Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Exam Free

SC-400 Practice Exam Free

Table of Contents

Toggle
  • SC-400 Practice Exam Free – 50 Questions to Simulate the Real Exam
  • Free Access Full SC-400 Practice Exam Free

SC-400 Practice Exam Free – 50 Questions to Simulate the Real Exam

Are you getting ready for the SC-400 certification? Take your preparation to the next level with our SC-400 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.

Using a SC-400 practice exam free is one of the best ways to:

  • Experience the format and difficulty of the real exam
  • Identify your strengths and focus on weak areas
  • Improve your test-taking speed and accuracy

Below, you will find 50 realistic SC-400 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.

Question 1

HOTSPOT
-
You have a Microsoft 365 subscription.
You create a retention label named Label1 as shown in the following exhibit.
 Image
You publish Label1 to SharePoint sites.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 2

HOTSPOT
-
You plan to provide a user named User1 with the ability to view data loss prevention (DLP) reports.
You need to identify the following:
•	Which role you should assign to User1
•	Which tool you should use to assign the role
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 3

You have a Microsoft 365 E5 subscription.
You plan to implement information barriers (IBs).
You need to create an IB segment named Segment1.
What should you use to define Segment1?

A. a user group filter

B. a distribution list group

C. a Microsoft 365 group

D. an administrative unit

 


Suggested Answer: C

 

Question 4

You have a Microsoft 365 tenant that uses records management.
You use a retention label to mark legal files stored in a Microsoft SharePoint Online document library as regulatory records.
What can you do to the legal files?

A. Remove the retention label of the files.

B. Edit the content of the files.

C. Move the files to a different folder within the document library.

D. Change the retention label of the files.

 


Suggested Answer: C

 

Question 5

HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains the devices shown in the following table.
 Image
You need to onboard the devices to Microsoft Purview. The solution must ensure that you can apply Endpoint data loss prevention (Endpoint DLP) policies to the devices.
What can you use to onboard each device? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 6

HOTSPOT
-
You have a Microsoft 365 subscription.
You are creating a retention policy named Retention1 as shown in the exhibit. (Click the Exhibit tab.)
 Image
You apply Retention1 to SharePoint sites and OneDrive accounts.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 7

You have a Microsoft 365 E5 subscription that contains the adaptive scopes shown in the following table.
 Image
You create the retention policies shown in the following table.
 Image
Which retention policies support a preservation lock?

A. RPolicy2 only

B. RPolicy3 only

C. RPolicy1 and RPolicy2 only

D. RPolicy1 and RPolicy3 only

E. RPolicy1, RPolicy2, and RPolicy3

 


Suggested Answer: B

 

Question 8

HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains two users named User1 and User2 and a group named Group1. User1 is a member of Group1.
The subscription contains the sensitivity labels shown in the following table.
 Image
You have a sensitivity label policy named Policy1 that is published to User1 and User2. The policy includes the following labels:
•	General
•	Confidential
•	Confidential/Low
•	Confidential/High
•	Confidential/Medium
For Policy1, the default label for documents is Confidential/Low.
You have a sensitivity label policy named Policy2 that is published to Group1. The policy includes the following labels:
•	Secret
•	General
•	Secret/Low
•	Secret/High
•	Secret/Medium
For Policy2, the default label for documents is Secret/Low.
You have a sensitivity label policy named Policy3 that is published to User1 and User2. The policy includes the following labels:
•	Secret
•	General
•	Secret/Low
•	Secret/High
•	Secret/Medium
For Policy3, the default label for documents is Secret/Medium.
The order of the policies is shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 9

You have a Microsoft 365 tenant.
You have a Microsoft SharePoint Online site that contains employment contracts in a folder named EmploymentContracts. All the files in EmploymentContracts are marked as records.
You need to recommend a process to ensure that when a record is updated, the previous version of the record is kept as a version of the updated record.
What should you recommend?

A. Upload an updated file plan that contains the record definition.

B. Unlock the record, modify the record, and then lock the record.

C. Create a copy of the record and enter a version in the file metadata.

D. Create a new label policy associated to an event that will apply to the record.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/record-versioning?view=o365-worldwide

Question 10

You have a Microsoft 365 tenant that has data loss prevention (DLP) policies.
You need to review DLP policy matches for the tenant.
What should you use?

A. Content explorer

B. Activity explorer

C. Compliance Manager

D. records management events

 


Suggested Answer: B

 

Question 11

You have a Microsoft 365 E5 subscription.
You plan to implement retention policies for Microsoft Teams.
Which item types can be retained?

A. voice memos from the Teams mobile client

B. embedded images

C. code snippets

 


Suggested Answer: B

 

Question 12

You have a Microsoft 365 E5 subscription.
You plan to implement retention policies for Microsoft Teams.
Which item types can be retained?

A. voice memos from the Teams mobile client

B. embedded images

C. code snippets

 


Suggested Answer: B

 

Question 13

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1. Site1 contains a file named File1.
You have a retention policy named Retention1 that has the following settings:
• Retention items for a specific period
o Retention period: 5 years
o At the end of the retention period: Delete items automatically
Retention1 is applied to Site1.
You need to ensure that File1 is deleted automatically after seven years. The solution must NOT affect the retention of other files on Site1.
What should you do first?

A. Move File1 to a new folder and configure the access control list (ACL) entries for File1.

B. Create a new retention policy.

C. Create and publish a new retention label.

D. Move File1 to a new folder and list the excluded locations for Retention1.

 


Suggested Answer: C

 

Question 14

HOTSPOT
-
You have a Microsoft 365 E5 subscription.
You are evaluating Data Protection Baseline compliance by using Compliance Manager.
You need to identify improvement actions that meet the following requirements:
•	Provide data loss prevention (DLP) policy recommendations.
•	Provide Data Protection Baseline recommendations.
Which filter should you use for each requirement? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 15

You have a Microsoft 365 subscription.
You have a team named Team1 in Microsoft Teams.
You plan to place all the content in Team1 on hold.
You need to identify which mailbox and which Microsoft SharePoint site collection are associated to Team1.
Which cmdlet should you use?

A. Get-UnifiedGroup

B. Get-TeamChannel

C. Get-MailUser

D. Get-Team

 


Suggested Answer: A

 

Question 16

You have a Microsoft 365 subscription.
The Global Administrator role is assigned to your user account.
You have a user named Admin1.
You create an eDiscovery case named Case1.
You need to ensure that Admin1 can view the results of Case1.
What should you do first?

A. From the Microsoft Entra admin center, assign a role group to Admin1.

B. From the Microsoft Purview compliance portal, assign a role group to Admin1.

C. From the Microsoft 365 admin center, assign a role to Admin1.

 


Suggested Answer: B

 

Question 17

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From the Cloud App Security portal, you create an app discovery policy.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

You can create app discovery policies to alert you when new apps are detected within your organization.
Use the unallowed apps list instead.
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/cloud-discovery-policies
https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwide

Question 18

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You recently discovered that the developers at your company emailed Azure Storage keys in plain text to third parties.
You need to ensure that when Azure Storage keys are emailed, the emails are encrypted.
Solution: You configure a mail flow rule that matches the text patterns.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/exchange/policy-and-compliance/mail-flow-rules/conditions-and-exceptions?view=exchserver-2019

Question 19

HOTSPOT
-
You have a Microsoft 365 subscription that contains a sensitivity label named Contoso Confidential.
You publish Contoso Confidential to all users.
Contoso Confidential is configured as shown in the Configuration exhibit. (Click the Configuration tab.)
 Image
The Encryption settings of Contoso Confidential are configured as shown in the Encryption exhibit. (Click the Encryption tab.)
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 20

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 subscription.
You have a user named User1. Several users have full access to the mailbox of User1.
Some email messages sent to User1 appear to have been read and deleted before the user viewed them.
When you search the audit log in the Microsoft Purview compliance portal to identify who signed in to the mailbox of User1, the results are blank.
You need to ensure that you can view future sign-ins to the mailbox of User1.
Solution: You run the Set-AuditConfig -Workload Exchange command.
Does that meet the goal?

A. Yes

B. No

 


Suggested Answer: A

 

Question 21

SIMULATION
-
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@123456789.onmicrosoft.com
Microsoft 365 Password: **********
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only:
Lab Instance: 12345678
-
You plan to automatically apply a watermark to the documents of a project named Falcon.
You need to create a label that will add a watermark of “Project Falcon” in red, size-12 font diagonally across the documents.
To complete this task, sign in to the appropriate admin center.

 


Suggested Answer:
Correct Answer Image

 

Question 22

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 E5 subscription.
You need to identify resumes that are stored in the subscription by using a built-in trainable classifier.
Solution: You create a data loss prevention (DLP) policy.
Does this meet the goal?

A. Yes

B. No

 


Suggested Answer: B

 

Question 23

HOTSPOT
-
You plan to provide a user named User1 with the ability to view data loss prevention (DLP) reports.
You need to identify the following:
• Which role you should assign to User1
• Which tool you should use to assign the role
What should you identify? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 24

You have a Microsoft 365 E5 subscription.
You need to identify personal data stored in the subscription and control the transfer of personal data between users and groups.
Which type of license should you acquire?

A. Microsoft Purview Audit (Premium)

B. Priva Privacy Risk Management

C. Microsoft 365 E5 Compliance

D. Priva Subject Rights Requests

 


Suggested Answer: B

 

Question 25

HOTSPOT -
You create a retention label policy named Contoso_Policy that contains the following labels:
✑ 10 years then delete
✑ 5 years then delete
✑ Do not retain
Contoso_Policy is applied to content in Microsoft SharePoint Online sites.
After a couple of days, you discover the following messages on the Properties page of the label policy:
✑ Status: Off (Error)
✑ It's taking longer than expected to deploy the policy
You need to reinitiate the policy.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/powershell/module/exchange/set-retentioncompliancepolicy?view=exchange-ps

Question 26

A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx.
From the Cloud App Security portal, you discover the alert shown in the exhibit.
 Image
You restore the file from quarantine.
You need to prevent files that match the policy from being quarantined. Files that match the policy must generate an alert.
What should you do?

A. Modify the policy template.

B. Assign the Global reader role to the file owners.

C. Exclude file matching by using a regular expression.

D. Update the governance action.

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/cloud-app-security/data-protection-policies#create-a-new-file-policy

Question 27

HOTSPOT
-
You have a Microsoft 365 E5 subscription that contains a user named User1 and the groups shown in the following table.
 Image
You have the Compliance Manager improvement action shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 28

HOTSPOT
-
You have a Microsoft 365 E5 tenant that contains a trainable classifier named Classifier1.
You need to increase the accuracy of Classifier1. The solution must use the principle of least privilege.
Which feature should you use and to which role group should you be added? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 29

You have a Microsoft 365 tenant.
You discover that email does NOT use Microsoft Office 365 Message Encryption (OME).
You need to ensure that OME can be applied to email.
What should you do first?

A. Enable Microsoft Defender for Office 365.

B. Activate Azure Information Protection.

C. Activate Azure Rights Management (Azure RMS).

D. Create an Azure key vault.

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/set-up-new-message-encryption-capabilities?view=o365-worldwide

Question 30

You have a Microsoft 365 E5 subscription that uses Yammer.
You need to create a Microsoft Purview communication compliance policy that will detect inappropriate images in Yammer conversations.
What should you do first?

A. Configure Hybrid Mode for Yammer.

B. Configure Native Mode for Yammer.

C. Configure the Yammer network admin settings.

D. Assign each user a Yammer license.

 


Suggested Answer: B

 

Question 31

HOTSPOT -
You have a Microsoft SharePoint Online site that contains the following files.
 Image
Users are assigned roles for the site as shown in the following table.
 Image
Which files can User1 and User2 view? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://social.technet.microsoft.com/wiki/contents/articles/36527.implement-data-loss-prevention-dlp-in-sharepoint-online.aspx

Question 32

HOTSPOT
-
You have a Microsoft 365 E5 subscription.
You are implementing insider risk management.
You need to create an insider risk management notice template and format the message body of the notice template.
How should you configure the template? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 33

You have a Microsoft 365 E5 subscription that contains a user named User1.
You need to ensure that all email messages that contain attachments are encrypted automatically by using Microsoft Purview Message Encryption.
What should you create?

A. a sensitivity label

B. an information barrier segment

C. a data loss prevention (DLP) policy

D. a mail flow rule

 


Suggested Answer: D

 

Question 34

HOTSPOT
-
You have a Microsoft 365 E5 subscription.
You have the alerts shown in the following exhibit.
 Image
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 35

You have a Microsoft 365 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.
 Image
You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).
Which devices support Endpoint DLP?

A. Device5 only

B. Device2 only

C. Device1, Device2, Device3, Device4, and Device5

D. Device3 and Device4 only

E. Device1 and Device2 only

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwide

Question 36

You have a Microsoft 365 subscription linked to a Microsoft Entra tenant that contains a user named User1.
You need to grant User1 permission to search Microsoft 365 audit logs. The solution must use the principle of least privilege.
Which role should you assign to User1?

A. the Reviewer role in the Microsoft Purview compliance portal

B. the View-Only Audit Logs role in the Exchange admin center

C. the Compliance Management role in the Exchange admin center

D. the Security Reader role in the Microsoft Entra admin center

 


Suggested Answer: B

 

Question 37

HOTSPOT -
You plan to implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).
You need to identify which end user activities can be audited on the endpoints, and which activities can be restricted on the endpoints.
What should you identify for each activity? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwide

Question 38

You have a Microsoft 365 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.
 Image
You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).
Which devices support Endpoint DLP?

A. Device5 only

B. Device2 only

C. Device1, Device2, Device3, Device4, and Device5

D. Device3 and Device4 only

E. Device1 and Device2 only

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-learn-about?view=o365-worldwide

Question 39

HOTSPOT
-
You have a Microsoft 365 subscription that contains the users shown in the following table.
 Image
You create the data loss prevention (DLP) policies shown in the following table.
 Image
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 40

You have a Microsoft 365 E5 subscription that contains the users shown in the following table.
 Image
You need to prevent users in the finance department from sharing files with users in the research department.
Which type of policy should you configure?

A. communication compliance

B. information barrier

C. Conditional Access

D. insider risk management

 


Suggested Answer: B

 

Question 41

You have a Microsoft 365 E5 tenant that contains the policies shown in the following table.
 Image
A file named File1 has all the policies applied.
How long will File1 be retained?

A. File1 will be deleted automatically after seven years.

B. File1 will be deleted automatically after five years.

C. File1 will be retained until the file is deleted manually.

D. File1 will be deleted automatically after 10 years.

 


Suggested Answer: D

Retention always takes precedence over permanent deletion, with the longest retention period taking preference.
The delete action from a retention label always takes precedence over the delete action from a retention policy.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/retention?view=o365-worldwide#the-principles-of-retention-or-what-takes-precedence

Question 42

You need to be alerted when users share sensitive documents from Microsoft OneDrive to any users outside your company.
What should you do?

A. From the Microsoft Purview compliance portal, start a data investigation.

B. From the Microsoft Defender for Cloud Apps portal, create a file policy.

C. From the Azure Active Directory admin center, configure an Identity Protection policy.

D. From the Exchange admin center, create a data loss prevention (DLP) policy.

 


Suggested Answer: B

 

Question 43

You need to create a retention policy to delete content after seven years from the following locations:
✑ Exchange Online email
✑ SharePoint Online sites
✑ OneDrive accounts
Microsoft 365 groups -
 Image
✑ Teams channel messages
✑ Teams chats
What is the minimum number of retention policies that you should create?

A. 1

B. 2

C. 3

D. 4

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/retention?view=o365-worldwide

Question 44

HOTSPOT -
You have a Microsoft SharePoint Online site that contains the following files.
 Image
Users are assigned roles for the site as shown in the following table.
 Image
Which files can User1 and User2 view? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://social.technet.microsoft.com/wiki/contents/articles/36527.implement-data-loss-prevention-dlp-in-sharepoint-online.aspx

Question 45

You have a Microsoft 365 E5 subscription.
You are implementing insider risk management.
You need to maximize the amount of historical data that is collected when an event is triggered.
What is the maximum number of days that historical data can be collected?

A. 30

B. 60

C. 90

D. 180

 


Suggested Answer: D

 

Question 46

You have a Microsoft 365 E5 subscription that contains a data loss prevention (DLP) policy named DLP1.
DLP1 has a rule that triggers numerous alerts.
You need to reduce the number of alert notifications that are generated. The solution must maintain the sensitivity of DLP1.
What should you do?

A. Change the mode of DLP1 to Test without notifications.

B. Modify the rule and increase the instance count.

C. Modify the rule and configure an alert threshold.

D. Modify the rule and set the priority to the highest value.

 


Suggested Answer: C

 

Question 47

DRAG DROP
-
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Cloud Apps.
You plan to deploy a Defender for Cloud Apps file policy that will be triggered when the following conditions are met:
•	A file is shared externally.
•	A file is labeled as internal only.
Which filter should you use for each condition? To answer, drag the appropriate filters to the correct conditions. Each filter may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 48

DRAG DROP -
You need to recommend a solution that meets the sales requirements.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. (Choose three.)
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-get-started-with?view=o365-worldwide

Question 49

SIMULATION
-
Use the following login credentials as needed:
To enter your username, place your cursor in the Sign in box and click on the username below.
To enter your password, place your cursor in the Enter password box and click on the password below.
Microsoft 365 Username:
admin@123456789.onmicrosoft.com
Microsoft 365 Password: **********
If the Microsoft 365 portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.
The following information is for technical support purposes only:
Lab Instance: 12345678
-
You need to provide users with the ability to manually classify files that contain product information that are stored in SharePoint Online sites. The solution must meet the following requirements:
•	The users must be able to apply a classification of Product1 to the files.
•	Any authenticated user must be able to open files classified as Product1.
•	Files classified as Product1 must be encrypted.
To complete this task, sign in to the appropriate admin center.

 


Suggested Answer:
Correct Answer Image

 

Question 50

You need to recommend a solution that meets the compliance requirements for protecting the documents in the Data shared folder.
What should you recommend?

A. From the Microsoft 365 compliance center, configure an auto-labeling policy.

B. From Azure Information Protection, configure a content scan job.

C. From the Microsoft 365 compliance center, configure a Content Search query.

D. From the Microsoft 365 compliance center, configure a DLP policy.

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/azure/information-protection/deploy-aip-scanner

Free Access Full SC-400 Practice Exam Free

Looking for additional practice? Click here to access a full set of SC-400 practice exam free questions and continue building your skills across all exam domains.

Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!

Good luck with your SC-400 certification journey!

Share18Tweet11
Previous Post

SC-300 Practice Exam Free

Next Post

SC-900 Practice Exam Free

Next Post

SC-900 Practice Exam Free

SCS-C01 Practice Exam Free

SCS-C02 Practice Exam Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.