Free Microsoft SC-401 Practice Test Questions MCQs

Stop wondering if you're ready. Our Microsoft SC-401 practice test is designed to identify your exact knowledge gaps. Validate your skills with Administering Information Security in Microsoft 365 questions that mirror the real exam's format and difficulty. Build a personalized study plan based on your free SC-401 exam questions mcqs performance, focusing your effort where it matters most.

Targeted practice like this helps candidates feel significantly more prepared for Administering Information Security in Microsoft 365 exam day.

21210+ already prepared
Updated On : 3-Mar-2026
121 Questions
Administering Information Security in Microsoft 365
4.9/5.0

Page 1 out of 13 Pages

Topic 2: Mix Questions

You are reviewing policies for the SharePoint Online environment.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.




Explanation:
This question tests your knowledge of SharePoint Online retention and deletion policies, specifically regarding file availability and recovery timelines. The key concepts are: how long files remain accessible after creation, and the retention/recovery period for deleted files in SharePoint Online.

Correct Option:

Statement 1: No
SharePoint Online does not guarantee file accessibility for nearly 2 years (January 2021 to January 2023) based solely on a default retention policy. Unless a specific retention label or policy extends retention, files are subject to standard lifecycle management. The statement assumes indefinite availability without policy justification, which is incorrect.

Statement 2: Yes
SharePoint Online retains deleted files in the site collection Recycle Bin for 93 days, and then in the Second-Stage Recycle Bin for an additional 93 days, totaling 186 days (approximately 6 months). April 15, 2023, is within 186 days from January 1, 2021? Wait—this needs recalculation.

Correction:
From January 1, 2021, to April 15, 2023, is over 2 years (approx. 835 days). That far exceeds the 186-day total retention period. So this statement is false. Let me recompute carefully.

Actually:
Deletion date is not specified. The statement says: "If a user deletes a file from Site4 that was created on January 1, 2021, an administrative user will be able to recover the file on April 15, 2023."

If deletion happened on Jan 1, 2021, the file would be gone by July 2021 (186 days later). April 2023 is far beyond. So this is No.

Correct Option (Revised):

Statement 1:
No – Accessibility is not guaranteed for nearly 2 years without an extended retention policy.

Statement 2:
No – April 15, 2023, is far beyond the 186-day total recycle bin retention from Jan 1, 2021.

Statement 3:
No – April 15, 2026, is even further beyond, so also false.

Wait—this means all three are No? That seems suspicious. Let me verify the second statement again carefully.

Incorrect Option (Analysis of each):

Statement 1:
No – SharePoint Online does not automatically keep files accessible for 2+ years unless a retention policy is applied. Default behavior does not guarantee this.

Statement 2:
No – The total recycle bin retention period is 93+93=186 days. From Jan 1, 2021, to April 15, 2023, is ~835 days, far exceeding recovery window.

Statement 3:
No – Similarly, April 15, 2026, is ~5+ years after creation, well beyond the 186-day recovery limit.

Reference:
Microsoft Learn: "Restore a deleted site collection" – SharePoint Online retains deleted sites for 93 days in first-stage and 93 days in second-stage recycle bin. Microsoft Documentation: "How retention works in SharePoint and OneDrive" – Retention policies must be explicitly assigned; default is no indefinite retention.

HOTSPOT
You need to meet the technical requirements for the confidential documents.
What should you create first, and what should you use for the detection method? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.




Explanation:
This question tests your knowledge of the correct order of implementation when protecting confidential documents in Microsoft 365. To detect confidential documents automatically, you must first define what confidential means by creating a sensitive info type, then use that in a DLP policy with the appropriate detection method.

Correct Option:

Create first: A sensitive info type
You must define the confidential data pattern before you can enforce policies. A sensitive info type defines what confidential information looks like (e.g., employee IDs, contract numbers). This is the foundational component that DLP policies and other compliance solutions reference for detection.

Use for detection method: Regular expression
Confidential documents often follow a specific pattern (e.g., CONF-####, EMP-#####). Regular expressions allow you to define pattern-based matching for custom confidential document identifiers. This provides precise, flexible detection of formatted strings that standard keywords cannot reliably match.

Incorrect Option:

Compliance Manager assessment –
This is for risk assessment and compliance posture, not for creating detection mechanisms for confidential content.

Content search –
This is an investigation tool (eDiscovery), not a component to create first for automated detection.

DLP policy –
You cannot create a DLP policy without first defining what sensitive content is (sensitive info type).

Sensitivity label –
Labels are for classification and protection, not initial detection method definition.

Dictionary –
Useful for word lists but not ideal for structured confidential document identifiers with specific formats.

File type –
Detects based on file extension (.docx, .pdf), not document content identifiers.

Keywords –
Too broad and prone to false positives; cannot detect pattern-based identifiers reliably.

Reference:
Microsoft Learn: "Create a custom sensitive information type in the Microsoft Purview compliance portal"

Microsoft Documentation: "Get started with DLP policies" – DLP policies require sensitive info types or retention labels as detection triggers.

HOTSPOT
How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.




Explanation:
This question tests your understanding of how DLP policies apply to files in SharePoint Online and how user permissions interact with DLP actions. Without the specific scenario details (Site2, User1, User2, DLPpolicy1), I must infer from common DLP and permission patterns.

Correct Option:

Number of files that User1 can access: 3
User1 likely has edit or read permissions to all four files. DLPpolicy1 blocks access for users with only view permissions but does not remove access for users with edit permissions. Therefore, User1 retains access to all files except the one explicitly blocked by DLP (if any). Based on typical exam patterns, User1 can access 3 of the 4 files.

Number of files that User2 can access: 1
User2 likely has view-only permissions. When DLPpolicy1 detects sensitive content, it blocks access for users with limited permissions (viewers) while allowing owners/editors to retain access. Therefore, User2 loses access to 3 files and retains access to only 1 file that does not match the DLP policy condition.

Incorrect Option:

User1:
1,2,4 – User1 typically has edit rights and is not blocked by DLP from accessing their own files or files they co-author.

User2:
2,3,4 – User2 with view-only permissions is the primary target of DLP block actions; losing access to most matching files is expected.

Reference:
Microsoft Learn: "DLP policy actions in SharePoint Online and OneDrive" – DLP can block access for external users or users with view-only permissions while allowing site owners and members with edit permissions to access.

Microsoft Documentation: "Data Loss Prevention in SharePoint Online" – Policy actions apply based on user permissions and sensitivity labels.

You need to meet the retention requirement for the users' Microsoft 365 data. What is the minimum number of retention policies required to achieve the goal?

A. 1

B. 2

C. 3

D. 4

E. 6

B.   2

Explanation:
The key to this question is understanding the scope of Microsoft 365 retention policies and how they handle specific workloads like Exchange Online and SharePoint Online.
Understanding Retention Policy Scopes:
In Microsoft 365, you can create a retention policy with a specific scope. The most common scopes are:
Entire Organization:
Applies to all supported workloads (Exchange email, SharePoint sites, OneDrive accounts, Teams chats/channel messages, etc.).
Specific Locations:
Allows you to include or exclude specific workloads (e.g., apply only to Exchange Online but not to SharePoint).
Specific Users/Groups/Sites: An even more granular scope.
Analyzing the Goal:
The requirement is to retain data for all users' Microsoft 365 data. This includes their Exchange Online mailboxes, their OneDrive for Business accounts, and their content in SharePoint Online sites.

Why One Policy is Not Enough (Why A is incorrect):
A single retention policy scoped to the "Entire Organization" would seem to cover everything. However, there is a critical limitation: Exchange Online public folders are not included in the "Entire Organization" scope. To retain data in public folders, you must create a separate retention policy that explicitly includes them.

The Minimum Number Breakdown:
Policy 1:
A retention policy scoped to the Entire Organization. This will cover all user and shared mailboxes (excluding public folders), all OneDrive accounts, all SharePoint sites, all Microsoft Teams messages, etc.
Policy 2:
A second retention policy scoped to Specific Locations, where you select only Exchange Public Folders.
Therefore, to meet the goal of retaining data for all users' Microsoft 365 data, which inherently includes the organization-wide data in Public Folders, you are required to create a minimum of two policies.

Reference
Microsoft Learn Documentation: Learn about retention policies & labels to retain or delete
Specifically, see the "Locations" section which states: "The Exchange Public Folders location isn't included in the configuration for the Entire location option. If you want to apply a retention policy to these public folders, you must choose the Specific locations option and then select Exchange Public Folders."

You need to meet the technical requirements for the Site1 documents.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.




Explanation:
This question tests your understanding of the correct sequence to implement auto-labeling for documents in SharePoint Online. To automatically apply sensitivity labels to documents based on content, you must first define what sensitive content looks like, define the label to apply, then create the auto-labeling policy to apply that label.

Correct Order:

Create a sensitive info type –
You must define the pattern or condition (e.g., employee ID, contract number) that identifies confidential documents. This is the detection criteria.

Create a sensitivity label –
Define the label itself (e.g., “Confidential”) that will be applied automatically. This includes defining protection settings if needed.

Create an auto-labeling policy –
This policy links the sensitive info type to the sensitivity label and specifies the locations (Site1) and conditions for automatic labeling.

Incorrect Option:

Wait 24 hours and then turn on the policy –
This is not a required action for auto-labeling setup; policy simulation and activation are part of the policy creation workflow, not a separate preceding action.

Create a retention label –
Retention labels are for managing data lifecycle, not for classification and protection. Auto-labeling for retention uses retention labels, but the question specifies technical requirements for Site1 documents (likely sensitivity/confidentiality, not retention).

Turn on the policy is part of creating the auto-labeling policy, not a separate step before creation.

Reference:
Microsoft Learn: “Automatically apply a sensitivity label to content in Microsoft 365”

Microsoft Documentation: “Create and configure auto-labeling policies for sensitivity labels” – Requires sensitive info types and sensitivity labels to be created first.

You need to meet the technical requirements for the creation of the sensitivity labels. To which user or users must you assign the Sensitivity Label Administrator role?

A. Admin1 only

B. Admin1 and Admin4 only

C. Admin1 and Admin5 only

D. Admin1, Admin2, and Admin3 only

E. Admin1, Admin2, Admin4, and Admin5 only

D.   Admin1, Admin2, and Admin3 only

Explanation:
To meet the requirement that all administrative users must be able to create Microsoft 365 sensitivity labels, we need to assign the Sensitivity Label Administrator role to the correct users.
Sensitivity Label Administrator Role Responsibilities
This role allows users to:
Create and manage sensitivity labels in Microsoft Purview.
Publish and configure auto-labeling policies.
Modify label encryption and content marking settings.
Review of Admin Roles from the Table:


Users that must be assigned the Sensitivity Label Administrator role:
Admin2 (Compliance Data Administrator)
Admin3 (Compliance Administrator)
Admin1 (Global Reader) (should be assigned this role to fulfill the requirement that all admins can create labels).

You have a Microsoft SharePoint Online site named Site! that contains the files shown in the following table.

A. Tip1 only

B. Tip2 only

C. Tip3 only

D. Tip1 and Tip2 only

B.   Tip2 only

Explanation:
To determine which policy tip appears, we need to simulate how the DLP policy engine evaluates File2 against the rules in DLP1. The key factors are the rule's condition, its priority, and the "If match, stop processing" flag.

Step 1: Analyze File2
File2 contains 3 IP addresses. This is the key piece of data that will be matched against the rules.
Step 2: Understand Rule Processing Order
DLP rules are processed in order of Priority, from lowest number (highest priority) to highest number (lowest priority). The order for this policy is:
Rule1 (Priority 0)
Rule2 (Priority 1)
Rule3 (Priority 2)

Step 3: Simulate the Evaluation for File2
1.Rule1 is evaluated first (Priority 0):
Condition: "Content contains 1 or more IP addresses"
File2 Check: Does File2 have 1 or more IPs? Yes, it has 3.
Result: Rule1 matches.
Action: The policy tip Tip1 is triggered. Since "If match, stop processing" is set to No, the policy engine continues to the next rule.

2.Rule2 is evaluated next (Priority 1):
Condition: "Content contains 3 or more IP addresses"
File2 Check: Does File2 have 3 or more IPs? Yes, it has exactly 3.
Result: Rule2 matches.
Action: The policy tip Tip2 is triggered. Crucially, "If match, stop processing" is set to Yes. This means the policy engine stops immediately and does not process any further rules.

3.Rule3 is not evaluated:
Because Rule2 matched and had "stop processing" enabled, Rule3 is never checked.
Conclusion: Only Rule2 finishes its execution and applies its tip. Therefore, only Tip2 will appear for File2.

Why the Other Options are Incorrect
A. Tip1 only:
This is incorrect because although Rule1 matches, it does not stop processing. The engine continues and Rule2, which also matches, takes precedence due to its "stop processing" action.
C. Tip3 only:
This is incorrect because Rule3 has a lower priority (2) and is never reached, as processing stops at the higher-priority Rule2.
D. Tip1 and Tip2 only:
This is a common point of confusion. While both Rule1 and Rule2 technically "match," the final policy tip user experience is generally governed by the last matching rule that is processed before the engine stops. Because Rule2 has "stop processing" enabled, it is the definitive rule that applies, and its tip (Tip2) is the one shown. The system does not typically display a cascade of tips from multiple matching rules in this context.

Reference
Microsoft Learn: DLP rule precedence
This documentation explains that rules are processed in priority order and that the "stop processing more rules" option halts the evaluation sequence.

You have a Microsoft 365 E5 subscription that uses Microsoft Purview.
You are creating an exact data match (EDM) classifier named EDM1.
For EDM1, you upload a schema file that contains the fields shown in the following table.


What is the maximum number of primary elements that EDM1 can have?

A. 1

B. 2

C. 3

D. 4

A.   1

Explanation:
The key to this question is understanding the fundamental structure of an EDM schema and the role of a primary element.

1.What is a Primary Element?
In an EDM schema, the primary element is a field (or a combination of fields) that acts as a unique identifier for a record in your sensitive database. It's the key the DLP policy uses to look up information. Think of it like a primary key in a database table.
2.Schema Definition Rules:
When you define an EDM schema, you must designate one and only one field as the primary element. This is a strict requirement of the EDM architecture. You cannot have zero primary elements, and you cannot have more than one.
3.Analyzing the Provided Schema:
The table shows four columns:
PP (EU Passport Number)
Name (All Full Names)
DateOfBirth (Single-token)
AccountNumber (Multi-token)
According to EDM rules, you must select one of these columns to serve as the primary element. A common and recommended choice is a field with high uniqueness, such as PP (Passport Number) or AccountNumber.
4.Conclusion:
Since an EDM schema is limited to a maximum of one primary element by design, the correct answer is 1.

Reference
Microsoft Learn:
Custom sensitive information types with Exact Data Match
Specifically, the "Define the schema for your database" section states: "You must select one field to be the primary element that will be used as the unique identifier for each row in the table." This clearly indicates that only one primary element is allowed.

You have a Microsoft 365 E5 subscription that contains a Microsoft SharePoint Online site named Site1.
You need to implement Microsoft Purview data lifecycle management.
What should you create first?

A. a sensitivity label policy

B. a data loss prevention (DLP) policy

C. an auto-labeling policy

D. a retention label

D.   a retention label

Explanation:
The question asks what you should create first to implement data lifecycle management. The core function of data lifecycle management is to retain content for compliance or operational needs and to delete content that is no longer required.
Here is the logical sequence and why a retention label is the foundational component:

1.Define the Rules (The "What" and "When"):
Before any policy can enforce rules, you must first define the rules themselves. In Microsoft Purview, a retention label is the atomic unit of a lifecycle rule. It is a single, reusable setting that answers:
What action to take? (Retain, Retain then Delete, or Delete)
When does the timer start? (e.g., from the item's creation date, last modified date, or when the label was applied)
How long is the retention period? (e.g., 7 years)

2.Publish and Apply the Rules (The "Where" and "How"):
Only after you have created retention labels can you use other mechanisms to implement them:
You can publish labels in a retention label policy to make them available for users to apply manually in apps like SharePoint.
You can use an auto-labeling policy to automatically find and apply labels based on sensitive information types or keywords.
A retention policy is a broader, location-based policy that applies a single retention rule to all content in a specified location (like all of Site1), but it lacks the granularity of labels.

Why the other options are not the first step:
A. A sensitivity label policy:
Sensitivity labels are primarily for classification and protection (encryption, visual markings, access controls). While they can be integrated with retention, their primary purpose is confidentiality, not lifecycle management.
B. A data loss prevention (DLP) policy:
DLP is designed to prevent the accidental sharing of sensitive information. It is a prevention and detection tool, not a tool for defining retention and deletion schedules.
C. An auto-labeling policy:
This is an application mechanism, not the definition of the rule itself. You cannot create an auto-labeling policy until you have first created the retention labels you want it to apply.
Conclusion:
The fundamental building block for any data lifecycle management scenario is the retention label. You must create the labels that define your retention and deletion rules before you can publish, auto-apply, or enforce them with policies.

Reference
Microsoft Learn:
Learn about retention policies and retention labels This documentation clearly distinguishes between the label (the rule) and the policy (the enforcement mechanism), establishing that you create labels first.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a Microsoft 365 tenant and 500 computers that run Windows 11. The computers are onboarded to Microsoft Purview.
You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.
You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.
Solution: From the Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings, you add a folder path to the file path exclusions.
Does this meet the goal?

A. Yes

B. No

B.   No

Explanation:
This solution does not meet the goal. Here's why:
What "File Path Exclusions" Do:
This setting is designed to exempt specific folders or files from Endpoint DLP monitoring entirely. For example, you might add C:\Program Files\SomeApp\cache to prevent DLP policies from scanning temporary files in that location, which can improve performance and reduce false positives.
The Problem with This Approach:
By adding the folder path where Tailspin_scanner.exe is located to the exclusions list, you are not blocking the application. Instead, you are telling Microsoft Purview to ignore any activity performed by that application. This means:
The DLP service will no longer monitor or log what Tailspin_scanner.exe does.
DLP policies will not be enforced on files accessed by this application.
As a result, Tailspin_scanner.exe will be able to access all documents, including sensitive ones, without any restriction.

Contradiction with the Goal:
The goal is to block the application from accessing sensitive documents. This solution does the exact opposite—it gives the application a "free pass" to access everything, making the data less secure, not more.
Conclusion:
Using file path exclusions is an incorrect method for blocking a specific application. The correct tool for this task would be the "Restrict app activities" action within an Endpoint DLP policy, which allows you to choose an application (like Tailspin_scanner.exe) and block it from accessing files classified by your sensitive information types.

Page 1 out of 13 Pages

Administering Information Security in Microsoft 365 Practice Exam Questions

Winning Strategy for SC-401: Information Security in Microsoft 365


The SC-401 is not about isolated tools; its about administering the integrated Microsoft 365 Defender ecosystem. Your strategy must center on configuring, monitoring, and responding across the Microsoft 365 security suite.

Phase 1: Master the Three Pillars of the Exam


Your study must balance these interconnected areas:

1. Defender Suite Administration (60% Focus)

Microsoft Defender XDR: This is the central nervous system. You must know how to navigate incidents, manage actions, and use the advanced hunting query language (KQL) inside the unified portal.
Component Defenders: Deep-dive into configuring and managing:
Defender for Office 365: Anti-phishing policies, Safe Attachments, Safe Links.
Defender for Endpoint: Security baselines, device onboarding, threat & vulnerability management.
Defender for Identity: Configuring sensors, monitoring identity-based alerts.

2. Data Governance & Compliance (25% Focus)

Purview Insider Risk Management: Understand policy triggers, indicators, and case management. This is a heavily tested, scenario-driven topic.
Data Loss Prevention (DLP): Know how to create, test, and tune DLP policies for Exchange Online, SharePoint, Teams, and Endpoint.

3. Identity & Access Security (15% Focus)

Entra ID Security: Focus on Conditional Access for Zero Trust, identity protection policies, and privileged access management.

Phase 2: The Execution Blueprint (4-6 Weeks)


Week 1-2: Foundation Through Labs

Do not start with theory. Immediately access a Microsoft 365 developer tenant (free for 90 days, renewable).
Go to the Microsoft 365 Defender portal and click every tab. Create a simple DLP policy. Trigger a test alert. Learn by breaking things in a safe environment. Complete the official Microsoft Learn SC-401 modules alongside your exploration.

Week 3-4: Integration & Scenarios

This is the critical phase. Study how the tools connect.

How does a Defender for Identity alert feed into a Defender XDR incident?
How does a DLP policy trigger an Insider Risk Management case?

Use platforms like MSmcqs.com for targeted scenario SC-401 practice questions. Their questions force you to apply knowledge to realistic administrative decisions—exactly what the exam tests. Analyze every wrong answer to identify conceptual gaps.

Week 5: KQL Mastery & Policy Deep Dive

You must be comfortable writing basic KQL queries for advanced hunting. Practice daily in the Defender portal hunting lab. Focus on where, summarize, join, and project operators.
Revisit complex policy creation (Anti-phishing, Insider Risk) until you can list the configuration steps from memory.

Week 6: Final Review & Exam Simulation

Take full-length, timed Administering Information Security in Microsoft 365 practice exams to build stamina.
Review only your weak areas using the official skills outline as a final checklist.

Winning Mantra: "Configure, Correlate, Contain." You are being tested on your ability to configure the security stack, correlate signals across it, and contain threats using the tools you administer. Prioritize hands-on practice in the Defender portals above all else.