New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-100 Exam - Topic 8 Question 1 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 1
Topic #: 8
[All SC-100 Questions]

You have a Microsoft 365 E5 subscription.

You are designing a solution to protect confidential data in Microsoft SharePoint Online sites that contain more than one million documents.

You need to recommend a solution to prevent Personally Identifiable Information (Pll) from being shared.

Which two components should you include in the recommendation? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

0/2000 characters
Charlette
4 months ago
Who knew protecting PII could be this complicated?
upvoted 0 times
...
Nan
4 months ago
Totally agree with DLP, but not sure about the other options.
upvoted 0 times
...
Lizette
4 months ago
Wait, are retention label policies really needed for this?
upvoted 0 times
...
Ludivina
4 months ago
I think sensitivity label policies are also essential.
upvoted 0 times
...
Elly
5 months ago
Definitely DLP policies are a must!
upvoted 0 times
...
Melodie
5 months ago
I practiced a similar question, and I feel like retention label policies might not be the best fit for this scenario. DLP seems more relevant for protecting PII.
upvoted 0 times
...
Casie
5 months ago
I'm not entirely sure about the second component. I remember something about sensitivity labels, but I'm confused if they are the right choice here.
upvoted 0 times
...
Lilli
5 months ago
I think data loss prevention (DLP) policies are definitely one of the components we need to include. They help in preventing sensitive information from being shared.
upvoted 0 times
...
Josphine
5 months ago
I recall eDiscovery cases being more about legal compliance rather than directly preventing data sharing. So, I’m leaning towards DLP and sensitivity labels for this one.
upvoted 0 times
...
Latia
5 months ago
I think the key here is to restrict access to the database to only trusted locations. Option B, adding a Trusted IP range, seems like the most straightforward approach.
upvoted 0 times
...
Corinne
5 months ago
Hmm, I'm not totally sure about this. Let me think... I know there are quantitative and nonquantitative methods, but I can't remember the specific names of the nonquantitative ones. I'll have to think this through carefully.
upvoted 0 times
...
Tish
5 months ago
Ugh, I'm not too familiar with Snort logs. But I'll give it my best shot and try to identify the service based on the information provided.
upvoted 0 times
...

Save Cancel