This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions below.
Designing a DLP policy typically involves which of the following actions?
Identify your stakeholders
Identify the categories of sensitive information to protect
Clearly define your business needs
When using a policy tip to override a rule, the option to override is per rule. As such, it overrides all the actions in the rule, with one exception. Which of the following actions is the one exception?
Sending a notification
Block access to the content
Restrict copying a sensitive item to a removeable USB device
As the Microsoft 365 Administrator for Fabrikam, Holly Spencer was confused as to how a notice appeared on the Microsoft Purview compliance portal's Home page. The message indicated that someone sent an email containing a credit card number. Fabrikam's DLP project team, which Holly was leading, had yet to create its first DLP policy. Without a custom DLP policy in place, how could Microsoft Purview DLP catch this violation?
Microsoft Purview DLP includes multiple templates that are constantly checking for specific violations
Microsoft Purview DLP has a default policy that's in-place and running
Exchange Online has a built-in DLP policy that checks for emails containing sensitive data
You must answer all questions before checking your work.
Was this page helpful?