Free Microsoft SC-400 Exam Actual Questions

The questions for SC-400 were last updated On Jun 11, 2025

At ValidExamDumps, we consistently monitor updates to the Microsoft SC-400 exam questions by Microsoft. Whenever our team identifies changes in the exam questions,exam objectives, exam focus areas or in exam requirements, We immediately update our exam questions for both PDF and online practice exams. This commitment ensures our customers always have access to the most current and accurate questions. By preparing with these actual questions, our customers can successfully pass the Microsoft Information Protection Administrator exam on their first attempt without needing additional materials or study guides.

Other certification materials providers often include outdated or removed questions by Microsoft in their Microsoft SC-400 exam. These outdated questions lead to customers failing their Microsoft Information Protection Administrator exam. In contrast, we ensure our questions bank includes only precise and up-to-date questions, guaranteeing their presence in your actual exam. Our main priority is your success in the Microsoft SC-400 exam, not profiting from selling obsolete exam questions in PDF or Online Practice Test.

 

Question No. 1

You have a Microsoft 365 E5 subscription that contains a user named User1.

You need to ensure that all email messages that contain attachments are encrypted automatically by using Microsoft Purview Message Encryption.

What should you create?

Show Answer Hide Answer
Correct Answer: D

Question No. 2

You have a Microsoft 365 subscription.

You have a team named Team! in Microsoft Teams.

You plan to place all the content in Team1 on hold.

You need to identify which mailbox and which Microsoft SharePoint site collection are associated to Team1.

Which cmdlet should you use?

Show Answer Hide Answer
Correct Answer: D

Question No. 3

You have a Microsoft 365 E5 tenant and the Windows 10 devices shown in the following table.

To which devices can you apply Microsoft 365 Endpoint data loss prevention (Endpoint DLP) settings?

Show Answer Hide Answer
Question No. 4

You need to automatically apply a sensitivity label to documents that contain information about your company's

network including computer names, IP addresses, and configuration information.

Which two objects should you use? Each correct answer presents part of the solution. (Choose two.)

NOTE: Each correct selection is worth one point.

Show Answer Hide Answer
Correct Answer: A, B

https://docs.microsoft.com/en-us/microsoft-365/compliance/classifier-learn-about?view=o365-worldwide

https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-sensitivity-label-automatically?view=o365-

worldwide

Question No. 5

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have a Microsoft 365 tenant and 500 computers that run Windows 10. The computers are onboarded to Microsoft Purview.

You discover that a third-party application named Tailspin_scanner.exe accessed protected sensitive information on multiple computers. Tailspin_scanner.exe is installed locally on the computers.

You need to block Tailspin_scanner.exe from accessing sensitive documents without preventing the application from accessing other documents.

Solution: From Microsoft Defender for Cloud Apps, you create an app discovery policy.

Does this meet the goal?

Show Answer Hide Answer
Correct Answer: B