This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
A company wants to prevent employees from submitting sensitive information into generative AI tools. What should they do?
Apply the Data theft by departing users policy.
Create a security policy violation template.
Use the Risky AI usage policy template.
A small business needs to quickly implement a policy to detect employees sharing sensitive files externally. They have limited resources and need a straightforward solution. What should they do?
Create a custom policy to define detailed conditions and thresholds.
Use a quick policy template for data leaks.
Deploy a risky browser usage policy to monitor internet activity.
A company wants to create a policy that prioritizes sensitive data labeled as 'Confidential' and assigns higher risk scores when files with this label are accessed. What step should they take during the policy creation process?
Enable content prioritization when defining policy scope.
Add all employees to the policy scope without exclusions.
Use predefined thresholds for risk scoring.
A security team wants to test a new policy before applying it broadly. What is the best approach?
Deploy the policy to a small group first.
Apply the policy organization-wide immediately.
Use only predefined thresholds.
An organization implements policies but finds that alerts are too frequent, even for low-risk activities. What is the best course of action?
Delete the policy and create a new one.
Ignore the alerts and assume they're false positives.
Adjust thresholds and indicators in the policy settings.
You must answer all questions before checking your work.
Was this page helpful?