Information Protection Basics Flashcards

1
Q

Confidence level link to false positive

A

The lower, the more false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three ways to create a custom SIT

A

1) Regex, function, keyword list or dictionary
2) Document fingerprinting
3) Exact data match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Document fingerprinting limitation (5)

A

Max 50 fingerprints per tenants, password protected files, file that contain only images, files greater than 4MB, dotx files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Number of documents to train a classifier

A

Between 50 and 500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Number of documents to test a classifier

A

200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Location where documents for training/testing a trainable classifier need to be

A

SharePoint Online folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Permission restriction for trainable classifier

A

Only the user who created the classifier can train and review predictions made by that classifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Timeline for trainable classifier

A

1) Initiate the training classifier that will start by scanning all the content (7-14 days)
2) Train documents (up to 24h)
3) Testing (up to 10 days)
4) Publish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Format limitation of trainable classifier

A

Encrypted files and name file extensions not supported by SP Online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Downstream inheritance of sensitivity labels

A

When data is used to generate reports, these reports are also protected by the same sensitivity label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Capabilities of sensitivity labels (2)

A

1) Encryption
2) Mark documents (header, footer, watermark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pre-requisite to start creating sensitivity label policies

A

Have auditing turned on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where are sensitivity labels published to?

A

Users and Groups (incl. distribution and mail-enabled Security Groups)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where are retention labels published to?

A

Locations (OneDrive, SharePoint, Exchange,…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which portal can you use to enable sensitivity labels for SharePoint and OneDrive?

A

1) Purview
2) PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Purview Information Protection Scanner used for?

A

To apply labels on-premise (SP librairies/folders and UNC paths)

17
Q

Where is Purview Information Protection Scanner installed and configured?

A

Installed on Windows Server but configured in the Azure portal

18
Q

Pre-requisite to start applying sensitivity label in SP/Teams

A

Perform some commands in PowerShell

19
Q

If you apply a sensitivity label to an email with attachement, does the attachment inherit the sensitivity label?

A

Only if the attachement has a label without encryption but the email has a label that requires encryptions. If the attachement has no label, no label will be applied.

20
Q

What is the difference between the Content Explorer and the Activity Explorer?

A

The Content Explorer shows the content for each label across locations, while the Activity Explorer shows all activities that were performed e.g., which labels applied and by whom

21
Q

How many days does the Activity Explorer shows history for?

22
Q

Can you directly turn on an auto-labelling policy?

A

No, you need to run it in simulation mode first

23
Q

What are the three types of email encryption that Microsoft offers?

A

(1) Microsoft Purview Message Encryption (old name = OME) (2) Information Right Management (3) S/MIME

24
Q

What are the limitation of Microsoft Purview Message encryption? (2)

A

.doc, .xls, .ppt and files larger than 25MB.

25
What are the technology supporting Microsoft Purview Message Encryption?
Azure RMS (Right Management) and IRM (Information Right Management)
26
Which email encryption mechanism support external email domain (e.g., gmail)?
Only Purview Encryption and S/MIME
27
Which email encryption mechanism offers more functionalities than just encryption?
IRM and Purview Message Encryption - it is also possible to defined usage restrictions e.g., not possible to print or forward an email
28
Which email encryption mechanism requires the use of keys?
S/MIME - you must have the public key of the recipient
29
What are the limitation of IRM email encryption?
Only internal recipients are allowed.
30
What are the limitations of S/MIME (2)?
It requires managing the key (more complex usage) and it does not allow encrypted messages to be scanned for malware/spam
31
How does BitLocker encryption works (key management)?
Data is encrypted with Full Volume Encryption Key, which is itself encrypted with a Volume Master Key, which is itself protected by a Trusted Platform module.
32
What are the additional functionalities of Advanced Purview Message Encryption? (4)
(1) Message expiration (2) Multiple branding templates (3) Message revocation (4) Encrypted message portal activity logs
33
Where is the expiration time for protected messages being defined?
In the custom branded template
34
Where is the custom branding being created?
In PowerShell or in DLP
35
What is the PowerShell command to create a new branding template?
New-OMEConfiguration