admin
No description.Please update your profile.
Exam SC-400: Microsoft Information Protection Administrator
The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant.
They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies.
This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.
Part of the requirements for: Microsoft Certified: Information Protection Administrator Associate
Related exams: none
Important: See details
Go to Certification Dashboard
Exam SC-400: Microsoft Information Protection Administrator
Languages: English
Retirement date: none
This exam measures your ability to accomplish the following technical tasks: implement information protection; implement data loss prevention; and implement information governance.
Skills measured
Implement information protection (35-40%)
Implement data loss prevention (30-35%)
Implement information governance (25-30%)
Audience Profile
The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant. They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies.
This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.
Skills Measured
NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive.
NOTE: Most questions cover features that are General Availability (GA). The exam may contain questions on Preview features if those features are commonly used.
Implement Information Protection (35-40%)
Create and manage sensitive information types
select a sensitive information type based on an organization’s requirements
create and manage custom sensitive information types
create custom sensitive information types with exact data match
implement document fingerprinting
create a keyword dictionary
Create and manage trainable classifiers
identify when to use trainable classifiers
create a trainable classifier
verify a trainable classifier is performing properly
retrain a classifier
Implement and manage sensitivity labels
identify roles and permissions for administering sensitivity labels
create sensitivity labels
configure and manage sensitivity label policies
apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites
configure and publish automatic labeling policies (excluding MCAS scenarios)
monitor label usage by using label analytics
apply bulk classification to on-premises data by using the AIP unified labelling scanner
manage protection settings and marking for applied sensitivity labels
apply protections and restrictions to email including content marking, usage, permission, encryption, expiration, etc.
apply protections and restrictions to files including content marking, usage, permission, encryption, expiration, etc.
Plan and implement encryption for email messages
define requirements for implementing Office 365 Message Encryption
implement Office 365 Advanced Message Encryption
Implement Data Loss Prevention (30-35%)
Create and configure data loss prevention policies
recommend a data loss prevention solution for an organization
configure data loss prevention for policy precedence
configure policies for Microsoft Exchange email
configure policies for Microsoft SharePoint sites
configure policies for Microsoft OneDrive accounts
configure policies for Microsoft Teams chat and channel messages
integrate Microsoft Cloud App Security (MCAS) with Microsoft Information Protection
configure policies in Microsoft Cloud App Security (MCAS)
implement data loss prevention policies in test mode
Implement and monitor Microsoft Endpoint data loss prevention
configure policies for endpoints
configure Endpoint data loss prevention settings
recommend configurations that enable devices for Endpoint data loss prevention policies
monitor endpoint activities
Manage and monitor data loss prevention policies and activities
manage and respond to data loss prevention policy violations
review and analyze data loss prevention reports
manage permissions for data loss prevention reports
manage data loss prevention violations in Microsoft Cloud App Security (MCAS)
Implement Information Governance (25-30%)
Configure retention policies and labels
create and apply retention labels
create and apply retention label policies
configure and publish auto-apply label policies
Manage data retention in Microsoft 365
create and apply retention policies in Microsoft SharePoint and OneDrive
create and apply retention policies in Microsoft Teams
recover content in Microsoft Teams, SharePoint, and OneDrive
recover content in Microsoft Exchange
implement retention policies and tags in Microsoft Exchange
apply mailbox holds in Microsoft Exchange
implement Microsoft Exchange Online archiving policies
Implement records management in Microsoft 365
configure labels for records management
manage and migrate retention requirements with a file plan
configure automatic retention using File Plan descriptors
classify records using retention labels and policies
implement in-place records management in Microsoft SharePoint
configure event-based retention
manage disposition of records
QUESTION 1
You create three sensitivity labels named Sensitivity1, Sensitivity2, and Sensitivity3 and perform the following actions:
Publish Sensitivity1.
Create an auto-labeling policy for Sensitivity2.
You plan to create a file policy named Policy1 in Microsoft Cloud App Security.
Which sensitivity labels can you apply to Microsoft SharePoint Online in Policy1?
A. Sensitivity1 only
B. Sensitivity1, Sensitivity2, and Sensitivity3
C. Sensitivity2 only
D. Sensitivity1 and Sensitivity2 only
Correct Answer: D
QUESTION 2
You are implementing a data classification solution.
The research department at your company requires that documents containing programming code be labeled as Confidential.
The department provides samples of the code from its document library. The solution must minimize administrative effort.
What should you do?
A. Create a custom classifier.
B. Create a sensitive info type that uses Exact Data Match (EDM).
C. Use the source code classifier.
D. Create a sensitive info type that uses a regular expression.
Correct Answer: C
QUESTION 3
You have a new Microsoft 365 tenant.
You need to ensure that custom trainable classifiers can be created in the tenant.
To which role should you be assigned to perform the configuration?
A. Security administrator
B. Security operator
C. Global administrator
D. Compliance administrator
Correct Answer: D
Actualkey Microsoft SC-400 Exam pdf, Certkingdom Microsoft SC-400 PDF
Best Microsoft SC-400 Certification, Microsoft SC-400 Training at certkingdom.com
No description.Please update your profile.
@ 2016 Certkingdom.com-Developed By Certkingdom.com