New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-900 Exam - Topic 11 Question 24 Discussion

Actual exam question for Microsoft's SC-900 exam
Question #: 24
Topic #: 11
[All SC-900 Questions]

What is a characteristic of a sensitivity label in Microsoft 365?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Isadora
4 months ago
Wait, are they really persistent? That’s new to me!
upvoted 0 times
...
William
4 months ago
They can be restricted to categories too!
upvoted 0 times
...
Truman
4 months ago
I thought they were just for encryption?
upvoted 0 times
...
Mozell
4 months ago
Totally agree, they stick with the data.
upvoted 0 times
...
Tarra
5 months ago
Sensitivity labels are persistent!
upvoted 0 times
...
Tabetha
5 months ago
I feel like the persistent nature of sensitivity labels is important, but I can't remember if that's the main focus of the question.
upvoted 0 times
...
Roosevelt
5 months ago
I practiced a question similar to this, and I think they are restricted to predefined categories, but I might be mixing it up with another topic.
upvoted 0 times
...
Gussie
5 months ago
I remember something about them being encrypted, but I can't recall if that's a defining feature or just a benefit.
upvoted 0 times
...
Sabra
5 months ago
I think sensitivity labels are persistent, but I'm not entirely sure if that's the only characteristic.
upvoted 0 times
...
Leontine
5 months ago
Hmm, I'm a bit unsure about this one. I know I need to check the IAM role and S3 bucket policies, but I'm not sure if there are any other steps I should take. I'll have to think this through carefully.
upvoted 0 times
...
Gwenn
5 months ago
This seems like a tricky one. I'll need to think through the different options carefully.
upvoted 0 times
...
Malinda
5 months ago
I'm a bit confused about whether the filter includes only the current user's issues or all issues for managers in the group.
upvoted 0 times
...
Bok
5 months ago
This looks like a pretty straightforward activity-based costing problem. I should be able to work through the data and calculate the profit per procedure.
upvoted 0 times
...
Vi
5 months ago
Okay, let's see here. The key information is that the emails are from an HR address, but they're phishing emails. That means the HR address is likely spoofed or compromised, so the actual threat actor is the sender of the phishing emails, not HR itself. I'll go with option B.
upvoted 0 times
...

Save Cancel