Which files can User1 and User2 view?
HOTSPOT You have a Microsoft SharePoint Online site that contains the following files. Users are assigned roles for the site as shown in the following table. Which files can User1 and User2 view? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one...
How long will File1 be retained?
You have a Microsoft 365 E5 tenant that contains the policies shown in the following table. A file named File1 has all the policies applied. How long will File1 be retained?A . File1 will be deleted automatically after seven years. B. File1 will be deleted automatically after five years. C....
How will Sensitivity1 mark matching emails and Site1 documents?
HOTSPOT You have a Microsoft SharePoint Online site named Site1 and a sensitivity label named Sensitivity1. Sensitivity1 adds a watermark and a header to content. You create a policy to automatically apply Sensitivity1 to emails in Microsoft Exchange Online and Site1. How will Sensitivity1 mark matching emails and Site1 documents?...
Which PowerShell cmdlet should you run?
You need to test Microsoft Office 365 Message Encryption (OME) capabilities for your company. The test must verify the following information: The acquired default template names The encryption and decryption verification status Which PowerShell cmdlet should you run?A . Test-ClientAccessRule B. Test-Mailflow C. Test-OAuthConnectivity D. Test-IRMConfigurationView AnswerAnswer: D Explanation: Reference:...
In which format should you save the list?
You receive an email that contains a list of words that will be used for a sensitive information type. You need to create a file that can be used as the source of a keyword dictionary. In which format should you save the list?A . a JSON file that has...
For which recipients can User1 revoke the emails?
You have a Microsoft 365 E5 tenant that uses a domain named contoso.com. A user named User1 sends link-based, branded emails that are encrypted by using Microsoft Office 365 Advanced Message Encryption to the recipients shown in the following table. For which recipients can User1 revoke the emails?A . Recipient4...
In which format should you save the list?
You receive an email that contains a list of words that will be used few a sensitive information type. You need to create a file that can be used as the source of a keyword dictionary. In which format should you save the list?A . an XLSX file that contains...
Which two conditions can you use in the rule?
You are creating an advanced data loss prevention (DLP) rule in a DLP policy named Policy 1 that will have all locations selected. Which two conditions can you use in the rule? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. (Choose two.)A ....
Which two locations should you select in the retention policy?
You need to create a retention policy to retain all the files from Microsoft Teams channel conversations and private chats. Which two locations should you select in the retention policy? Each correct answer present part of the solution. NOTE: Each correct selection is worth one point.A . Team channel messages...
Which sensitivity labels can you apply to Microsoft SharePoint Online in Policy1?
You create three sensitivity labels named Sensitivity1, Sensitivity2, and Sensitivity3 and perform the following actions: ✑ Publish Sensitivity1. ✑ Create an auto-labeling policy for Sensitivity2. You plan to create a file policy named Policy1 in Microsoft Cloud App Security. Which sensitivity labels can you apply to Microsoft SharePoint Online in...