New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft PL-600 Exam - Topic 10 Question 10 Discussion

Actual exam question for Microsoft's PL-600 exam
Question #: 10
Topic #: 10
[All PL-600 Questions]

A company wants to create a Power Automate flow that posts marketing events to social media.

The company must ensure that the postings adhere to regulatory requirements for handling of personally identifiable information (PII) dat

a. The company will not post events to unauthorized social media platforms.

You need to ensure that the requirement is met.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer: D, E

DLP policies enforce rules for which connectors can be used together by classifying connectors as either Business or Non-Business. If you put a connector in the Business group, it can only be used with other connectors from that group in any given app or flow. Sometimes you might want to block the usage of certain connectors altogether by classifying them as Blocked.


https://docs.microsoft.com/en-us/power-platform/admin/wp-data-loss-prevention

Contribute your Thoughts:

0/2000 characters
Mary
4 months ago
Not sure if a security role alone is enough...
upvoted 0 times
...
Dolores
4 months ago
Wait, can you really block data like that?
upvoted 0 times
...
Lezlie
4 months ago
I think the connector configuration is key too.
upvoted 0 times
...
Rachael
5 months ago
Totally agree, but what about the security role?
upvoted 0 times
...
Ryan
5 months ago
DLP policy is a must for PII protection!
upvoted 0 times
...
Vivienne
5 months ago
I vaguely remember something about AAD roles being important for permissions, but I'm not sure if option C is relevant here. It feels like it could be part of the solution.
upvoted 0 times
...
Val
5 months ago
I think creating a security role could help prevent unauthorized data export, so option B might be right. It sounds familiar from our practice questions.
upvoted 0 times
...
Tricia
5 months ago
I'm a bit unsure about the connectors. I feel like configuring them correctly is important, but I can't recall if it should be Non-Business or Blocked data.
upvoted 0 times
...
Jolene
5 months ago
I remember we discussed DLP policies in class, and they seem crucial for protecting PII. I think option D might be one of the answers.
upvoted 0 times
...
Kristal
5 months ago
This question seems pretty straightforward. I'm confident I can figure out which statement is false about RAID 2.0+ configuration.
upvoted 0 times
...
Jestine
5 months ago
This seems like a straightforward question about the foundation of total rewards programs. I'll need to think about the key factors that guide the design of these programs.
upvoted 0 times
...
Twana
5 months ago
I think a visit could help in assessing their capacity, but I also recall that travel costs can add up.
upvoted 0 times
...
Bev
5 months ago
I feel like there was something about centralized decision making being a traditional approach. Not sure if it's the best fit for this question.
upvoted 0 times
...

Save Cancel