Topic 2: Mix Questions

You have a Microsoft 365 E5 subscription.
You need to enable support for sensitivity labels in Microsoft SharePoint Online.
What should you use?

A. the Microsoft Purview portal

B. the Microsoft Entra admin center

C. the SharePoint admin center

D. the Microsoft 365 admin center

C.   the SharePoint admin center

Explanation:
To enable support for sensitivity labels in Microsoft SharePoint Online within a Microsoft 365 E5 subscription, you should use the SharePoint admin center. Sensitivity labels, part of Microsoft Purview Information Protection, allow you to classify and protect documents and sites in SharePoint Online by applying encryption, access restrictions, or visual markings (e.g., watermarks). While the labels themselves are created and managed in the Microsoft Purview portal, enabling SharePoint Online to recognize and apply these labels requires a specific setting in the SharePoint admin center.

To implement:
Sign in to the SharePoint admin center (https://admin.microsoft.com/sharepoint) with SharePoint Administrator or Global Administrator credentials.
Navigate to Settings > Settings (or Org settings in some tenants). Locate the Sensitivity labels section.
Enable the option to Use Microsoft Purview sensitivity labels to protect content in SharePoint sites, document libraries, and lists.
Save the changes. It may take up to 24 hours for the setting to propagate.
This step is necessary because, even with an E5 subscription (which includes Microsoft Purview Audit and Information Protection), SharePoint Online requires explicit activation to integrate sensitivity labels for site-level permissions or document protection. Once enabled, labels created in the Purview portal can be applied to SharePoint content, ensuring compliance with policies like data loss prevention or retention.

Why other options are incorrect:
A. the Microsoft Purview portal:
This is where sensitivity labels are created, published, and managed (under Information protection > Labels). However, it does not control whether SharePoint Online supports these labels; that setting is exclusive to the SharePoint admin center.
B. the Microsoft Entra admin center:
This manages identity and access policies (e.g., user roles, conditional access) but has no direct role in enabling sensitivity labels for SharePoint Online. It’s unrelated to SharePoint or Purview configuration.
D. the Microsoft 365 admin center:
This provides tenant-wide settings and license management but lacks the specific toggle for enabling sensitivity labels in SharePoint Online. It serves as a hub to access other admin centers, like SharePoint’s, but isn’t the direct tool for this task.

References:
Microsoft Learn - Use sensitivity labels with Microsoft SharePoint
Microsoft Learn - Enable sensitivity labels for SharePoint Online
Microsoft Learn - Microsoft Purview sensitivity labels overview

You have a Microsoft 365 ES subscription that uses Microsoft Teams and contains the users shown in the following table.



Explanations:
Core Principle: When multiple retention policies apply to the same item, the longest retention period wins. Deletion is processed separately, but retention always takes precedence.

Statement 1: The message edited by User1 will be deleted after five years.
Action: User1 edits a message in the Team1 channel.
Policy Analysis:
Policy1: Applies to all teams for channel messages. Retention period: 7 years.
Policy2: Applies specifically to Team1 for channel messages. Retention period: 5 years.
Resolution: Both policies apply to this message. The longest retention period (7 years) wins for the purpose of preserving the message. However, the question asks about deletion. The deletion action is governed by the individual policies after their specific retention period ends. Policy2 will attempt to delete the message after 5 years, but Policy1 will still be retaining it. The item will not be permanently deleted until the longest retention period (7 years from Policy1) expires.
Conclusion: The statement says the message "will be deleted after five years." This is false because the winning 7-year retention period from Policy1 will prevent its deletion at the 5-year mark. It will be deleted after 7 years.
Final Answer: No

Statement 2: User1 can see the message sent by User2 for up to seven years.
Action: User2 sends a message to User1 in a private 1:1 chat.
Policy Analysis:

Policy1: Applies to User1's chats. Retention period: 7 years.
Policy2: Applies to User2's chats. Retention period: 5 years.
Resolution: A 1:1 chat is a single item that exists in both users' chat mailboxes. For retention to apply to the chat item, the policy must cover at least one participant. In this case, both User1 and User2 are covered by policies. Therefore, the longest retention period (7 years from Policy1) wins for the entire chat item. The chat message will be retained for 7 years.
Conclusion: The statement says User1 can see the message for "up to seven years." This is true beca
use the message is retained for 7 years. Final Answer: Yes

Statement 3: The message deleted by User1 will be moved to the SubstrateHolds folder.
Action: User1 deletes a message from the Team2 channel.
Policy Analysis:
Policy1: Applies to all teams (including Team2) for channel messages. Retention period: 7 years.
Policy2: Does not apply to Team2 channel messages.
Resolution: Because Policy1 applies, the message is subject to a 7-year retention period. When a user deletes an item that is under retention, it is not permanently erased. Instead, it is moved to a hidden, secure folder called the SubstrateHolds folder (or Preservation Hold library in SharePoint/OneDrive) for the remainder of the retention period. This ensures the item cannot be permanently deleted until the retention period expires.
Conclusion: This statement accurately describes the backend process for retained items that users delete.
Final Answer: Yes

Reference:
Microsoft Learn:
How retention policies work with Microsoft Teams
Microsoft Learn:
How a retention policy works with a retention period (Specifically explains the "SubstrateHolds" folder for Teams).

You have a Microsoft 36S subscription.
In Microsoft Exchange Online, you configure the mail flow rule shown in the following exhibit.



Explanation:
The mail flow rule is configured to "Modify the message security... Apply Office 365 Message Encryption."

1. Recipients who use Gmail:
Gmail is a non-Microsoft email service. It has no built-in trust relationship with the Microsoft 365 encryption system.
Therefore, when a Gmail user receives an encrypted message, they cannot decrypt it directly in their inbox.
The email will contain a link or an attachment that directs them to the OME portal. They must authenticate (often with a one-time passcode sent to their email or by using a Google/Microsoft account) to read the message in a secure web browser.
Conclusion: They must sign in to the OME portal.

2. Recipients from an external Microsoft 365 subscription:
This scenario leverages a trusted service-to-service connection between two Microsoft 365 tenants.
When an encrypted email is sent from one Microsoft 365 organization to another, the encryption rights are honored seamlessly.
The recipient in the external tenant can open the encrypted message directly in their Outlook client (desktop, web, or mobile) without any additional steps. The decryption happens automatically in the background because both systems use the same underlying Microsoft Purview technology.
Conclusion: Messages are decrypted automatically.

Reference
Microsoft Learn: Office 365 Message Encryption
This documentation explains the different recipient experiences, including the seamless experience for users in other Microsoft 365 organizations and the portal experience for non-Microsoft users.

You have a Microsoft 365 E5 tenant.
You need to add a new keyword dictionary.
What should you create?

A. a trainable classifier

B. a retention policy

C. a sensitivity label

D. a sensitive info type

D.   a sensitive info type

Explanation:
To add a new keyword dictionary in Microsoft Purview, you must create a custom sensitive information type. Keyword dictionaries are specifically designed as components within sensitive information types, allowing you to define custom lists of terms (such as project names, internal codes, or specialized terminology) that Microsoft's built-in classifiers don't cover. The sensitive information type framework provides the structure to incorporate keyword dictionaries along with configurable elements like character proximity, confidence levels, and supporting patterns to create precise detection rules.
The process involves accessing the Microsoft Purview compliance portal, navigating to the sensitive information types section, and creating a new custom classifier where you can import or define your keyword list. This dictionary then becomes available for use across various Purview capabilities including Data Loss Prevention (DLP) policies, communication compliance, and information protection labeling rules.

Why Other Options Are Incorrect:
A. a trainable classifier:
While trainable classifiers also identify content, they use machine learning based on submitted sample documents rather than predefined keyword lists. They're designed for pattern recognition in complex content types that are difficult to define with explicit keywords, making them unsuitable for creating structured keyword dictionaries.
B. a retention policy:
Retention policies manage content lifecycle through retention and deletion schedules across Microsoft 365 workloads. They operate at the container or location level and lack any capability for keyword detection or dictionary management, focusing entirely on time-based data governance rather than content inspection.
C. a sensitivity label:
Sensitivity labels provide classification, protection controls (encryption, watermarks), and access governance for documents and emails. While they can be automatically applied using sensitive information types that reference keyword dictionaries, the labels themselves cannot contain or create keyword dictionaries—they consume the output of detection mechanisms rather than defining them.

Reference
Microsoft Learn: Create a keyword dictionary
This documentation explicitly states:
"You can create a keyword dictionary for use as a sensitive information type in the Microsoft Purview compliance portal." It provides the procedural guidance for creating keyword dictionaries specifically within the sensitive information types framework.
Microsoft Learn:
Learn about sensitive information types
This reference explains the architecture of sensitive information types and how keyword dictionaries integrate as detectable patterns within this classification system.

You have a Microsoft 365 E5 subscription.
You plan to implement Microsoft Purview insider risk management.
You implement the HR data connector.
You need to prepare the data that will be imported by the data connector.
In which format should you prepare the data?

A. JSON

B. CSV

C. TSV

D. XML

E. PRN

B.   CSV

Explanation:
The Microsoft Purview HR connector for insider risk management requires data to be prepared in CSV (Comma-Separated Values) format. This requirement is explicitly specified in Microsoft's documentation and is integral to the connector's design for importing human resources data such as employee termination dates, resignation dates, and employment status changes. The CSV format provides a standardized, structured approach that ensures reliable parsing and processing of HR data by the Purview compliance platform.
The implementation process involves exporting HR data from source systems (like Workday or SAP SuccessFactors) into a CSV file containing specific mandatory columns including DateOfTermination, LastWorkingDate, ResignationDate, and ManagerEmail. This file must then be uploaded to an Azure Storage container, from which the HR connector automatically imports the data to trigger and support insider risk management policies based on user employment status changes.

Why Other Options Are Incorrect:
A. JSON & D. XML:
These structured data formats are primarily used for API integrations and web services communication. While they excel in programmatic data exchange, the HR connector is specifically engineered to process flat file exports from HR systems through scheduled batch processes rather than real-time API consumption.
C. TSV (Tab-Separated Values):
Although functionally similar to CSV as a delimited text format, TSV uses tabs as delimiters rather than commas. The HR connector's parsing engine is specifically calibrated for comma-separated values, and using TSV format would likely result in import failures or data misinterpretation due to the different delimiter specification.
E. PRN (Printer File):
This is a legacy fixed-width format designed for printer output that lacks the structured delimiter approach required by modern data connectors. PRN files do not provide the consistent column separation necessary for reliable automated processing by the HR connector's import mechanism.

Reference:
Microsoft Learn: Import data with the HR connector
This documentation explicitly states: "You'll need to create a CSV file with the following columns..." and provides the complete schema specification, file preparation requirements, and implementation steps for the HR connector, confirming CSV as the mandatory format.

You have a Microsoft 365 subscription.
You need to customize encrypted email for the subscription. The solution must meet the following requirements.
Ensure that when an encrypted email is sent, the email includes the company logo. Minimize administrative effort.
Which PowerShell cmdlet should you run?

A. Set-IRMConfiguration

B. Set-OMEConfiguration

C. Set-RMSTemplate

D. New-OMEConfiguration

B.   Set-OMEConfiguration

Explanation:
The Set-OMEConfiguration PowerShell cmdlet is specifically designed to customize the branding and appearance of encrypted emails sent via Microsoft Purview Message Encryption (formerly known as Office 365 Message Encryption). This cmdlet allows you to modify the default encryption portal experience to include your company's branding elements.

Key Reasons:
The primary requirement is to add a company logo to encrypted emails. The Set-OMEConfiguration cmdlet includes parameters such as -LogoURL that allow you to specify the web-accessible location of your company logo image file.
The requirement to minimize administrative effort is met because this cmdlet provides a centralized way to configure branding that automatically applies to all future encrypted emails sent from your organization, eliminating the need for per-user or per-message configuration.
This cmdlet also supports other branding customizations like custom introductory text, disclaimer text, and color schemes, providing a comprehensive solution for email encryption branding.

Why Other Options Are Incorrect:
A. Set-IRMConfiguration:
This cmdlet manages Azure Rights Management (now part of Microsoft Purview Information Protection) settings at the organizational level, such as enabling/disabling the service or journal report decryption. It does not handle the visual branding customization of encrypted email messages.
C. Set-RMSTemplate:
This cmdlet is used to modify Rights Management Service (RMS) templates that control permissions and encryption settings for documents. While related to information protection, it does not control the visual branding elements (like logos) displayed in encrypted emails.
D. New-OMEConfiguration:
This cmdlet does not exist in Exchange Online PowerShell. The correct cmdlets for OME configuration management are Get-OMEConfiguration, Set-OMEConfiguration, and Remove-OMEConfiguration.

Reference:
Microsoft Learn: Set-OMEConfiguration
This documentation specifically describes how to use the Set-OMEConfiguration cmdlet to customize the appearance of encrypted messages, including the -LogoURL parameter for adding company branding.

You have a Microsoft 365 E5 subscription that contains a trainable classifier named Trainable1. You plan to create the items shown in the following table.


Which items can use Trainable 1?

A. Label2 only

B. Label1 and Label2 only

C. Label1 and Policy1 only

D. Label2, Policy1, and DLP1 only

E. Label1, Label2, Policy1, and DLP1

D.   Label2, Policy1, and DLP1 only

Explanation:
A trainable classifier in Microsoft Purview (formerly Microsoft 365 Compliance Center) is a machine learning–based classification method that helps automatically identify and categorize content according to its meaning rather than fixed patterns or keywords. Unlike sensitive information types, which depend on patterns (like credit card or ID numbers), trainable classifiers analyze text context and behavior to detect items such as “contracts,” “invoices,” or “resumes.” They are primarily used to auto-apply retention labels, configure data loss prevention (DLP) policies, or drive compliance actions based on the content type.
Trainable classifiers are created and trained within Microsoft Purview using sample content. Once trained, they can be published and used in certain types of policies or labels that support automatic classification.

Why Option D Is Correct
Label2 (Retention Label):
A retention label is used to manage the lifecycle of data by defining how long items should be retained and what happens when the retention period expires. Microsoft Purview allows you to use a trainable classifier to automatically apply a retention label when content matches the classifier’s pattern. For example, if you have a classifier named “Contracts,” it can automatically apply a retention label to any document in SharePoint or OneDrive that Purview identifies as a contract. This helps organizations enforce retention and deletion policies automatically, ensuring compliance with data governance regulations.

Policy1 (Retention Label Policy):
A retention label policy is a publishing mechanism that distributes retention labels (including those using trainable classifiers) across Microsoft 365 locations such as SharePoint, OneDrive, Exchange, and Teams. When an admin configures an auto-labeling policy, they can choose a trainable classifier as the condition to determine where the label should be applied. For instance, you can create a policy that automatically applies a label to all files identified as “Confidential Financial Data” using the classifier. Thus, Policy1 can utilize Trainable1 indirectly by including the classifier-based retention label.

DLP1 (Data Loss Prevention Policy):
A data loss prevention (DLP) policy helps detect and prevent the accidental sharing of sensitive or confidential information. DLP policies support trainable classifiers as a condition within their rules. This allows the DLP engine to detect files or messages containing content that matches a classifier’s definition — for example, any document classified as “Legal Contract” or “Financial Statement.” When matched, DLP actions such as blocking sharing, applying encryption, or sending alerts can be triggered. Therefore, Trainable1 can be used within DLP1 to protect classified content.

Why the Other Options Are Incorrect
A. Label2 only:
This option is partially correct but incomplete. While a retention label (Label2) can indeed use a trainable classifier to automatically classify and label content, trainable classifiers can also be used in retention label policies and DLP policies. Therefore, limiting it only to Label2 ignores other valid uses.
B. Label1 and Label2 only:
A sensitivity label (Label1) cannot use trainable classifiers. Sensitivity labels are used to protect data (through encryption, content marking, and access restrictions), not to classify it based on machine learning models. They depend on sensitive information types or manual user application, not classifiers. While Label2 can use classifiers, Label1 cannot. Hence, this option is incorrect.
C. Label1 and Policy1 only:
As explained above, Label1 cannot use classifiers. While Policy1 can use classifiers via auto-labeling, combining it with Label1 makes this option incorrect.
E. Label1, Label2, Policy1, and DLP1:
Although Label2, Policy1, and DLP1 can use classifiers, Label1 cannot. Sensitivity labels operate under Microsoft Purview Information Protection, not Data Lifecycle Management, and do not support trainable classifiers. Thus, including Label1 makes this option invalid.

References:
Microsoft Learn – Trainable classifiers in Microsoft Purview:
Microsoft Learn – Automatically apply a retention label:
Microsoft Learn – Create and use custom trainable classifiers:

You implement Microsoft 36S Endpoint data loss pi event ion (Endpoint DIP).
You have computer that run Windows 11 and have Microsoft 365 Apps instated The computers are joined to a Microsoft Entra tenant.
You need to ensure that endpoint DIP policies can protect content on the computers.
Solution: You deploy the Microsoft Purview Information Protection client to the computers.
Does this meet the goal?

A. Yes

B. No

B.   No

Explanation:
This solution does not meet the goal. The Microsoft Purview Information Protection (MPIP) client is not required for Endpoint Data Loss Prevention (Endpoint DLP) to function on Windows 11 devices.

Here's the correct understanding:
Endpoint DLP Architecture: Endpoint DLP uses a built-in component integrated directly into the Windows 11/10 operating system (specifically, part of the Microsoft Defender stack). This integration is what allows it to monitor and control file activities (copy, paste, print, share) and application access at the operating system level.
Correct Prerequisites: To enable Endpoint DLP protection on Windows devices, you must:
Onboard the devices to Microsoft Purview via the Device Onboarding configuration package.
Ensure the devices are running a supported Windows 10/11 edition (like Enterprise or Pro) with the necessary components enabled.
The Microsoft 365 Apps requirement in the question is correct, as Endpoint DLP policies often interact with Office applications to enforce rules.
Role of the MPIP Client: The Microsoft Purview Information Protection client (also known as the Azure Information Protection Unified Labeling Client - AIP UL Client) is a legacy, standalone client used primarily for:
Applying sensitivity labels in classic File Explorer (right-click labeling).
Providing additional features for existing AIP deployments.
It is not the core engine that powers Endpoint DLP monitoring and enforcement. In fact, Microsoft recommends moving to the built-in labeling that is integrated into Windows and Office 365 Apps, which works seamlessly with Endpoint DLP without requiring the separate MPIP client.
Conclusion: Deploying the MPIP client is an incorrect and unnecessary step for enabling Endpoint DLP. The required action is to onboard the devices to Microsoft Purview, which activates the built-in Endpoint DLP capabilities already present in Windows 11.

Reference
Microsoft Learn: Get started with Endpoint data loss prevention
This documentation details the prerequisites, which focus on device onboarding and supported Windows versions, with no mention of requiring the MPIP client for Endpoint DLP functionality.

You have a Microsoft 365 E5 tenant that has devices onboarded to Microsoft Defender for Endpoint as shown in the following table.

You plan to start using Microsoft 365 Endpoint data loss protection (Endpoint DLP).
Which devices support Endpoint DLP?

A. Device1 only

B. Device1 and Device2 only

C. Device1 and Device4 only

D. Device1, Device2, and Device4 only

E. Device1, Device2, Device3, and Device4


Explanation:
Microsoft 365 Endpoint Data Loss Prevention (DLP) operates through deep integration with device operating systems to monitor file activities, control data transfers, and enforce protection policies. The solution's availability is strictly limited to platforms where Microsoft can deploy specialized agents that interface with core system components for comprehensive monitoring and enforcement capabilities.

Supported Platforms:
Windows 11 (Device1) and Windows 10 (Device2) receive full support through native integration within the Microsoft Defender for Endpoint platform. This integration enables real-time monitoring of file operations, application usage, network transfers, and clipboard activities while providing granular control over data movement through both user interface and background processes.
macOS (Device4) versions 12 (Monterey) and later are supported through a dedicated DLP agent that monitors file system activities, tracks sensitive data access, and enforces organizational DLP policies on Apple's desktop environment, though with some functional limitations compared to the Windows implementation.

Unsupported Platform:
iOS (Device3) is explicitly excluded from Endpoint DLP support due to fundamental architectural constraints in Apple's mobile operating system. iOS employs stringent application sandboxing that prevents the system-level monitoring required for comprehensive endpoint DLP functionality. Data protection for iOS devices is instead managed through alternative Microsoft technologies including Microsoft Defender Application Guard, App Protection Policies (MAM), and conditional access controls that operate within Apple's application framework limitations.

Reference:
Microsoft Learn: Get started with Endpoint data loss prevention - Supported operating systems
This official documentation explicitly confirms platform support: "Endpoint DLP supports Windows 10, Windows 11, and macOS (Monterey 12, Ventura 13, and Sonoma 14) devices," while notably excluding iOS and other mobile operating systems from the supported platform list.

HOTSPOT
You have a Microsoft 365 E5 subscription that contains two users named User1 and User2.
You create the audit retention policies shown in the following table.


Page 2 out of 13 Pages
SC-401 Practice Test

Are You Truly Prepared?

Don't risk your exam fee on uncertainty. Take this definitive practice test to validate your readiness for the Microsoft SC-401 exam.