|
| 1 | +### YamlMime:ModuleUnit |
| 2 | +uid: learn.wwl.purview-protect-sensitive-data.knowledge-check |
| 3 | +title: Knowledge check |
| 4 | +metadata: |
| 5 | + title: Knowledge check |
| 6 | + description: "Knowledge check" |
| 7 | + ms.date: 03/10/2025 |
| 8 | + author: wwlpublish |
| 9 | + ms.author: riswinto |
| 10 | + ms.topic: unit |
| 11 | +azureSandbox: false |
| 12 | +labModal: false |
| 13 | +durationInMinutes: 5 |
| 14 | +quiz: |
| 15 | + title: "Check your knowledge" |
| 16 | + questions: |
| 17 | + - content: "Your organization is expanding its data protection strategy. You need a way to classify and protect sensitive files across Microsoft 365 services. Which feature should you implement?" |
| 18 | + choices: |
| 19 | + - content: "Microsoft Purview Sensitivity Labels" |
| 20 | + isCorrect: true |
| 21 | + explanation: "Correct: Sensitivity labels help classify and protect data by applying encryption, access restrictions, and content markings." |
| 22 | + - content: "Microsoft Purview Data Loss Prevention (DLP)" |
| 23 | + isCorrect: false |
| 24 | + explanation: "Incorrect: DLP helps prevent unauthorized data sharing but does not classify and label data." |
| 25 | + - content: "Microsoft Defender for Cloud" |
| 26 | + isCorrect: false |
| 27 | + explanation: "Incorrect: Microsoft Defender for Cloud focuses on cloud security posture management, not data classification." |
| 28 | + |
| 29 | + - content: "Your organization is adopting AI-driven tools to improve efficiency. However, leadership is concerned about the risk of sensitive data being used in AI model training. Which Microsoft Purview feature can help prevent unauthorized data use?" |
| 30 | + choices: |
| 31 | + - content: "Data Loss Prevention (DLP) policies" |
| 32 | + isCorrect: true |
| 33 | + explanation: "Correct: DLP policies can prevent sensitive data from being shared with unauthorized AI tools." |
| 34 | + - content: "Insider Risk Management" |
| 35 | + isCorrect: false |
| 36 | + explanation: "Incorrect: Insider Risk Management identifies risky user behavior but doesn't directly prevent AI data use." |
| 37 | + - content: "Microsoft Defender XDR" |
| 38 | + isCorrect: false |
| 39 | + explanation: "Incorrect: Microsoft Defender XDR focuses on threat detection rather than data protection for AI models." |
| 40 | + |
| 41 | + - content: "Your company is expanding remote work options, and employees are accessing sensitive files from unmanaged devices. Which approach aligns with Zero Trust principles to secure access?" |
| 42 | + choices: |
| 43 | + - content: "Require multifactor authentication (MFA) and conditional access policies." |
| 44 | + isCorrect: true |
| 45 | + explanation: "Correct: Zero Trust requires continuous verification through MFA and conditional access." |
| 46 | + - content: "Allow access from any device but require VPN usage." |
| 47 | + isCorrect: false |
| 48 | + explanation: "Incorrect: VPN alone does not enforce identity verification and risk-based access." |
| 49 | + - content: "Block all remote access to sensitive files." |
| 50 | + isCorrect: false |
| 51 | + explanation: "Incorrect: Blocking all access is not practical and hinders productivity." |
| 52 | + |
| 53 | + - content: "Your security team wants to analyze how sensitive data is being accessed and shared within your organization. Which tool provides insights into user activity and data movement?" |
| 54 | + choices: |
| 55 | + - content: "Activity Explorer" |
| 56 | + isCorrect: true |
| 57 | + explanation: "Correct: Activity Explorer helps track user activity, data access, and movement within Microsoft 365." |
| 58 | + - content: "Content Explorer" |
| 59 | + isCorrect: false |
| 60 | + explanation: "Incorrect: Content Explorer helps view classified data but does not track user activity." |
| 61 | + - content: "Microsoft Purview Audit" |
| 62 | + isCorrect: false |
| 63 | + explanation: "Incorrect: Microsoft Purview Audit provides forensic activity logs but does not focus on real-time data movement." |
| 64 | + |
| 65 | + - content: "Your organization recently experienced a data breach due to an insider threat. Leadership wants a solution to identify risky user behavior before a breach occurs. Which Microsoft Purview feature should be implemented?" |
| 66 | + choices: |
| 67 | + - content: "Insider Risk Management" |
| 68 | + isCorrect: true |
| 69 | + explanation: "Correct: Insider Risk Management detects and analyzes risky user behavior before a data breach happens." |
| 70 | + - content: "Microsoft Defender XDR" |
| 71 | + isCorrect: false |
| 72 | + explanation: "Incorrect: Microsoft Defender XDR focuses on external threat detection rather than insider risks." |
| 73 | + - content: "Sensitivity Labels" |
| 74 | + isCorrect: false |
| 75 | + explanation: "Incorrect: Sensitivity Labels help classify and protect data but do not identify risky user behavior." |
| 76 | + |
| 77 | + - content: "A security analyst needs to investigate an incident where an employee accessed a large volume of sensitive files. Which Microsoft Purview tool can provide detailed activity logs for the investigation?" |
| 78 | + choices: |
| 79 | + - content: "Microsoft Purview Audit" |
| 80 | + isCorrect: true |
| 81 | + explanation: "Correct: Microsoft Purview Audit provides detailed activity logs for security investigations." |
| 82 | + - content: "Content Explorer" |
| 83 | + isCorrect: false |
| 84 | + explanation: "Incorrect: Content Explorer shows classified data but does not provide user activity logs." |
| 85 | + - content: "Insider Risk Management" |
| 86 | + isCorrect: false |
| 87 | + explanation: "Incorrect: Insider Risk Management helps detect risk but does not provide detailed forensic logs." |
| 88 | + |
| 89 | + |
| 90 | + - content: "Your company is concerned about unauthorized sharing of classified financial documents. How can Microsoft Purview help prevent data leaks?" |
| 91 | + choices: |
| 92 | + - content: "Implement DLP policies to block unauthorized sharing." |
| 93 | + isCorrect: true |
| 94 | + explanation: "Correct: DLP policies can prevent financial documents from being shared outside the organization." |
| 95 | + - content: "Use Content Explorer to track classified financial documents." |
| 96 | + isCorrect: false |
| 97 | + explanation: "Incorrect: Content Explorer provides insights but does not prevent data leaks." |
| 98 | + - content: "Configure Microsoft Defender XDR to detect financial threats." |
| 99 | + isCorrect: false |
| 100 | + explanation: "Incorrect: Defender XDR detects threats but does not enforce sharing restrictions." |
0 commit comments