You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/purview-review-analyze-data-classification/knowledge-check.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -50,17 +50,17 @@ quiz:
50
50
isCorrect: false
51
51
explanation: "Incorrect: Microsoft Purview Audit provides detailed event logs but isn't designed for monitoring classification trends."
52
52
53
-
- content: "A security administrator wants to analyze how users are applying sensitivity labels and whether labeled data is being downgraded or removed. They need to drill down into specific files and locations. Which Microsoft Purview tool should they use?"
53
+
- content: "A security administrator wants to review the current sensitivity label assignments on files and emails across the organization. They need to examine specific files and locations to see which items have labels applied or are unlabeled. Which Microsoft Purview tool should they use?"
54
54
choices:
55
55
- content: "Activity Explorer"
56
56
isCorrect: false
57
57
explanation: "Incorrect: Activity Explorer tracks user actions but doesn't provide a detailed view of labeled files."
58
58
- content: "Data Explorer"
59
59
isCorrect: true
60
60
explanation: "Correct: Data Explorer allows security teams to investigate labeled content, track label changes, and analyze classification patterns."
explanation: "Incorrect: Insider Risk Management identifies risky user behavior but doesn't focus on tracking label usage."
63
+
explanation: "Incorrect: Audit records when sensitivity labels are applied or changed but doesn't provide a view of the current label assignments across files and locations."
64
64
65
65
- content: "Your organization's security team wants to proactively detect unusual data activity, such as large-scale downloads of sensitive files. They want an AI-powered tool that can analyze patterns and surface potential risks. Which feature should they use?"
0 commit comments