Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

SC-401 Administering Information Security in Microsoft 365 Questions and Answers

Questions 4

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Purview and just-in-time (JIT) protection. The subscription contains the users shown in the following table.

SC-401 Question 4

The subscription contains the devices shown in the following table.

SC-401 Question 4

The devices contain the files shown in the following table.

SC-401 Question 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-401 Question 4

Options:

Buy Now
Questions 5

You need to meet the technical requirements for the Site1 documents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-401 Question 5

Options:

Buy Now
Questions 6

HOTSPOT

How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 6

Options:

Buy Now
Questions 7

You need to meet the technical requirements for the creation of the sensitivity labels.

To which user or users must you assign the Sensitivity Label Administrator role?

Options:

A.

Admin1 only

B.

Admin1 and Admin4 only

C.

Admin1 and Admin5 only

D.

Admin1, Admin2, and Admin3 only

E.

Admin1, Admin2, Admin4, and Admin5 only

Buy Now
Questions 8

You need to meet the retention requirement for the users' Microsoft 365 data.

What is the minimum number of retention policies required to achieve the goal?

Options:

A.

1

B.

2

C.

3

D.

4

E.

6

Buy Now
Questions 9

DRAG DROP

You need to create a trainable classifier that can be used as a condition in an auto-apply retention label policy.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-401 Question 9

Options:

Buy Now
Questions 10

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Microsoft Defender for Cloud Apps, you mark the application as Unsanctioned.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 11

You have a Microsoft 365 subscription.

You need to customize encrypted email for the subscription. The solution must meet the following requirements.

● Ensure that when an encrypted email is sent, the email includes the company logo.

● Minimize administrative effort.

Which PowerShell cmdlet should you run?

Options:

A.

Set-IRMConfiguration

B.

Set-OMEConfiguration

C.

Set-RMSTemplate

D.

New-OMEConfiguration

Buy Now
Questions 12

You have a Microsoft 365 E5 subscription that uses Microsoft Purview insider risk management and contains three users named User1, User2, and User3.

All insider risk management policies have adaptive protection enabled and the default conditions for insider risk levels configured.

The users perform the following activities, which trigger insider risk policy alerts:

    User1 performs at least one data exfiltration activity that results in a high severity risk score.

    User2 performs at least three risky user activities within seven days, that each results in a high severity risk score.

    User3 performs at least bwo data exfiltration activities within seven days, that each results in a high severity risk score.

Which insider risk level is assigned to each user? To answer, drag the appropriate levels to the correct users. Each level may be used once, more than once, or not at all. You may need to drag the split bar between panes or seroll to view content.

NOTE: Each correct selection is worth one point.

SC-401 Question 12

Options:

Buy Now
Questions 13

You have a Microsoft 565 subscription that contains 100 users and a Microsoft 365 group named Group1. All users have Windows 11 devices and use Microsoft SharePoint Online and Exchange Online. A sensitivity label named Label! is published as the default label for Group1. You add two sublabels named Sublabel1 and Sublabel2 lo Label1. You need to ensure that the settings in Sublabel 1 are applied by default to Group 1. What should you do?

Options:

A.

Change the order of Sublabel!

B.

Duplicate all the settings from Sublabel! to Label1.

C.

Modify the policy of Label1.

D.

Delete the policy of Label1 and publish Sublabel1.

Buy Now
Questions 14

DRAG DROP

You have a Microsoft 365 subscription that contains 20 data loss prevention (DLP) policies.

You need to identify the following:

● Rules that are applied without triggering a policy alert

● The top 10 files that have matched DLP policies

● Alerts that are miscategorized

Which report should you use for each requirement? To answer, drag the appropriate reports to the correct requirements. Each report may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

SC-401 Question 14

Options:

Buy Now
Questions 15

You have a Microsoft S65 E5 subscription that contains two users named User! and Admin1 Admin1 manages audit retention policies for the subscription.

You need to ensure that the audit logs of User1 will be retained for 10 years.

What should you do first?

Options:

A.

Assign a Microsoft Purview Audit (Premium) add on license to User1.

B.

Assign a 10 year audit log retention add-on license to Admin1.

C.

Assign a 10-year audit log retention add-on license to User1.

D.

Assign a Microsoft Purview Audit (Premium) add-on license to Admin1.

Buy Now
Questions 16

You have a Microsoft 365 E5 subscription.

You plan to implement Microsoft Purview insider risk management.

You implement the HR data connector.

You need to prepare the data that will be imported by the data connector.

In which format should you prepare the data?

Options:

A.

JSON

B.

CSV

C.

TSV

D.

XML

E.

PRN

Buy Now
Questions 17

You have a Microsoft 365 E5 subscription.

You plan to implement insider risk management for users that manage sensitive data associated with a project.

You need to create a protection policy for the users. The solution must meet the following requirements:

● Minimize the impact on users who are NOT part of the project.

● Minimize administrative effort.

What should you do first?

Options:

A.

From the Microsoft Purview portal, create an insider risk management policy.

B.

From the Microsoft Entra admin center, create a security group.

C.

From the Microsoft Entra admin center create a User risk policy

D.

From the Microsoft Purview portal create a priority user group

Buy Now
Questions 18

You have a Microsoft 365 subscription.

You have a user named User1 Several users have full access to the mailbox of User1.

Some email messages sent to User 1 appeal to have been read and deleted before the user viewed them

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User l. the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-AuditConfig -Workload Exchange command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 19

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You need to ensure that you receive an alert when a user uploads a document to a third-party cloud storage service.

What should you use?

Options:

A.

an activity policy

B.

a sensitivity label

C.

a file policy

D.

an insider risk policy

Buy Now
Questions 20

HOTSPOT

You plan to create a custom sensitive information type that will use Exact Data Match (EDM).

You need to identify what to upload to Microsoft 365, and which tool to use for the upload.

What should you identify? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 20

Options:

Buy Now
Questions 21

You have a Microsoft 365 E5 subscription that contains three users named User1, User2, and User3 and a file named Filetdocx.

You create a sensitivity label named Label1 as shown in the following exhibit.

SC-401 Question 21

You apply Label1 to File1.

For which users can Microsoft 365 Copilot summarize File1?

Options:

A.

No user

B.

User 1 only

C.

User1 and User2 only

D.

User1, User2, and User3

Buy Now
Questions 22

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 subscription.

You have a user named User1. Several users have full access to the mailbox of User1.

Some email messages sent to User1 appear to have been read and deleted before the user viewed them.

When you search the audit log in the Microsoft Purview portal to identify who signed in to the mailbox of User1, the results are blank.

You need to ensure that you can view future sign-ins to the mailbox of User1.

Solution: You run the Set-MailboxFolderPermission -Identity "User1" -User User1@contoso.com -AccessRights Owner command.

Does that meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 23

You have a Microsoft 365 E5 tenant that contains a sensitivity label named label1.

You plan to enable co-authoring for encrypted files.

You need to ensure that files that have label1 applied support co-authoring.

Which two settings should you modify? To answer, select the settings in the answer area.

NOTE: Each correct selection is worth one point.

SC-401 Question 23

Options:

Buy Now
Questions 24

You have a Microsoft J65 E5 subscription. You plan to implement retention policies for Microsoft Teams. Which item types can be retained?

Options:

A.

voice memos from the Teams mobile client

B.

embedded images

C.

code snippets

Buy Now
Questions 25

You have a Microsoft 365 E5 subscription.

Users access their mailbox by using the following apps.

• Outlook for Microsoft 365

• Outlook on the web

• Outlook Mobile fiOS. Android)

You create a data loss prevention (DLP) policy named DLP1 that has the following settings:

• Location; Exchange email

• Status: On

• User notifications: On

• Notify users with a policy tip: Enabled

Which apps display a policy tip when content is matched by using DIP1 ?

Options:

A.

Outlook for Microsoft 365 only

B.

Outlook on the web only

C.

Outlook for Microsoft 365 and Outlook on the web only

D.

Outlook for Microsoft 365 and Outlook Mobile (iOS. Android) only

E.

Outlook for Microsoft 365. Outlook on the web, and Outlook Mobile (iOS. Android)

Buy Now
Questions 26

You have a Microsoft 36S subscription that contains the sensitive information types (SITs) shown in the following exhibit.

SC-401 Question 26

Use the drop-down menus To select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct flection is worth one point.

SC-401 Question 26

Options:

Buy Now
Questions 27

Your company has a Microsoft 365 tenant.

The company performs annual employee assessments. The assessment results are recorded in a document named AssessmentTemplate.docx that is created by using a Microsoft Word template. Copies of the employee assessments are sent to employees and their managers.

The assessment copies are stored in mailboxes, Microsoft SharePoint Online sites, and OneDrive folders. A copy of each assessment is also stored in a SharePoint Online folder named Assessments.

You need to create a data loss prevention (DLP) policy that prevents the employee assessments from being emailed to external users. You will use a document fingerprint to identify the assessment documents. The solution must minimize effort.

What should you include in the solution?

Options:

A.

Create a fingerprint of AssessmentTemplate.docx.

B.

Create a sensitive info type that uses Exact Data Match (EDM).

C.

Import 100 sample documents from the Assessments folder to a seed folder.

D.

Create a fingerprint of 100 sample documents in the Assessments folder.

Buy Now
Questions 28

You have a Microsoft 565 E5 tenant that uses Microsoft Teams and contains two users named User1 and User2. You create a data Joss prevention (DIP) policy that is applied to the Teams chat and channel messages location for User1 and User?

Which Teams entities will have DLP protection?

Options:

A.

1:1/n chats and general channels only

B.

1:1/n chats and private channels only

C.

1:1/n chats, general channels, and private channels

Buy Now
Questions 29

You have a Microsoft 365 tenant that uses Microsoft Purview Message Encryption.

You need to ensure that any emails containing attachments and sent to user1@contoso.com are encrypted automatically by using Microsoft Purview Message Encryption.

What should you do?

Options:

A.

From the Exchange admin center, create a mail flow rule.

B.

From the Exchange admin center, create a new sharing policy.

C.

From the Microsoft Defender portal, create a Safe Attachments policy.

D.

From the Microsoft Purview portal, configure an auto-apply retention label policy.

Buy Now
Questions 30

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.

You plan to deploy a Defender for Cloud Apps file policy that will be triggered when the following conditions are met:

● A file is shared externally.

● A file is labeled as internal only.

Which filter should you use for each condition? To answer, drag the appropriate filters to the correct conditions. Each filter may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

SC-401 Question 30

Options:

Buy Now
Questions 31

You have a Microsoft 365 tenant.

A new regulatory requirement states that all documents containing a patent ID be labeled, retained for 10 years, and then deleted. The policy used to apply the retention settings must never be disabled or deleted by anyone.

You need to implement the regulatory requirement.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

SC-401 Question 31

Options:

Buy Now
Questions 32

You implement Microsoft 365 Endpoint data loss prevention (Endpoint DIP).

You have computers that run Windows 11 and have Microsoft 365 Apps instated. The computers are joined to a Microsoft Entra tenant

You need to ensure that Endpoint DIP policies can protect content on the computers.

Solution: You deploy the Endpoint DLP configuration package to the computers.

Does this meet the goal?

Options:

A.

Yes

B.

No

Buy Now
Questions 33

You have a Microsoft 365 E5 subscription that uses retention label policies.

You need to identify all the changes made to retention labels during the last 30 days.

What should you use in the Microsoft Purview portal?

Options:

A.

Reports

B.

Activity explorer

C.

User data search

D.

Content search

Buy Now
Exam Code: SC-401
Exam Name: Administering Information Security in Microsoft 365
Last Update: Nov 21, 2025
Questions: 201

PDF + Testing Engine

$61.25  $174.99

Testing Engine

$47.25  $134.99
buy now SC-401 testing engine

PDF (Q&A)

$40.25  $114.99
buy now SC-401 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2025