You have a Microsoft 365 E5 tenant
HOTSPOT You have a Microsoft 365 E5 tenant. You create sensitivity labels as shown in the Sensitivity Labels exhibit. The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content. The sensitivity labels are published as shown in the Published exhibit. For each of the following...
Which users can access the Disposition tab in the Microsoft 365 compliance center to review the content?
You have a Microsoft 365 tenant that contains the users shown in the following table. You configure a retention label to trigger a disposition review at the end of the retention period. Which users can access the Disposition tab in the Microsoft 365 compliance center to review the content?A ....
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you do?
A user reports that she can no longer access a Microsoft Excel file named Northwind Customer Data.xlsx. From the Cloud App Security portal, you discover the alert shown in the exhibit. You restore the file from quarantine. You need to prevent files that match the policy from being quarantined. Files...
Which report should you recommend?
You have a Microsoft 365 tenant that uses 100 data loss prevention (DLP) policies. A Microsoft Exchange administrator frequently investigates emails that were blocked due to DLP policy violations. You need to recommend which DLP report the Exchange administrator can use to identify how many messages were blocked based on...
Does this meet the goal?
You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP). You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD). You need to ensure that Endpoint DLP policies can protect content on the computers. Solution: You enroll...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What should you do first?
You have a Microsoft 365 tenant. You discover that email does NOT use Microsoft Office 365 Message Encryption (OME). You need to ensure that OME can be applied to email. What should you do first?A . Enable Microsoft Defender for Office 365.B . Activate Azure Information Protection.C . Activate Azure...
What should you do?
You are implementing a data classification solution. The research department at your company requires that documents containing programming code be labeled as Confidential. The department provides samples of the code from its document library. The solution must minimize administrative effort. What should you do?A . Create a custom classifier.B ....
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...