Which items can use Trainable1?

You have a Microsoft 365 E5 subscription that contains a trainable classifier named Trainable1.

You plan to create the items shown in the following table.

Which items can use Trainable1?
A . Label2 only
B. Label1 and Label2 only
C. Label1 and Policy1 only
D. Label2 Policy1, and DLP1 only
E. Label1, Label2, Policy1, and DLP1

Answer: A

What will occur when you remove the tag from Policy1?

In Microsoft Exchange Online, you have a retention policy named Policy1 that applies a retention tag named Tag1.

You plan to remove Tag1 from Policy1.

What will occur when you remove the tag from Policy1?
A . The content will remain tagged and the Managed Folder Assistant will process Tag1.
B. Tag1 will be removed if Policy1 applied the tag to the content.
C. The content will remain tagged, but the Managed Folder Assistant will ignore Tag1.

Answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/exchange/security-and-compliance/messaging-records-management/retention-tags-and-policies#removing-or-deleting-a-retention-tag-from-a-retention-policy

What should you include in the solution?

Your company has a Microsoft 365 tenant.

The company performs annual employee assessments. The assessment results are recorded in a document named Assessment I cmplatc.docx that is created by using Microsoft Word template. Copies of the employee assessments are sent to employees and their managers. The assessment copies are stored in mailboxes, Microsoft SharePoint Online sites, and OneDrive for Business folders. A copy of each assessment is also stored in a SharePoint Online folder named Assessments.

You need to create a data loss prevention (DLP) policy that prevents the employee assessments from being emailed to external users. You will use a document fingerprint to identify the assessment documents.

What should you include in the solution?
A . Create a fingerprint of AssessmentTemplate.docx.
B. Create a sensitive info type that uses Exact Data Match (EDM).
C. Create a fingerprint of TOO sample documents in the Assessments folder.
D. Import 100 sample documents from the Assessments folder to a seed folder.

Answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/document-fingerprinting?view=o365-worldwide

What should you do?

You are implementing a data classification solution.

The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort.

What should you do?
A . Create a custom classifier.
B. Create a sensitive info type that uses Exact Data Match (EDM).
C. Use the source code classifier.
D. Create a sensitive info type that uses a regular expression.

Answer: C

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-learn-about?view=o365-worldwide

To which three locations can you apply Policy1?

HOTSPOT

You have a Microsoft 365 E5 subscription.

You create an adaptive scope named Scope 1 as shown in the following exhibit.

You create a retention policy named Policy1 that includes Scope1.

To which three locations can you apply Policy1? To answer, select the appropriate locations in the answer area. NOTE: Each correct selection is worth one point.

Answer:

To which role should you be assigned to perform the configuration?

You have a new Microsoft 365 tenant.

You need to ensure that custom trainable classifiers can be created in the tenant.

To which role should you be assigned to perform the configuration?
A . Security administrator
B. Security operator
C. Global administrator
D. Compliance administrator

Answer: D

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-get-started-with?view=o365-worldwide

Which files can User1 and User2 view?

HOTSPOT

You have a Microsoft SharePoint Online site that contains the following files.

Users are assigned roles for the site as shown in the following table.

Which files can User1 and User2 view? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Answer:

How long will File1 be retained?

You have a Microsoft 365 E5 tenant that contains the policies shown in the following table.

A file named File1 has all the policies applied.

How long will File1 be retained?
A . File1 will be deleted automatically after seven years.
B. File1 will be deleted automatically after five years.
C. File1 will be retained until the file is deleted manually.
D. File1 will be deleted automatically after 10 years.

Answer: D

How will Sensitivity1 mark matching emails and Site1 documents?

HOTSPOT

You have a Microsoft SharePoint Online site named Site1 and a sensitivity label named Sensitivity1. Sensitivity1 adds a watermark and a header to content.

You create a policy to automatically apply Sensitivity1 to emails in Microsoft Exchange Online and Site1.

How will Sensitivity1 mark matching emails and Site1 documents? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Answer:

Which PowerShell cmdlet should you run?

You need to test Microsoft Office 365 Message Encryption (OME) capabilities for your company.

The test must verify the following information:

The acquired default template names

The encryption and decryption verification status

Which PowerShell cmdlet should you run?
A . Test-ClientAccessRule
B. Test-Mailflow
C. Test-OAuthConnectivity
D. Test-IRMConfiguration

Answer: D

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/set-up-new-message-encryption-capabilities?view=o365-worldwide