Knowledge check

Completed

Choose the best response for each of the following questions, and then select Check your answers.

Check your knowledge

1.

What's one thing that you can't do with sensitivity labels?

2.

After you create sensitivity labels, what must you do before your users can use the labels?

3.

What can you use to discover files on your local file servers that contain sensitive information?

4.

What can you use to discover applications in your network that work with cloud services and aren't under the control of your IT department?

5.

What's usually the main reason for using Microsoft Purview Customer Key for data encryption?