Exam: SC-401

SC-401 Exam
Vendor Microsoft
Certification Microsoft Information Security Administrator Associate
Exam Code SC-401
Exam Title Administering Information Security in Microsoft 365 Exam
No. of Questions 72
Last Updated Mar 14, 2025
Product Type Q&A PDF / Desktop & Android VCE Simulator / Online Testing Engine
Question & Answers Download
Online Testing Engine Download
Desktop Testing Engine Download
Android Testing Engine Download
Demo Download
Price $25 - Unlimited Life Time Access Immediate Access Included
SC-401 Exam + Online Testing Engine + Offline Simulator + Android Testing Engine & 4500+ Other Exams
Buy Now

RELATED EXAMS

  • 70-620

    TS: Configuring Microsoft Windows Vista Client

    Detail
  • 70-236

    Configuring Exchange Server 2007

    Detail
  • 70-270

    Installing, Configuring, and Administering Microsoft Windows XP Professional

    Detail
  • 70-431

    Microsoft SQL Server 2005 Implementation & Maintenance

    Detail
  • 70-647

    PRO: Windows Server 2008,Enterprise Administrator

    Detail
  • 70-649

    TS: Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008, Technology Specialist

    Detail
  • 70-089

    Planning, Deploying, and Managing Microsoft Systems Management Server 2003

    Detail
  • 70-121

    Designing and Providing Microsoft Volume License Solutions to Small and Medium Organizations

    Detail
  • 70-122

    Designing and Providing Microsoft Volume License Solutions to Large Organizations

    Detail
  • 70-123

    Planning, Implementing, and Maintaining a Software Asset Management (SAM) Program

    Detail
  • 70-228

    Installing, Configuring and Administering Microsoft SQL Server 2000, Enterprise Edition

    Detail
  • 70-229

    Designing and Implementing Databases with Microsoft SQL Server 2000, Enterprise Edition

    Detail
  • 70-235

    Developing Business Process and Integration Solutions Using BizTalk Server 2006

    Detail
  • 70-237

    Designing Messaging Solutions with MS Exchange Server 2007

    Detail
  • 70-238

    Deploying Messaging Solutions w/MS Exchange Server 2007

    Detail
  • 70-297

    Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure

    Detail
  • 70-298

    Designing Security for a MS Windows Server 2003 Network

    Detail
  • 70-300

    Analyzing Requirements and Defining Microsoft .NET Solution Architectures

    Detail
  • 70-305

    Developing and Implementing Web Applications with Microsoft Visual Basic.NET

    Detail
  • 70-306

    Developing and Implementing Windows-based Applications with Microsoft Visual Basic .NET

    Detail
  • 70-291

    Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

    Detail
  • 70-293

    Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

    Detail
  • 70-294

    Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 AD Infrastructure

    Detail
  • 70-310

    XML Web Services and Server Components with Visual Basic.NET

    Detail
  • 70-315

    Developing and Implementing Web Applications with Microsoft Visual C# .NET

    Detail
  • 70-316

    Developing and Implementing Windows-based Applications with Microsoft Visual C# .NET

    Detail
  • 70-320

    XML Web Services and Server Components with C#.NET

    Detail
  • 70-350

    Implementing Microsoft Internet Security and Acceleration (ISA) Server 2004

    Detail
  • 70-441

    PRO: Designing Database Solutions by using Microsoft SQL Server 2005

    Detail
  • 70-442

    Designing and Optimizing Data Access by Using Microsoft SQL Server 2005

    Detail

As an Information Security Administrator, you plan and implement information security of sensitive data by using Microsoft Purview and related services. You’re responsible for mitigating risks by protecting data inside collaboration environments that are managed by Microsoft 365 from internal and external threats and protecting data used by AI services. You also implement information protection, data loss prevention, retention, insider risk management, and manage information security alerts and activities.

You work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization’s information security and risk reduction goals. You collaborate with workload administrators, business application owners, and governance stakeholders to implement technology solutions that support the necessary policies and controls. This role also participates in responding to information security incidents.

You should be familiar with all Microsoft 365 services, PowerShell, Microsoft Entra, the Microsoft Defender portal, and Microsoft Defender for Cloud Apps.

Skills measured
Implement information protection (30–35%)
Implement data loss prevention and retention (30–35%)
Manage risks, alerts, and activities (30–35%)

Exam SC-401: Administering Information Security in Microsoft 365 (beta)
Languages: English
Retirement date: none

This exam measures your ability to accomplish the following technical tasks: implement information protection; implement data loss prevention and retention; manage risks, alerts, and activities.

This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Useful links Description
How to earn the certification Some certifications only require passing one exam, while others require passing multiple exams.
Certification renewal Microsoft associate, expert, and specialty certifications expire annually. You can renew by passing a free online assessment on Microsoft Learn.
Your Microsoft Learn profile Connecting your certification profile to Microsoft Learn allows you to schedule and renew exams and share and print certificates.
Exam scoring and score reports A score of 700 or greater is required to pass.
Exam sandbox You can explore the exam environment by visiting our exam sandbox.
Request accommodations If you use assistive devices, require extra time, or need modification to any part of the exam experience, you can request an accommodation.
About the exam

Some exams are localized into other languages, and those are updated approximately eight weeks after the English version is updated. If the exam isn't available in your preferred language, you can request an additional 30 minutes to complete the exam.

Note

The bullets that follow each of the skills measured are intended to illustrate how we are assessing that skill. Related topics may be covered in the exam.

Note
Most questions cover features that are general availability (GA). The exam may contain questions on Preview features if those features are commonly used.

Skills measured

Audience profile
As an information security administrator, you plan and implement information security of sensitive data by using Microsoft Purview and related services. You’re responsible for mitigating risks by protecting data inside collaboration environments that are managed by Microsoft 365 from internal and external threats and protecting data used by AI services. You also implement information protection, data loss prevention, retention, insider risk management, and manage information security alerts and activities.

You work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization’s information security and risk reduction goals. You collaborate with workload administrators, business application owners, and governance stakeholders to implement technology solutions that support the necessary policies and controls. This role also participates in responding to information security incidents.

You should be familiar with all Microsoft 365 services, PowerShell, Microsoft Entra, the Microsoft Defender portal, and Microsoft Defender for Cloud Apps.

Skills at a glance
Implement information protection (30–35%)
Implement data loss prevention and retention (30–35%)
Manage risks, alerts, and activities (30–35%)

Implement information protection (30–35%)
Implement and manage data classification
Identify sensitive information requirements for an organization's data
Translate sensitive information requirements into built-in or custom sensitive info types
Create and manage custom sensitive info types
Implement document fingerprinting
Create and manage exact data match (EDM) classifiers
Create and manage trainable classifiers
Monitor data classification and label usage by using data explorer and content explorer
Configure optical character recognition (OCR) support for sensitive info types
Implement and manage sensitivity labels in Microsoft Purview
Implement roles and permissions for administering sensitivity labels
Define and create sensitivity labels for items and containers
Configure protection settings and content marking for sensitivity labels
Configure and manage publishing policies for sensitivity labels
Configure and manage auto-labeling policies for sensitivity labels
Apply a sensitivity label to containers, such as Microsoft Teams, Microsoft 365 Groups, Microsoft Power BI, and Microsoft SharePoint
Apply sensitivity labels by using Microsoft Defender for Cloud Apps
Implement information protection for Windows, file shares, and Exchange
Plan and implement the Microsoft Purview Information Protection client
Manage files by using the Microsoft Purview Information Protection client
Apply bulk classification to on-premises data by using the Microsoft Purview Information Protection scanner
Design and implement Microsoft Purview Message Encryption
Design and implement Microsoft Purview Advanced Message Encryption

Implement data loss prevention and retention (30–35%)
Create and configure data loss prevention policies
Design data loss prevention policies based on an organization’s requirements
Implement roles and permissions for data loss prevention
Create and manage data loss prevention policies
Configure data loss prevention policies for Adaptive Protection
Interpret policy and rule precedence in data loss prevention
Create file policies in Microsoft Defender for Cloud Apps by using a DLP policy
Implement and monitor Microsoft Purview Endpoint DLP
Specify device requirements for Endpoint DLP, including extensions
Configure advanced DLP rules for devices in DLP policies
Configure Endpoint DLP settings
Configure just-in-time protection
Monitor endpoint activities
Implement and manage retention
Plan for information retention and disposition by using retention labels
Create, configure, and manage adaptive scopes
Create retention labels for data lifecycle management
Configure a retention label policy to publish labels
Configure a retention label policy to auto-apply labels
Interpret the results of policy precedence, including using Policy lookup
Create and configure retention policies
Recover retained content in Microsoft 365

Manage risks, alerts, and activities (30–35%)
Implement and manage Microsoft Purview Insider Risk Management
Implement roles and permissions for Insider Risk Management
Plan and implement Insider Risk Management connectors
Plan and implement integration with Microsoft Defender for Endpoint
Configure and manage Insider Risk Management settings
Configure policy indicators
Select an appropriate policy template
Create and manage Insider Risk Management policies
Manage forensic evidence settings
Enable and configure insider risk levels for Adaptive Protection
Manage insider risk alerts and cases
Manage Insider Risk Management workflow, including notice templates
Manage information security alerts and activities
Assign Microsoft Purview Audit (Premium) user licenses
Investigate activities by using Microsoft Purview Audit
Configure audit retention policies
Analyze Purview activities by using activity explorer
Respond to data loss prevention alerts in the Microsoft Purview portal
Investigate insider risk activities by using the Microsoft Purview portal
Respond to Purview alerts in Microsoft Defender XDR
Respond to Defender for Cloud Apps file policy alerts
Perform searches by using Content search
Protect data used by AI services
Implement controls in Microsoft Purview to protect content in an environment that uses AI services
Implement controls in Microsoft 365 productivity workloads to protect content in an environment that uses AI services
Implement pre-requisites for Data Security Posture Management (DSPM) for AI
Manage roles and permissions for DSPM for AI
Configure DSPM for AI policies
Monitor activities in DSPM for AI


SC-401 Brain Dumps Exam + Online / Offline and Android Testing Engine & 4500+ other exams included
$50 - $25
(you save $25)
Buy Now

New Topic: Topic 1, Contoso, Ltd Case Study 1
Instructions
This is a case study. Case studies are not timed separately from other exam sections. You can use as
much exam time as you would like to complete each case study. However, there might be additional
case studies or other exam sections. Manage your time to ensure that you can complete all the exam
sections in the time provided. Pay attention to the Exam Progress at the top of the screen so you
have sufficient time to complete any exam sections that follow this case study.
To answer the case study questions, you will need to reference information that is provided in the
case. Case studies and associated questions might contain exhibits or other resources that provide
more information about the scenario described in the case. Information provided in an individual
question does not apply to the other questions in the case study.
A Review Screen will appear at the end of this case study. From the Review Screen, you can review
and change your answers before you move to the next exam section. After you leave this case study,
you will NOT be able to return to it.
To start the case study
To display the first question in this case study, select the "Next" button. To the left of the question, a
menu provides links to information such as business requirements, the existing environment, and
problem statements. Please read through all this information before answering any questions. When
you are ready to answer a question, select the "Question" button to return to the question.
Overview
Contoso, Ltd. is a consulting company that has a main office in Montreal and three branch offices in
Seattle, Boston, and Johannesburg.
Existing Environment
Microsoft 365 Environment
Contoso has a Microsoft 365 E5 tenant. The tenant contains the administrative user accounts shown
in the following table.
Users store data in the following locations:
● SharePoint sites
● OneDrive accounts
● Exchange email
● Exchange public folders
● Teams chats
● Teams channel messages
When users in the research department create documents, they must add a 10-digit project code to each document. Project codes that start with the digits 999 are confidential.
SharePoint Online Environment
Contoso has four Microsoft SharePoint Online sites named Site1, Site2, Site3, and Site4.
Site2 contains the files shown in the following table.
Two users named User1 and User2 are assigned roles for Site2 as shown in the following table.
Site3 stores documents related to the company's projects. The documents are organized in a folder
hierarchy based on the project.
Site4 has the following two retention policies applied:
● Name: Site4RetentionPolicy1
● Locations to apply the policy: Site4
● Delete items older than: 2 years
● Delete content based on: When items were created
● Name: Site4RetentionPolicy2
● Locations to apply the policy: Site4
● Retain items for a specific period: 4 years
● Start the retention period based on: When items were created
● At the end of the retention period: Do nothing
Problem Statements
Management at Contoso is concerned about data leaks. On several occasions, confidential research department documents were leaked.
Requirements
Planned Changes
Contoso plans to create the following data loss prevention (DLP) policy:
● Name: DLPpolicy1
● Locations to apply the policy: Site2
● Conditions:
● Content contains any of these sensitive info types: SWIFT Code
● Instance count: 2 to any
● Actions: Restrict access to the content
Technical Requirements
Contoso must meet the following technical requirements:
● All administrative users must be able to review DLP reports.
● Whenever possible, the principle of least privilege must be used.
● For all users, all Microsoft 365 data must be retained for at least one year.
● Confidential documents must be detected and protected by using Microsoft 365.
● Site1 documents that include credit card numbers must be labeled automatically.
● All administrative users must be able to create Microsoft 365 sensitivity labels.
● After a project is complete, the documents in Site3 that relate to the project must be retained for 10 years.

QUESTION 1

DRAG DROP
You need to meet the technical requirements for the Site1 documents.
Which three actions should you perform in sequence? To answer, move the appropriate actions from
the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
The goal is to automatically label documents in Site1 that contain credit card numbers.
To achieve this, we need a sensitivity label with an auto-labeling policy based on a sensitive info type that detects credit card numbers.
Step 1: Create a Sensitive Info Type
● A sensitive info type is needed to detect credit card numbers in documents.
● Microsoft Purview includes built-in sensitive info types for credit card numbers, but we can also create a custom one if necessary.
Step 2: Create a Sensitivity Label
● A sensitivity label is required to classify and protect documents containing sensitive information.
● This label can apply encryption, watermarking, or access controls to credit card data.
Step 3: Create an Auto-Labeling Policy
● An auto-labeling policy ensures that the sensitivity label is applied automatically when credit card numbers are detected in Site1.
● This policy is configured to scan files and automatically apply the correct sensitivity label.

QUESTION 2

You need to meet the technical requirements for the creation of the sensitivity labels.
To which user or users must you assign the Sensitivity Label Administrator role?

A. Admin1 only
B. Admin1 and Admin4 only
C. Admin1 and Admin5 only
D. Admin1, Admin2, and Admin3 only
E. Admin1, Admin2, Admin4, and Admin5 only

Answer: D

Explanation:
To meet the requirement that all administrative users must be able to create Microsoft 365
sensitivity labels, we need to assign the Sensitivity Label Administrator role to the correct users.
Sensitivity Label Administrator Role Responsibilities
This role allows users to:
● Create and manage sensitivity labels in Microsoft Purview.
● Publish and configure auto-labeling policies.
● Modify label encryption and content marking settings.
Review of Admin Roles from the Table:
Users that must be assigned the Sensitivity Label Administrator role:
● Admin2 (Compliance Data Administrator)
● Admin3 (Compliance Administrator)
● Admin1 (Global Reader) (should be assigned this role to fulfill the requirement that all admins can create labels).

QUESTION 3

HOTSPOT
You need to meet the technical requirements for the confidential documents.
What should you create first, and what should you use for the detection method? To answer, select
the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer:
Explanation:
To detect and protect confidential documents, we need a custom rule to identify project codes that
start with 999 (since they are classified as confidential).
Box 1: A Sensitive Info Type (SIT) allows Microsoft Purview DLP policies to recognize structured data
(e.g., project codes). DLP policies require a sensitive info type to detect content based on patterns,
keywords, or dictionary terms. A sensitivity label alone does not define detection logic”it is used for
classification and protection after content is identified.
Box 2: Since project codes follow a structured 10-digit pattern, we should use a Regular Expression
(Regex) to match project codes that start with 999.
Example Regex pattern:
999\d{7}
This pattern detects a 10-digit number starting with "999".

QUESTION 4

HOTSPOT
How many files in Site2 can User1 and User2 access after you turn on DLPpolicy1? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer:
Explanation:
Understanding DLP Policy Impact on File Access
The DLP policy (DLPpolicy1) applies to Site2 and restricts access when:
● Content contains SWIFT Codes.
● Instance count is 2 or more.
File Analysis (Based on SWIFT Codes Count)
Files that remain accessible (not restricted by DLP):
● File1.docx (Contains only 1 SWIFT Code → Below restriction threshold)
User access after DLP policy is applied:
User1 (Site Owner):
● Has higher privileges and can override DLP restrictions (through admin intervention).
● Can access 2 files (File1.docx + override access to another file).
User2 (Site Visitor):
● Has read-only access but DLP blocks access to restricted files.
● Can only access 1 file (File1.docx), since all others are restricted.

QUESTION 5
HOTSPOT
You are reviewing policies for the SharePoint Online environment.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Answer:
Explanation:
Understanding Site4's Retention Policies:
● Site4RetentionPolicy1 deletes items older than 2 years from creation. If a file was created on January 1, 2021, it would be deleted after January 1,
2023.
● Site4RetentionPolicy2 retains files for 4 years from creation. If a file was created on January 1,
2021, it will be kept until January 1, 2025, but not deleted after that (policy states "Do nothing").
Statement 1 - Yes, because Site4RetentionPolicy2 ensures files are retained for 4 years.
Statement 2 - Yes, because Site4RetentionPolicy2 retains the file for 4 years (until January 1, 2025).
Statement 3 - No, because retention is only for 4 years (until January 1, 2025). After that, the policy does "nothing," meaning the file is no longer
recoverable after that period.

SC-401 Brain Dumps Exam + Online / Offline and Android Testing Engine & 4500+ other exams included
$50 - $25 (you save $25)
Buy Complete

Students Feedback / Reviews/ Discussion

Weidner Steve 5 weeks, 1 day ago - Egypt
Thanks for helping me with this dump to pass my exam :) Passed with a score of 862
upvoted 4 times

Rojas Jesus 1 month ago - Peru
Passed the exam today
Just only 1 of all question have not seem.
Thanks Team
upvoted 3 times

David Loomis 1 month, 1 week ago - United States - Georgia
this is a good dump then
upvoted 3 times

Omkar Harsoo 1 month, 2 weeks ago - South Africa
Passed a few days ago with 770 - about 70-80% from here.
Solid experience with in tune
upvoted 2 times

Takeshi Kobayashi 2 months ago - Japan
Just passed with 886, i have some experience with in tune but these dumps should be enough to pass
upvoted 11 times



logged members Can Post comments / review and take part in Discussion


Certkingdom Offline Testing Engine Simulator Download

    SC-401 Offline Desktop Testing Engine Download



    Prepare with yourself how CertKingdom Offline Exam Simulator it is designed specifically for any exam preparation. It allows you to create, edit, and take practice tests in an environment very similar to an actual exam.


    Supported Platforms: Windows-7 64bit or later - EULA | How to Install?



    FAQ's: Windows-8 / Windows 10 if you face any issue kinldy uninstall and reinstall the Simulator again.



    Download Offline Simulator



Certkingdom Testing Engine Features

  • Certkingdom Testing Engine simulates the real exam environment.
  • Interactive Testing Engine Included
  • Live Web App Testing Engine
  • Offline Downloadable Desktop App Testing Engine
  • Testing Engine App for Android
  • Testing Engine App for iPhone
  • Testing Engine App for iPad
  • Working with the Certkingdom Testing Engine is just like taking the real tests, except we also give you the correct answers.
  • More importantly, we also give you detailed explanations to ensure you fully understand how and why the answers are correct.

Certkingdom Android Testing Engine Simulator Download

    SC-401 Offline Android Testing Engine Download


    Take your learning mobile android device with all the features as desktop offline testing engine. All android devices are supported.
    Supported Platforms: All Android OS EULA


    Install the Android Testing Engine from google play store and download the app.ck from certkingdom website android testing engine download
    Google PlayStore



Certkingdom Android Testing Engine Features

  • CertKingdom Offline Android Testing Engine
  • Make sure to enable Root check in Playstore
  • Live Realistic practice tests
  • Live Virtual test environment
  • Live Practice test environment
  • Mark unanswered Q&A
  • Free Updates
  • Save your tests results
  • Re-examine the unanswered Q & A
  • Make your own test scenario (settings)
  • Just like the real tests: multiple choice questions
  • Updated regularly, always current