You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/describe-purview-data-solutions/7-knowledge-check.yml
+28-4Lines changed: 28 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: Module assessment
4
4
metadata:
5
5
title: Module assessment
6
6
description: "Knowledge check for Describe the Data Security solutions of Microsoft Purview."
7
-
ms.date: 8/22/2024
7
+
ms.date: 04/01/2026
8
8
author: wwlpublish
9
9
ms.author: ceperezb
10
10
ms.topic: unit
@@ -43,10 +43,34 @@ quiz:
43
43
choices:
44
44
- content: "To identify and protect against risks like an employee sharing confidential information."
45
45
isCorrect: true
46
-
explanation: "Correct. Use risk management to help protect your organization against these risks."
46
+
explanation: "Correct. Insider risk management helps organizations detect, investigate, and act on risky activities such as an employee sharing confidential data, data theft by departing users, or unintentional data leaks."
47
47
- content: "To identify and protect against malicious software across your network, such as ransomware."
48
48
isCorrect: false
49
-
explanation: "Incorrect. You use insider risk management to protect against risks like an employee sharing confidential information."
49
+
explanation: "Incorrect. Defending against malicious software like ransomware is the role of endpoint security tools such as Microsoft Defender for Endpoint. Insider risk management focuses on identifying and responding to risks from within the organization, such as an employee sharing confidential information."
50
50
- content: "To identify and protect against devices shutting down at critical moments."
51
51
isCorrect: false
52
-
explanation: "Incorrect. You use insider risk management to protect against risks like an employee sharing confidential information."
52
+
explanation: "Incorrect. Device availability and reliability are infrastructure concerns handled outside of insider risk management. Insider risk management focuses on detecting and responding to risky or malicious activities by people within the organization."
53
+
54
+
- content: "An organization has a DLP policy that detects sensitive financial information. A user attempts to share a sensitive spreadsheet via Microsoft Teams. What action can the DLP policy take?"
55
+
choices:
56
+
- content: "Automatically delete the file from the user's OneDrive."
57
+
isCorrect: false
58
+
explanation: "Incorrect. DLP doesn't automatically delete files. Instead, DLP can block the sharing, show the user a policy tip explaining why the action was prevented, and optionally allow the user to override the block with a justification."
59
+
- content: "Show the user a policy tip and block the sharing."
60
+
isCorrect: true
61
+
explanation: "Correct. DLP policies can display a policy tip that warns the user their action may violate policy, and can block the sharing of the sensitive item in Teams."
62
+
- content: "Move the file to a quarantine location and notify the user's manager."
63
+
isCorrect: false
64
+
explanation: "Incorrect. Moving content to a quarantine location is a protective action that applies to data at rest, not to active sharing in Teams chat. For Teams chat, DLP can block the sharing and show a policy tip to the user."
65
+
66
+
- content: "An organization wants its DLP controls to automatically tighten for users identified as high-risk by Insider Risk Management, without requiring admins to manually update policies. Which capability should the organization configure?"
67
+
choices:
68
+
- content: "Sensitivity label policies."
69
+
isCorrect: false
70
+
explanation: "Incorrect. Sensitivity label policies control which users can see and apply sensitivity labels. They don't automatically adjust DLP controls based on insider risk levels. Adaptive protection is the feature that dynamically connects insider risk levels to DLP policies."
71
+
- content: "Adaptive protection."
72
+
isCorrect: true
73
+
explanation: "Correct. Adaptive protection dynamically assigns DLP policies, data lifecycle management policies, and Conditional Access policies to users based on their current insider risk level—automatically tightening controls for high-risk users and relaxing them when risk decreases."
74
+
- content: "Trainable classifiers."
75
+
isCorrect: false
76
+
explanation: "Incorrect. Trainable classifiers are used to identify types of content for classification. They don't adjust DLP controls based on insider risk. Adaptive protection is the feature that connects insider risk levels to DLP and other protective controls."
Microsoft Purview is a comprehensive set of integrated data security, data governance, and data compliance solutions. These solutions can help organizations secure and govern their entire data estate, while helping them meet their compliance requirements. This module focuses on Microsoft Purview data security solutions.
1
+
Microsoft Purview is a comprehensive set of integrated data security, data governance, and data compliance solutions that help organizations secure and govern their entire data estate while meeting compliance requirements. This module focuses on Microsoft Purview data security solutions.
2
2
3
-
In today's digital landscape, data security is paramount for organizations to protect sensitive information and maintain trust with their customers. Microsoft Purview offers a comprehensive approach to data security by integrating information protection, data loss prevention, and insider risk management to enable an organization to secure data across its lifecycle, wherever it lives.
3
+
Microsoft Purview helps organizations protect sensitive data through information protection, data loss prevention, and insider risk management—working together to secure data across its lifecycle, wherever it lives. Adaptive protection brings these solutions together by automatically applying the right level of controls based on each user's current risk level.
4
4
5
5
After completing this module, you're able to:
6
6
7
-
- Describe how Microsoft Purview Information Protection helps organizations discover, classify, and protect sensitive information.
8
-
- Describe how Microsoft Purview Data Loss Prevention helps organizations prevent their users from inappropriately sharing sensitive data with people who shouldn't have it.
7
+
- Describe the data classification capabilities of Microsoft Purview Information Protection, including sensitive information types, trainable classifiers, and the benefits of Content explorer and Activity explorer.
8
+
- Describe sensitivity labels and sensitivity label policies in Microsoft Purview.
9
+
- Describe how Microsoft Purview Data Loss Prevention helps organizations prevent the inappropriate sharing of sensitive data.
9
10
- Describe how Microsoft Purview Insider Risk Management helps minimize internal risks.
11
+
- Describe how adaptive protection in Microsoft Purview dynamically applies data protection controls based on insider risk levels.
0 commit comments