Practice Exams | Microsoft SC-400 MS Info Protection Admin
Be prepared for the Microsoft SC-400: Information Protection Administrator

Practice Exams | Microsoft SC-400 MS Info Protection Admin udemy course
Be prepared for the Microsoft SC-400: Information Protection Administrator
In order to set realistic expectations, please note: These questions are NOT official questions that you will find on the official exam. These questions DO cover all the material outlined in the knowledge sections below. Many of the questions are based on fictitious scenarios which have questions posed within them.
The official knowledge requirements for the exam are reviewed routinely to ensure that the content has the latest requirements incorporated in the practice questions. Updates to content are often made without prior notification and are subject to change at any time.
Each question has a detailed explanation and links to reference materials to support the answers which ensures accuracy of the problem solutions.
The questions will be shuffled each time you repeat the tests so you will need to know why an answer is correct, not just that the correct answer was item "B" last time you went through the test.
NOTE: This course should not be your only study material to prepare for the official exam. These practice tests are meant to supplement topic study material.
Should you encounter content which needs attention, please send a message with a screenshot of the content that needs attention and I will be reviewed promptly. Providing the test and question number do not identify questions as the questions rotate each time they are run. The question numbers are different for everyone.
Candidates should have experience with Microsoft 365 services, including Microsoft 365 Apps, Microsoft Exchange Online, Microsoft SharePoint, Microsoft OneDrive, and Microsoft Teams. They should also be familiar with PowerShell.
Implement information protection (25–30%)
Implement DLP (15–20%)
Implement data lifecycle and records management (10–15%)
Monitor and investigate data and activities by using Microsoft Purview (15–20%)
Manage insider and privacy risk in Microsoft 365 (15–20%)
Implement information protection (25–30%)
Create and manage sensitive info types
Identify sensitive information requirements for an organization's data
Translate sensitive information requirements into built-in or custom sensitive info types
Create and manage custom sensitive info types
Create and manage exact data match (EDM) classifiers
Implement document fingerprinting
Create and manage trainable classifiers
Identify when to use trainable classifiers
Design and create a trainable classifier
Test a trainable classifier
Retrain a trainable classifier
Implement and manage sensitivity labels
Implement roles and permissions for administering sensitivity labels
Define and create sensitivity labels
Configure and manage sensitivity label policies
Configure auto-labeling policies for sensitivity labels
Monitor data classification and label usage by using Content explorer, Activity explorer, and audit search
Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner
Manage protection settings and marking for applied sensitivity labels
Design and implement encryption for email messages
Design an email encryption solution based on methods available in Microsoft 365
Implement Microsoft Purview Message Encryption
Implement Microsoft Purview Advanced Message Encryption
Implement DLP (15–20%)
Create and configure DLP policies
Design DLP policies based on an organization’s requirements
Configure permissions for DLP
Create and manage DLP policies
Interpret policy and rule precedence in DLP
Configure a Microsoft Defender for Cloud Apps file policy to use DLP policies
Implement and monitor Endpoint DLP
Configure advanced DLP rules for devices in DLP policies
Configure Endpoint DLP settings
Recommend a deployment method for device onboarding
Identify endpoint requirements for device onboarding
Monitor endpoint activities
Implement the Microsoft Purview Extension
Monitor and manage DLP activities
Analyze DLP reports
Analyze DLP activities by using Activity explorer
Remediate DLP alerts in the Microsoft Purview compliance portal
Remediate DLP alerts generated by Defender for Cloud Apps
Implement data lifecycle and records management (10–15%)
Retain and delete data by using retention labels
Plan for information retention and disposition by using retention labels
Create retention labels for data lifecycle management
Configure and manage adaptive scopes
Configure a retention label policy to publish labels
Configure a retention label policy to auto-apply labels
Interpret the results of policy precedence, including using Policy lookup
Manage data retention in Microsoft 365 workloads
Create and apply retention policies for SharePoint and OneDrive
Create and apply retention policies for Microsoft 365 groups
Create and apply retention policies for Teams
Create and apply retention policies for Yammer
Create and apply retention policies for Exchange Online
Apply mailbox holds in Exchange Online
Implement Exchange Online archiving policies
Configure preservation locks for retention policies and retention label policies
Recover retained content in Microsoft 365
Implement Microsoft Purview records management
Create and configure retention labels for records management
Manage retention labels by using a file plan, including file plan descriptors
Classify records by using retention labels and retention label policies
Manage event-based retention
Manage the disposition of content in records management
Configure records management settings, including retention label settings and disposition settings
Monitor and investigate data and activities by using Microsoft Purview (15–20%)
Plan and manage regulatory requirements by using Microsoft Purview Compliance Manager
Plan for regulatory compliance in Microsoft 365
Create and manage assessments
Create and modify custom templates
Interpret and manage improvement actions
Create and manage alert policies for assessments
Plan and manage eDiscovery and Content search
Choose between eDiscovery (Standard) and eDiscovery (Premium) based on an organization’s requirements
Plan and implement eDiscovery
Delegate permissions to use eDiscovery and Content search
Perform searches and respond to results from eDiscovery
Manage eDiscovery cases
Perform searches by using Content search
Manage and analyze audit logs and reports in Microsoft Purview
Choose between Audit (Standard) and Audit (Premium) based on an organization’s requirements
Plan for and configure auditing
Investigate activities by using the unified audit log
Review and interpret compliance reports and dashboards
Configure alert policies
Configure audit retention policies
Manage insider and privacy risk in Microsoft 365 (15–20%)
Implement and manage Microsoft Purview Communication Compliance
Plan for communication compliance
Create and manage communication compliance policies
Investigate and remediate communication compliance alerts and reports
Implement and manage Microsoft Purview Insider Risk Management
Plan for insider risk management
Create and manage insider risk management policies
Investigate and remediate insider risk activities, alerts, and reports
Manage insider risk cases
Manage forensic evidence settings
Manage notice templates
Implement and manage Microsoft Purview Information Barriers (IBs)
Plan for IBs
Create and manage IB segments and policies
Configure Teams, SharePoint, and OneDrive to enforce IBs, including setting barrier modes
Investigate issues with IB policies
Implement and manage privacy requirements by using Microsoft Priva
Configure and maintain privacy risk management
Create and manage Privacy Risk Management policies
Identify and monitor potential risks involving personal data
Evaluate and remediate alerts and issues
Implement and manage subject rights requests