How should you complete the PowerShell command?
HOTSPOT You have a Microsoft 365 tenant that uses a domain named canstoso.com. A user named User1 leaves your company. The mailbox of User1 is placed on Litigation Hold, and then the account of User1 is deleted from Azure Active Directory (Azure AD). You need to copy the content of...
Where is the content retained one year after deletion?
HOTSPOT You create a retention policy as shown in the following exhibit. A user named User1 deletes a file named File1.docx from a Microsoft SharePoint Online site named Site1. A user named User2 deletes an email and empties the Deleted Items folder in Microsoft Outlook. Where is the content retained...
Which two objects should you create?
You need to ensure that documents in a Microsoft SharePoint Online site that contain a reference to Project Alpha are retained for two years, and then deleted. Which two objects should you create? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. (Choose...
What should you identify?
HOTSPOT You plan to create a custom trainable classifier based on an organizational form template. You need to identity which role based access control (RBAC ) role is required to create the trainable classifier and where to classifier. The solution must use the principle of least privilege. What should you...
What should you use to identify the files, and which regular expression should you use?
HOTSPOT At the end of a project you upload project documents to a Microsoft SharePoint Online library that contains many fifes. Files that have the following naming format must be labeled as Project I • aei_AA989.docx • bd_WSOgadocx • cei_DLF112-docx • ebc_QQ4S4.docx • ecc_BB565.docx You plan to create an auto-apply...
Does this meet the goal?
You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP). You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD). You need to ensure that Endpoint DLP policies can protect content on the computers. Solution: You onboard...
What should you created first, and what should you use for the detection method?
HOTSPOT You need to meet the technical requirements for the confidential documents. What should you created first, and what should you use for the detection method? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. View AnswerAnswer: Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/create-a-custom-sensitive-information-type?view=o365-worldwide
How will Sensitivity1 mark matching emails and Site1 documents?
HOTSPOT You have a Microsoft SharePoint Online site named Site1 and a sensitivity label named Sensitivity1. Sensitivity1 adds a watermark and a header to content. You create a policy to automatically apply Sensitivity1 to emails in Microsoft Exchange Online and Site1. How will Sensitivity1 mark matching emails and Site1 documents?...
What should you do?
You create a data loss prevention (DLP) policy. The Advanced DLP rules page is shown in the Rules exhibit. The Review your settings page is shown in the review exhibit. You need to review the potential impact of enabling the policy without applying the actions. What should you do?A ....
What should you include in the solution?
Your company has a Microsoft 365 tenant. The company performs annual employee assessments. The assessment results are recorded in a document named Assessment I cmplatc.docx that is created by using Microsoft Word template. Copies of the employee assessments are sent to employees and their managers. The assessment copies are stored...