Skip to content

Commit 43897b2

Browse files
authored
Update knowledge-check.yml
1 parent e951d87 commit 43897b2

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

learn-pr/wwl-sci/purview-review-analyze-data-classification/knowledge-check.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,17 +50,17 @@ quiz:
5050
isCorrect: false
5151
explanation: "Incorrect: Microsoft Purview Audit provides detailed event logs but isn't designed for monitoring classification trends."
5252

53-
- content: "A security administrator wants to analyze how users are applying sensitivity labels and whether labeled data is being downgraded or removed. They need to drill down into specific files and locations. Which Microsoft Purview tool should they use?"
53+
- content: "A security administrator wants to review the current sensitivity label assignments on files and emails across the organization. They need to examine specific files and locations to see which items have labels applied or are unlabeled. Which Microsoft Purview tool should they use?"
5454
choices:
5555
- content: "Activity Explorer"
5656
isCorrect: false
5757
explanation: "Incorrect: Activity Explorer tracks user actions but doesn't provide a detailed view of labeled files."
5858
- content: "Data Explorer"
5959
isCorrect: true
6060
explanation: "Correct: Data Explorer allows security teams to investigate labeled content, track label changes, and analyze classification patterns."
61-
- content: "Microsoft Purview Insider Risk Management"
61+
- content: "Microsoft Purview Audit"
6262
isCorrect: false
63-
explanation: "Incorrect: Insider Risk Management identifies risky user behavior but doesn't focus on tracking label usage."
63+
explanation: "Incorrect: Audit records when sensitivity labels are applied or changed but doesn't provide a view of the current label assignments across files and locations."
6464

6565
- content: "Your organization's security team wants to proactively detect unusual data activity, such as large-scale downloads of sensitive files. They want an AI-powered tool that can analyze patterns and surface potential risks. Which feature should they use?"
6666
choices:

0 commit comments

Comments
 (0)