Information Protection Basics Flashcards

1
Q

Confidence level link to false positive

A

The lower, the more false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three ways to create a custom SIT

A

1) Regex, function, keyword list or dictionary
2) Document fingerprinting
3) Exact data match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Document fingerprinting limitation (5)

A

Max 50 fingerprints per tenants, password protected files, file that contain only images, files greater than 4MB, dotx files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Number of documents to train a classifier

A

Between 50 and 500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Number of documents to test a classifier

A

200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Location where documents for training/testing a trainable classifier need to be

A

SharePoint Online folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Permission restriction for trainable classifier

A

Only the user who created the classifier can train and review predictions made by that classifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Timeline for trainable classifier

A

1) Initiate the training classifier that will start by scanning all the content (7-14 days)
2) Train documents (up to 24h)
3) Testing (up to 10 days)
4) Publish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Format limitation of trainable classifier

A

Encrypted files and name file extensions not supported by SP Online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Downstream inheritance of sensitivity labels

A

When data is used to generate reports, these reports are also protected by the same sensitivity label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Capabilities of sensitivity labels (2)

A

1) Encryption
2) Mark documents (header, footer, watermark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pre-requisite to start creating sensitivity label policies

A

Have auditing turned on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where are sensitivity labels published to?

A

Users and Groups (incl. distribution and mail-enabled Security Groups)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where are retention labels published to?

A

Locations (OneDrive, SharePoint, Exchange,…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which portal can you use to enable sensitivity labels for SharePoint and OneDrive?

A

1) Purview
2) PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Purview Information Protection Scanner used for?

A

To apply labels on-premise (SP librairies/folders and UNC paths)

17
Q

Where is Purview Information Protection Scanner installed and configured?

A

Installed on Windows Server but configured in the Azure portal

18
Q

Pre-requisite to start applying sensitivity label in SP/Teams

A

Perform some commands in PowerShell

19
Q

If you apply a sensitivity label to an email with attachement, does the attachment inherit the sensitivity label?

A

Only if the attachement has a label without encryption but the email has a label that requires encryptions. If the attachement has no label, no label will be applied.

20
Q

What is the difference between the Content Explorer and the Activity Explorer?

A

The Content Explorer shows the content for each label across locations, while the Activity Explorer shows all activities that were performed e.g., which labels applied and by whom

21
Q

How many days does the Activity Explorer shows history for?

A

30 days

22
Q

Can you directly turn on an auto-labelling policy?

A

No, you need to run it in simulation mode first

23
Q

What are the three types of email encryption that Microsoft offers?

A

(1) Microsoft Purview Message Encryption (old name = OME) (2) Information Right Management (3) S/MIME

24
Q

What are the limitation of Microsoft Purview Message encryption? (2)

A

.doc, .xls, .ppt and files larger than 25MB.

25
Q

What are the technology supporting Microsoft Purview Message Encryption?

A

Azure RMS (Right Management) and IRM (Information Right Management)

26
Q

Which email encryption mechanism support external email domain (e.g., gmail)?

A

Only Purview Encryption and S/MIME

27
Q

Which email encryption mechanism offers more functionalities than just encryption?

A

IRM and Purview Message Encryption - it is also possible to defined usage restrictions e.g., not possible to print or forward an email

28
Q

Which email encryption mechanism requires the use of keys?

A

S/MIME - you must have the public key of the recipient

29
Q

What are the limitation of IRM email encryption?

A

Only internal recipients are allowed.

30
Q

What are the limitations of S/MIME (2)?

A

It requires managing the key (more complex usage) and it does not allow encrypted messages to be scanned for malware/spam

31
Q

How does BitLocker encryption works (key management)?

A

Data is encrypted with Full Volume Encryption Key, which is itself encrypted with a Volume Master Key, which is itself protected by a Trusted Platform module.

32
Q

What are the additional functionalities of Advanced Purview Message Encryption? (4)

A

(1) Message expiration (2) Multiple branding templates (3) Message revocation (4) Encrypted message portal activity logs

33
Q

Where is the expiration time for protected messages being defined?

A

In the custom branded template

34
Q

Where is the custom branding being created?

A

In PowerShell or in DLP

35
Q

What is the PowerShell command to create a new branding template?

A

New-OMEConfiguration