Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Microsoft > Microsoft Certified: Security Compliance and Identity Fundamentals > SC-900

SC-900 Microsoft Security Compliance and Identity Fundamentals Question and Answers

Question # 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 5

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 6

Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?

A.

integration with the Microsoft 365 compliance center

B.

support for threat hunting

C.

integration with Microsoft 365 Defender

D.

support for Azure Monitor Workbooks

Full Access
Question # 7

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Full Access
Question # 8

Select the answer that correctly completes the sentence.

Full Access
Question # 9

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

A.

retention policies

B.

data loss prevention (DLP) policies

C.

conditional access policies

D.

information barriers

Full Access
Question # 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

Select the answer that correctly completes the sentence.

Full Access
Question # 12

You have an Azure subscription.

You need to implement approval-based, tiProme-bound role activation.

What should you use?

A.

Windows Hello for Business

B.

Azure Active Directory (Azure AD) Identity Protection

C.

access reviews in Azure Active Directory (Azure AD)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Full Access
Question # 13

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

A.

sensitivity label policies

B.

Customer Lockbox

C.

information Barriers

D.

Privileged Access Management (PAM)

Full Access
Question # 14

Select the answer that correctly completes the sentence.

Full Access
Question # 15

Select the answer that correctly completes the sentence.

Full Access
Question # 16

What Microsoft Purview feature can use machine learning algorithms to detect and automatically protect sensitive items?

A.

eDiscovery

B.

Data loss prevention

C.

Information risks

D.

Communication compliance

Full Access
Question # 17

Select the answer that correctly completes the sentence.

Full Access
Question # 18

Select the answer that correctly completes the sentence.

Full Access
Question # 19

What can be created in Active Directory Domain Services (AD DS)?

A.

line-of-business (106) applications that require modem authentication

B.

mob devices

C.

computer accounts

D.

software as a service (SaaS) applications that require modem authentication

Full Access
Question # 20

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

A.

network security groups (NSGs)

B.

Azure AD Privileged Identity Management (PIM)

C.

conditional access policies

D.

resource locks

Full Access
Question # 21

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Full Access
Question # 22

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

A.

Microsoft Defender for Cloud

B.

Azure Blueprints

C.

Microsoft Sentinel

D.

Azure Policy

Full Access
Question # 23

Select the answer that correctly completes the sentence.

Full Access
Question # 24

Which two cards are available in the Microsoft 365 Defender portal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Users at risk

B.

Compliance Score

C.

Devices at risk

D.

Service Health

E.

User Management

Full Access
Question # 25

Which portal contains the solution catalog?

A.

Microsoft 365 Apps admin center

B.

Microsoft 365 Defender portal

C.

Microsoft 365 admin center

D.

Microsoft Purview compliance portal

Full Access
Question # 26

Select the answer that correctly completes the sentence.

Full Access
Question # 27

You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.

in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.

Full Access
Question # 28

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 29

Select the answer that correctly completes the sentence.

Full Access
Question # 30

Which pillar of identity relates to tracking the resources accessed by a user?

A.

auditing

B.

authorization

C.

authentication

D.

administration

Full Access
Question # 31

Select the answer that correctly completes the sentence.

Full Access
Question # 32

What is an example of encryption at rest?

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Full Access
Question # 33

What should you create to search and export content preserved in an eDiscovery hold?

A.

a Microsoft SharePoint Online site

B.

a case

C.

a Microsoft Exchange Online public folder

D.

Azure Files

Full Access
Question # 34

What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

to discover and control the use of shadow IT

B.

to provide secure connections to Azure virtual machines

C.

to protect sensitive information hosted anywhere in the cloud

D.

to provide pass-through authentication to on-premises applications

E.

to prevent data leaks to noncompliant apps and limit access to regulated data

Full Access
Question # 35

You have an Azure subscription.

You need to implement approval-based time-bound role activation.

What should you use?

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Conditional access

C.

Microsoft Entra Privileged Management

D.

Microsoft Entra Access Reviews

Full Access
Question # 36

Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?

A.

access reviews

B.

managed identities

C.

conditional access policies

D.

Azure AD Identity Protection

Full Access
Question # 37

To which type of resource can Azure Bastion provide secure access?

A.

Azure Files

B.

Azure SQL Managed Instances

C.

Azure virtual machines

D.

Azure App Service

Full Access
Question # 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 39

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Plan

B.

Manage

C.

Adopt

D.

Govern

E.

Define Strategy

Full Access
Question # 40

Select the answer that correctly completes the sentence.

Full Access
Question # 41

Select the answer that correctly completes the sentence.

Full Access
Question # 42

Select the answer that correctly completes the sentence.

Full Access
Question # 43

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

A.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

B.

Azure Multi-Factor Authentication (MFA)

C.

Azure Active Directory (Azure AD) Identity Protection

D.

conditional access policies

Full Access
Question # 44

When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

All users must authenticate from a registered device.

B.

Administrators must always use Azure Multi-Factor Authentication (MFA).

C.

Azure Multi-Factor Authentication (MFA) registration is required for all users.

D.

All users must authenticate by using passwordless sign-in.

E.

All users must authenticate by using Windows Hello.

Full Access
Question # 45

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Full Access
Question # 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 47

Which three authentication methods can Microsoft Entra users use to reset their password? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

text message to a phone

B.

certificate

C.

mobile app notification

D.

security questions

E.

picture password

Full Access
Question # 48

Select the answer that correctly completes the sentence.

Full Access
Question # 49

Select the answer that correctly completes the sentence.

Full Access
Question # 50

What is a use case for implementing information barrier policies in Microsoft 365?

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

Full Access
Question # 51

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Full Access
Question # 52

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 53

Select the answer that correctly completes the sentence.

Full Access
Question # 54

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 55

Select the answer that correctly completes the sentence.

Full Access
Question # 56

Select the answer that correctly completes the sentence.

Full Access
Question # 57

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.

Full Access