Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SC-401 Exam Dumps - Microsoft Certified: Information Security Administrator Associate Questions and Answers

Question # 4

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.

You need to deploy a compliance solution that will detect the accidental oversharing of information outside of an organization.

The solution must minimize administrative effort.

What should you use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Question # 5

At the end of a project, you upload project documents to a Microsoft SharePoint Online library that contains many files. The following is a sample of the project document file names:

• aei_AA989.docx

• bd_WS098.docx

• cei_DF112.docx

• ebc_QQ454.docx

• ecc_BB565.docx

All documents that use this naming format must be labeled as Project Documents:

You need to create an auto-apply retention label policy.

What should you use to identify the files?

Options:

A.

A retention label

B.

A trainable classifier

C.

A sensitive info type

Buy Now
Question # 6

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft Defender for Cloud Apps, you mark the application as Unsanctioned.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Question # 7

You have a Microsoft 365 E5 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.

You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).

Which devices support Endpoint DLP?

Options:

A.

Device1 only

B.

Device1 and Device2 only

C.

Device1 and Device4 only

D.

Device1, Device2, and Device4 only

E.

Device1, Device2, Device3, and Device4

Buy Now
Question # 8

You have a Microsoft 36S ES subscription

You need to implement Endpoint data loss prevention (Endpoint DLP) to meet the following requirements:

• Ensure that users can upload data to only two sites named Site1 and Site2.

• Prevent users from pasting data to two search engines named Search1 and Search2.

• Minimize the number of policies and groups.

What If the minimum number of sensitive service domain groups and Endpoint DIP policies required? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Question # 9

You have a Microsoft 365 E5 tenant.

You have sensitivity labels as shown in the Sensitivity Labels exhibit. (Click the Sensitivity Labels tab.)

The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content.

The sensitivity labels ate published as shown in the Published exhibit. (Click the Published tab.)

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Question # 10

You create a data loss prevention (DIP) policy that meets the following requirements:

• Prevents guest users from accessing a sensitive document shared during a Microsoft Teams chat

• Prevents guest users from accessing a sensitive document stored in a Microsoft Team? channel

Which location should you select for each requirement? To answer, select the appropriate options in the answer area NOTE: Each correct selection is worth one point.

Options:

Buy Now
Question # 11

You have a Microsoft 365 subscription that contains the devices shown in the following table.

From which devices can Microsoft Purview Insider Risk Management capture forensic evidence?

Options:

A.

Device only

B.

Device2 only

C.

Device1 and Device2 only

D.

Device2 and Device3 only

E.

Device1, Device2 and Device3

Buy Now
Question # 12

You have a Microsoft 365 subscription that contains two Microsoft SharePoint Online sites named Site1 and Site2. You plan to use policies to meet the following requirements:

• Add a watermark of Confidential to a document if the document contains the words Project1 or Project2.

• Retain a document for seven years if the document contains credit card information.

• Add a watermark of Internal Use Only to all the documents stored on Site2.

• Add a watermark of Confidential to all the documents stored on Site1.

You need to recommend the minimum number of sensitive info types required.

How many sensitive info types should you recommend?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Question # 13

You have a Microsoft 36S subscription that contains the sensitive information types (SITs) shown in the following exhibit.

Use the drop-down menus To select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct flection is worth one point.

Options:

Buy Now
Exam Code: SC-401
Exam Name: Administering Information Security in Microsoft 365
Last Update: Apr 6, 2026
Questions: 203
SC-401 pdf

SC-401 PDF

$28.5  $94.99
SC-401 Engine

SC-401 Testing Engine

$33  $109.99
SC-401 PDF + Engine

SC-401 PDF + Testing Engine

$43.5  $144.99