You have a Microsoft 365 E5 subscription that contains a user named User1.
User1 needs to be able to create Data Subject Requests (DSRs) in the Microsoft 365 compliance center.
To which role or role group should you add User1?
Answer : C
You have a Microsoft 365 E5 subscription.
You create a sensitivity label named Label 1 and publish Label1 to all users and groups.
You have the following files on a computer:
* File1.doc
* File2.docx
* File3.xlsx
* File4.txt
You need to identify which files can have Label1 applied. Which files should you identify?
Answer : C
You have a Microsoft 365 tenant that has modern authentication enabled.
You have Windows 10, MacOS. Android, and iOS devices that are managed by using Microsoft Endpoint Manager. Some users have older email client applications that use Basic authentication to connect to Microsoft Exchange Online. You need to implement a solution to meet the following security requirements-
* Allow users to connect to Exchange Online only by using email client applications that support modern authentication protocols based on OAuth 2.0.
* Block connections to Exchange Online by any email client applications that do NOT support modern authentication.
What should you implement?
Answer : C
You have a Microsoft 365 E5 subscription that uses Azure Active Directory (Azure AD) Privileged identity Management (PIM). A user named User! is eligible for the User Account Administrator role. You need User! to request to activate the User Account Administrator role. From where should User1 request to activate the role?
Answer : B
You have a Microsoft 365 E5 subscription that uses insider risk management and contains the users shown in the following table.
Which users can use Content explorer?
Answer : D
You have a Microsoft 365 Enterprise E5 subscription.
You use Microsoft Defender for Endpoint.
You need to integrate Microsoft Defender for Office 365 and Microsoft Defender for Endpoint
Where should you configure the integration?
Answer : D
You have a Microsoft 365 subscription that contains 50 devices- The devices are enrolled in Microsoft Endpomt Manager and have Microsoft Defender for Endpoint enabled. You need to identify devices that have a pending offline scan. What should you do?
Answer : A