Question: 1
You have a Microsoft 365 E5 tenant that uses a domain named contoso.com.
A user named User1 sends link-based, branded emails that are encrypted by using Microsoft Office 365
Advanced Message Encryption to the recipients shown in the following table.
For which recipients can User1 revoke the emails?
Question: 2
Your company has a Microsoft 365 tenant that uses a domain named Contoso.com.
You are implementing data loss prevention (DIP).
The company's default browser in Microsoft Edge.
You need to ensure that the users cannot upload files labels as Confidential from Firefox and Google Chrome to any cloud services.
NOTE: Each correct selection is worth one point.
Question: 3
You implement Microsoft 365 Endpoint data loss prevention (Endpoint DLP).
You have computers that run Windows 10 and have Microsoft 365 Apps installed. The computers are joined to Azure Active Directory (Azure AD).
You need to ensure that Endpoint DLP policies can protect content on the computers.
Solution:: You deploy the unified labeling client to the computers.
Does this meet the goal?
Question: 4
Your company has a Microsoft 365 tenant that uses a domain named Contoso.com.
You are implementing data loss prevention (DIP).
The company's default browser in Microsoft Edge.
During a recent audit, you discover that some user use Firefox and Google Chromo browsers to upload files labeled as Confidential to a third party Microsoft SharePoint Online site that has a URL of https://m365x076709.sharepoint .Uses are blocked from uploading the confidential files to the site from Microsoft Edge.
You need to ensure that the users cannot upload files labels as Confidential from Firefox and Google Chrome to any cloud services.
NOTE: Each correct selection is worth one point.
Question: 5
Your company has a Microsoft 365 tenant that uses a domain named contoso.com.
You are implementing data loss prevention (DLP).
The company's default browser is Microsoft Edge.
You need to ensure that the users cannot upload files labeled as Confidential from Firefox and Google Chrome to any cloud services.
Which two actions should you perform? Each correct answer presents part of the solution. (Choose two.)
NOTE: Each correct selection is worth one point.