
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-getting-started?view=o365-worldwide https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-endpoints?view=o365-worldwide
send
light_mode
delete
Question #44
You create a data loss prevention (DLP) policy. The Advanced DLP rules page is shown in the Rules exhibit.

The Review your settings page is shown in the Review exhibit.

You need to review the potential impact of enabling the policy without applying the actions.
What should you do?

The Review your settings page is shown in the Review exhibit.

You need to review the potential impact of enabling the policy without applying the actions.
What should you do?
- AEdit the policy, remove all the actions in DLP rule 1, and select I'd like to test it out first.
- BEdit the policy, remove the Restrict access to the content and Send incident report to Administrator actions, and then select Yes, turn it on right away.
- CEdit the policy, remove all the actions in DLP rule 1, and select Yes, turn it on right away.
- DEdit the policy, and then select I'd like to test it out first.Most Voted
Correct Answer:
D
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-a-dlp-policy-from-a-template?view=o365-worldwide
D
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-a-dlp-policy-from-a-template?view=o365-worldwide
send
light_mode
delete
Question #45
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.
Solution: You configure a mail flow rule that matches a sensitive info type.
Does this meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.
Solution: You configure a mail flow rule that matches a sensitive info type.
Does this meet the goal?
- AYesMost Voted
- BNo
Correct Answer:
A
A

Setting up a mail flow rule that identifies emails containing Azure Storage keys by matching to a predefined sensitive info type effectively ensures that such emails are encrypted before being sent. This is a proactive way to secure sensitive data like storage keys, adhering to best practices in information security management. Therefore, configuring this rule does indeed meet the goal of encrypting emails containing Azure Storage keys.
send
light_mode
delete
Question #46
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.
Solution: You create a data loss prevention (DLP) policy that has all locations selected.
Does this meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.
Solution: You create a data loss prevention (DLP) policy that has all locations selected.
Does this meet the goal?
- AYes
- BNoMost Voted
Correct Answer:
B
B

Creating a data loss prevention (DLP) policy is indeed a proactive step toward protecting sensitive information like Azure Storage keys. However, simply selecting "all locations" in a DLP policy isn't sufficient for ensuring the emails are specifically encrypted. It would be more effective to explicitly configure policies or use MailFlow rules in Exchange Online, dedicated solely to the encryption of outbound emails containing sensitive data types. This approach targets the protection mechanism directly to the email pathway, which is critical in this scenario to prevent the unsecured sharing of storage keys.
send
light_mode
delete
Question #47
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.
Solution: You create a data loss prevention (DLP) policy that has only the Exchange email location selected.
Does this meet the goal?
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.
Solution: You create a data loss prevention (DLP) policy that has only the Exchange email location selected.
Does this meet the goal?
- AYesMost Voted
- BNo
Correct Answer:
B
B

The correct answer to the question is indeed B (No). A DLP policy created with only the Exchange email location selected will not be sufficient to enforce encryption of Azure Storage keys sent via email. This is because while DLP policies can trigger certain protective actions based on the content of messages going through Exchange, this setup alone does not apply a universal encryption rule automatically across all email traffic, especially when specific configurations or exceptions are set for different types of content or locations. Thus, solely relying on this method for encrypting emails containing sensitive Azure storage keys is incomplete without broader rules or additional security practices in place.
send
light_mode
delete
Question #48
You are creating an advanced data loss prevention (DLP) rule in a DLP policy named Policy1 that will have all locations selected.
Which two conditions can you use in the rule? Each correct answer presents a complete solution. (Choose two.)
NOTE: Each correct selection is worth one point.
Which two conditions can you use in the rule? Each correct answer presents a complete solution. (Choose two.)
NOTE: Each correct selection is worth one point.
- AContent containsMost Voted
- BContent is shared from Microsoft 365Most Voted
- CDocument size equals or is greater than
- DAttachment's file extension is
- EDocument property is
Correct Answer:
AB
AB

Content contains and Content is shared from Microsoft 365 are correct conditions when creating a DLP rule with certain locations selected in Microsoft 365. It's important to recognize that the setting of conditions can vary depending on specific selections within the locations. When selecting "all locations," limitations may apply, such as only being able to use "Content Contains." Adjust location settings like deselecting devices or service-specific locations to access both conditions mentioned. Remember, experimenting in a controlled test environment provides clarity and concrete understanding of how these selections interact within DLP policies.
send
light_mode
delete
Question #49
You need to provide a user with the ability to view data loss prevention (DLP) alerts in the Microsoft 365 compliance center. The solution must use the principle of least privilege.
Which role should you assign to the user?
Which role should you assign to the user?
- ACompliance data administrator
- BSecurity operator
- CCompliance administrator
- DSecurity readerMost Voted
Correct Answer:
D
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-configure-view-alerts-policies?view=o365-worldwide
D
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-configure-view-alerts-policies?view=o365-worldwide
send
light_mode
delete
Question #50
You need to be alerted when users share sensitive documents from Microsoft OneDrive to any users outside your company.
What should you do?
What should you do?
- AFrom the Microsoft 365 compliance center, create a data loss prevention (DLP) policy.Most Voted
- BFrom the Microsoft 365 compliance center, start a data investigation.
- CFrom the Microsoft 365 compliance center, create an insider risk policy.
- DFrom the Cloud App Security portal, create an activity policy.
Correct Answer:
A
With a DLP policy, you can identify, monitor, and automatically protect sensitive items.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. From the Microsoft 365 compliance center, create a data loss prevention (DLP) policy.
2. From the Cloud App Security portal, create a file policy.
Other incorrect answer options you may see on the exam include the following:
✑ From the Exchange admin center, create a data loss prevention (DLP) policy.
✑ From the Microsoft 365 compliance center, create an insider risk policy.
✑ From the Azure portal, create an Azure Information Protection policy.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
A
With a DLP policy, you can identify, monitor, and automatically protect sensitive items.
Note:
There are several versions of this question in the exam. The question has two possible correct answers:
1. From the Microsoft 365 compliance center, create a data loss prevention (DLP) policy.
2. From the Cloud App Security portal, create a file policy.
Other incorrect answer options you may see on the exam include the following:
✑ From the Exchange admin center, create a data loss prevention (DLP) policy.
✑ From the Microsoft 365 compliance center, create an insider risk policy.
✑ From the Azure portal, create an Azure Information Protection policy.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
send
light_mode
delete
All Pages