Free Microsoft SC-400 Exam Actual Questions

The questions for SC-400 were last updated On Jan 16, 2025

Question No. 1

You have a Microsoft 365 E5 subscription.

You plan to implement insider risk management for users that manage sensitive data associated with a project.

You need to create a protection policy for the users. The solution must meet the following requirements:

* Minimize the impact on users who are NOT part of the project.

* Minimize administrative effort.

What should you do first?

Show Answer Hide Answer
Correct Answer: B

Question No. 2

You have a Microsoft 365 E5 subscription.

You need to prevent users from uploading data loss prevention (DLP)-protected documents to the following third-party websites;

* web1.contoso.com

* web2.contoso.com

The solution must minimize administrative effort.

To what should you set the Service domains setting for Endpoint DLP?

Show Answer Hide Answer
Correct Answer: B

Question No. 3

You have a Microsoft 365 tenant that uses Microsoft Office 365 Message Encryption (OME).

You need to ensure that any emails containing attachments and sent to user1@contoso.com are encrypted automatically by using OME.

What should you do?

Show Answer Hide Answer
Correct Answer: C

You can create mail flow rules to help protect email messages you send and receive. You can set up rules to encrypt any outgoing email messages and remove encryption from encrypted messages coming from inside your organization or from replies to encrypted messages sent from your organization.


https://docs.microsoft.com/en-us/microsoft-365/compliance/define-mail-flow-rules-to-encrypt-email?view=o365-worldwide

Question No. 4

You have a Microsoft SharePoint Online site that contains employee contracts in a document library named

Contracts.

The contracts must be treated as records in accordance with your company's records management policy.

You need to implement a solution to automatically mark all the contracts as records when they are uploaded to

Contracts.

Which two actions should you perform? Each correct answer presents part of the solution. (Choose two.)

NOTE: Each correct selection is worth one point.

Show Answer Hide Answer
Correct Answer: B, C

https://docs.microsoft.com/en-us/microsoft-365/compliance/create-apply-retention-labels?view=o365-worldwide

Question No. 5

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to the Microsoft 365 compliance center.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From the Cloud App Security portal, you create an app discovery policy.

Does this meet the goal?

Show Answer Hide Answer
Correct Answer: B

You can create app discovery policies to alert you when new apps are detected within your organization.

Use the unallowed apps list instead.


https://docs.microsoft.com/en-us/cloud-app-security/cloud-discovery-policies

https://docs.microsoft.com/en-us/microsoft-365/compliance/endpoint-dlp-using?view=o365-worldwide