BASE
EXAM DUMPS
MICROSOFT
SC-401
28% OFF Automatically For You
Administering Information Security in Microsoft
365
,1. Topic 1, Contoso, Ltd Case Study 1
Instructions
This is a case study. Case studies are not timed separately from other exam sections.
You can use as much exam time as you would like to complete each case study.
However, there might be additional case studies or other exam sections. Manage
your time to ensure that you can complete all the exam sections in the time provided.
Pay attention to the Exam Progress at the top of the screen so you have sufficient
time to complete any exam sections that follow this case study.
To answer the case study questions, you will need to reference information that is
provided in the case. Case studies and associated questions might contain exhibits or
other resources that provide more information about the scenario described in the
e
et
case. Information provided in an individual question does not apply to the other
pl
questions in the case study.
om
C
pt
A Review Screen will appear at the end of this case study. From the Review Screen,
em
you can review and change your answers before you move to the next exam section.
tt
-A
After you leave this case study, you will NOT be able to return to it.
st
r
Fi
r
To start the case study
fo
)
To display the first question in this case study, select the "Next" button. To the left of
02
9.
the question, a menu provides links to information such as business requirements, the
(V
existing environment, and problem statements. Please read through all this
ps
um
information before answering any questions. When you are ready to answer a
D
question, select the "Question" button to return to the question.
01
-4
C
Overview
S
t
of
Contoso, Ltd. is a consulting company that has a main office in Montreal and three
s
ro
branch offices in Seattle, Boston, and Johannesburg.
ic
M
id
Existing Environment
al
V
Microsoft 365 Environment
Contoso has a Microsoft 365 E5 tenant.
The tenant contains the administrative user accounts shown in the following table.
, e
et
pl
om
C
Users store data in the following locations:
pt
? SharePoint sites
em
tt
? OneDrive accounts
-A
? Exchange email rst
Fi
? Exchange public folders
r
fo
? Teams chats
)
02
? Teams channel messages
9.
(V
ps
When users in the research department create documents, they must add a 10-digit
um
project code to each document. Project codes that start with the digits 999 are
D
confidential.
01
-4
C
S
SharePoint Online Environment
t
of
Contoso has four Microsoft SharePoint Online sites named Site1, Site2, Site3, and
s
ro
Site4.
ic
M
Site2 contains the files shown in the following table.
id
al
V
, Two users named User1 and User2 are assigned roles for Site2 as shown in the
following table.
Site3 stores documents related to the company's projects. The documents are
organized in a folder hierarchy based on the project.
e
et
pl
om
Site4 has the following two retention policies applied:
C
? Name: Site4RetentionPolicy1
pt
? Locations to apply the policy: Site4
em
? Delete items older than: 2 years
tt
-A
? Delete content based on: When items were created rst
Fi
? Name: Site4RetentionPolicy2
r
fo
? Locations to apply the policy: Site4
)
02
? Retain items for a specific period: 4 years
9.
? Start the retention period based on: When items were created
(V
? At the end of the retention period: Do nothing
ps
um
D
Problem Statements
01
Management at Contoso is concerned about data leaks. On several occasions,
-4
C
confidential research department documents were leaked.
S
t
of
s
ro
Requirements
ic
M
Planned Changes
id
Contoso plans to create the following data loss prevention (DLP) policy:
al
V
? Name: DLPpolicy1
? Locations to apply the policy: Site2
? Conditions:
? Content contains any of these sensitive info types: SWIFT Code
? Instance count: 2 to any
? Actions: Restrict access to the content
Technical Requirements
Contoso must meet the following technical requirements:
? All administrative users must be able to review DLP reports.
? Whenever possible, the principle of least privilege must be used.