web analytics

Solution: From Windows PowerShell, you run the New-ComplianceSecurityFilter cmdlet with the appropriate parameters. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to view the IP address from which a user synced a Microsoft SharePoint library. What should you do?

You have a Microsoft 365 subscription. You need to view the IP address from which a user synced a Microsoft SharePoint library. What should you do? A. From the SharePoint

You need to prevent the user from sharing the credit card information by using email and SharePoint. What should you configure?

You are testing a data loss prevention (DLP) policy to protect the sharing of credit card information with external users. During testing, you discover that a user can share credit

You need to investigate user activity in Microsoft 365, including from where users signed in, which applications were used, and increases in activity during the past month. The solution must minimize administrative effort. Which admin center should you use?

You have a Microsoft 365 subscription. You need to investigate user activity in Microsoft 365, including from where users signed in, which applications were used, and increases in activity during

You need to automatically protect email messages that contain the word Confidential in the subject line. What should you create?

Your company has a Microsoft 365 subscription. You implement Microsoft Azure Information Protection. You need to automatically protect email messages that contain the word Confidential in the subject line. What

You need to export the results of the content search. What do you need to download the report?

You have a Microsoft 365 subscription. From the Security & Compliance admin center, you create a content search of all the mailboxes that contain the work ProjectX. You need to

You need to ensure that you can implement data loss prevention (DLP) policies for the uploaded file based on the Confidential classification. What should you do first?

Your company uses on-premises Windows Server File Classification Infrastructure (FCI). Some documents on the on-premises file servers are classified as Confidential. You migrate the files from the on-premises file servers

In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX. What should you do?

You have a Microsoft 365 subscription. All users have their email stored in Microsoft Exchange Online. In the mailbox of a user named User1, you need to preserve a copy

You discover that users are incorrectly marking content as false positive and bypassing the DLP policy. You need to prevent the users from bypassing the DLP policy. What should you configure?

You have a Microsoft 365 subscription. You configure a data loss prevention (DLP) policy. You discover that users are incorrectly marking content as false positive and bypassing the DLP policy.

You enable auditing for your organization. What is the maximum amount of time data will be retained in the Microsoft 365 audit log?

You have a Microsoft 365 subscription. All users are assigned a Microsoft 365 E3 license. You enable auditing for your organization. What is the maximum amount of time data will

You need to ensure that User1 can place a hold on all mailbox content. Which role should you assign to User1?

You have a Microsoft 365 subscription. You have a user named User1. You need to ensure that User1 can place a hold on all mailbox content. Which role should you

What should you use?

Your company has a Microsoft 365 subscription. You need to identify which users performed the following privileged administration tasks: Deleted a folder from the second-stage Recycle Bin of Microsoft SharePoint

You need to ensure that only the members of a group named PilotUsers can protect content. What should you do?

You have a Microsoft 365 subscription. You plan to enable Microsoft Azure Information Protection. You need to ensure that only the members of a group named PilotUsers can protect content.

You need to notify the manager of the human resources department when a user in the department shares a file or folder from the department’s Microsoft SharePoint site. What should you do?

You need to notify the manager of the human resources department when a user in the department shares a file or folder from the department’s Microsoft SharePoint site. What should

You need to be notified if a file stored in Microsoft SharePoint Online contains credit card information. The file must be removed automatically from its current location until an administrator can review its contents. What should you use?

Your company has a Microsoft 365 tenant. The company sells products online and processes credit card information. You need to be notified if a file stored in Microsoft SharePoint Online

Which three activities will be audited by default? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

You create a new Microsoft 365 subscription and assign Microsoft 365 E3 licenses to 100 users. From the Security & Compliance admin center, you enable auditing. You are planning the

You need to ensure that a security administrator named SecAdmin1 can always read and inspect data protected by Azure Rights Management (Azure RMS). What should you do?

You deploy Microsoft Azure Information Protection. You need to ensure that a security administrator named SecAdmin1 can always read and inspect data protected by Azure Rights Management (Azure RMS). What

Which three actions should you perform before you import the data? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

You plan to use the Security & Compliance admin center to import several PST files into Microsoft 365 mailboxes. Which three actions should you perform before you import the data?

You need to meet the technical requirement for large-volume document retrieval. What should you create?

You need to meet the technical requirement for large-volume document retrieval. What should you create? A. an activity policy from Microsoft Cloud App Security B. a data loss prevention (DLP)

On which server should you install the Azure ATP sensor?

On which server should you install the Azure ATP sensor? A. Server1 B. Server2 C. Server3 D. Server4 E. Server5 Answer: A

You need to ensure that an alert is generated only when malware is detected in more than five documents stored in SharePoint Online during a period of 10 minutes. What should you do first?

You have a Microsoft 365 subscription. You recently configured a Microsoft SharePoint Online tenant in the subscription. You plan to create an alert policy. You need to ensure that an

In the mailbox of a user named User1, you need to preserve a copy of all the email messages that contain the word ProjectX. What should you do?

You have a Microsoft 365 subscription. All users have their email stored in Microsoft Exchange Online. In the mailbox of a user named User1, you need to preserve a copy

Solution: From the Azure Active Directory admin center, you create a trusted location and a conditional access policy. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Microsoft 365 admin center, you configure the Organization profile settings. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Device Management admin center, you create a trusted location and a compliance policy Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the SharePoint admin center, you modify the sharing settings. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to ensure that user access to Dropbox is authenticated by using a Microsoft 365 identity. The documents must be protected if the data is downloaded to an untrusted device. What should you do?

The users at your company use Dropbox to store documents. The users access Dropbox by using the MyApps portal. You need to ensure that user access to Dropbox is authenticated

Your company has a security policy that prevents additional software from being installed on domain controllers. You need to monitor a domain controller by using Microsoft Azure Advanced Threat Protection (ATP). What should you do? More than one answer choice may achieve the goal. Select the BEST answer.

Your network contains an on-premises Active Directory domain. Your company has a security policy that prevents additional software from being installed on domain controllers. You need to monitor a domain

You need to prevent the missing information from affecting the score. What should you configure from the Cloud Discover settings?

You have a Microsoft 365 subscription. Your company purchases a new financial application named App1. From Cloud Discovery in Microsoft Cloud App Security, you view the Discovered apps page and

Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Windows Defender ATP. You need to integrate Windows Defender ATP and Azure ATP. What should you do?

Your company uses Microsoft Azure Advanced Threat Protection (ATP) and Windows Defender ATP. You need to integrate Windows Defender ATP and Azure ATP. What should you do? A. From Azure

You need to be notified if users receive email containing a file that has a virus. What should you do?

You have a Microsoft 365 subscription. You need to be notified if users receive email containing a file that has a virus. What should you do? A. From the Exchange

You need to store the Windows Defender ATP data in Europe. What should you first?

Your network contains an on-premises Active Directory domain named contoso.com. The domain contains 1,000 Windows 10 devices. You perform a proof of concept (PoC) deployment of Windows Defender Advanced Threat

You need to analyze the traffic logs. What should you do from Microsoft Cloud App Security?

Your company has five security information and event management (SIEM) appliances. The traffic logs from each appliance are saved to a file share named Logs. You need to analyze the

You need to create a filtered view that displays which Windows Defender ATP alert events have a high severity and occurred during the last seven days. What should you use in Windows Defender ATP?

Your company has 5,000 Windows 10 devices. All the devices are protected by using Windows Defender Advanced Threat Protection (ATP). You need to create a filtered view that displays which

Solution: From the SharePoint site, you create an alert. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: From the Security & Compliance admin center, you create a threat management policy. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to recommend a solution for the security administrator. The solution must meet the technical requirements. What should you include in the recommendation?

You need to recommend a solution for the security administrator. The solution must meet the technical requirements. What should you include in the recommendation? A. Microsoft Azure Active Directory (Azure

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do?

You need to ensure that User1 can enroll the devices to meet the technical requirements. What should you do? A. From the Azure Active Directory admin center, assign User1 the

You need to create the Microsoft Store for Business. Which user can create the store?

You need to create the Microsoft Store for Business. Which user can create the store? A. User2 B. User3 C. User4 D. User5 Answer: C

What is the minimum of dedicated support technicians required?

You need to ensure that the support technicians can meet the technical requirement for the Montreal office mobile devices. What is the minimum of dedicated support technicians required? A. 1

You need to recommend a solution to redeploy the computers. The solution must minimize the deployment time. What should you recommend?

Your company has 10 offices. The network contains an Active Directory domain named contoso.com. The domain contains 500 client computers. Each office is configured as a separate subnet. You discover

Solution: You configure the Mobility (MDM and MAM) settings. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

Solution: Define a Configuration Manager device collection as the pilot collection. Add Device1 to the collection. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.

You need to change the edition of Windows 10 to Enterprise the next time users sign in to their computer. The solution must minimize downtime for the users. What should you use?

Your company has a Microsoft 365 E3 subscription. All devices run Windows 10 Pro and are joined to Microsoft Azure Active Directory (Azure AD). You need to change the edition

Which devices can be managed by using co-management?

You use Microsoft System Center Configuration Manager (Current Branch) to manage devices. Your company uses the following types of devices: Windows 10 Windows 8.1 Android iOS Which devices can be

You need to recommend a Windows 10 deployment method. What should you recommend?

Your network contains an Active Directory domain named contoso.com. The domain contains 100 Windows 8.1 devices. You plan to deploy a custom Windows 10 Enterprise image to the Windows 8.1

Which configuration prevents the users from signing in?

A user receives the following message when attempting to sign in to https://myapps.microsoft.com: “Your sign-in was blocked. We’ve detected something unusual about this sign-in. For example, you might be signing

You need to be alerted by email if impossible travel is detected for a user of App1. The solution must ensure that alerts are generated for App1 only. What should you do?

You have a Microsoft 365 tenant. You have a line-of-business application named App1 that users access by using the My Apps portal. After some recent security breaches, you implement a

You need to prevent the research department users from accessing potentially unsafe websites by using hyperlinks embedded in email messages and documents. Users in other departments must not be restricted. What should you do from the Security & Compliance admin center?

Your company has a Microsoft 365 E5 subscription. Users in the research department work with sensitive data. You need to prevent the research department users from accessing potentially unsafe websites

You need to ensure that you can manage Device1 by using Microsoft Intune and Configuration Manager. Solution: You add Device1 to a Configuration Manager device collection. Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals.