New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Exam Practice Test

Demo: 62 questions
Total 208 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Question 1

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 2

For each of the following statements, select Yes if the statement is true Otherwise, select No.

NOTE Each correct selection is worth one point.

Options:

Question 3

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Question 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 5

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

Options:

A.

the Microsoft Endpoint Manager admin center

B.

Azure Cost Management + Billing

C.

Microsoft Service Trust Portal

D.

the Azure Active Directory admin center

Question 6

Select the answer that correctly completes the sentence.

Options:

Question 7

Select the answer that correctly completes the sentence.

Options:

Question 8

For each of the following statement, select Yes if the statement is true Otherwise, select No.

NOTE: Each connect selection a worth one point.

Options:

Question 9

What is a use case for implementing information barrier policies in Microsoft 365?

Options:

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

Question 10

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.

Options:

Question 11

Select the answer that correctly completes the sentence.

Options:

Question 12

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 13

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?

Options:

A.

Audit

B.

Compliance Manager

C.

Content Search

D.

Alerts

Question 14

Select the answer that correctly completes the sentence.

Options:

Question 15

Select the answer that correctly completes the sentence.

Options:

Question 16

Match the types of Conditional Access signals to the appropriate definitions.

To answer, drag the appropriate Conditional Access signal type from the column on the left to its definition on the right. Each signal type may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Question 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 18

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 19

You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.

in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.

Options:

Question 20

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 21

Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?

Options:

A.

Microsoft Secure Score

B.

Productivity Score

C.

Secure score in Azure Security Center

D.

Compliance score

Question 22

You need to keep a copy of all files in a Microsoft SharePoint site for one year, even if users delete the files from the site. What should you apply to the site?

Options:

A.

a data loss prevention (DLP) policy

B.

a retention policy

C.

an insider risk policy

D.

a sensitivity label policy

Question 23

Select the answer that correctly completes the sentence.

Options:

Question 24

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 25

Match the types of compliance score actions to the appropriate tasks.

To answer. drag the appropriate action type from the column on the left to its task on the right. Each type may be used once. more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Question 26

Select the answer that correctly completes the sentence.

Options:

Question 27

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 28

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 29

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 30

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Question 31

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 32

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Question 33

Select the answer that correctly completes the sentence.

Options:

Question 34

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

Options:

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

Question 35

What can you use to deploy Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Microsoft Sentinel

B.

Microsoft Defender for Cloud

C.

Azure Policy

D.

Azure Blueprints

Question 36

Which solution performs security assessments and automatically generates alerts when a vulnerability is found?

Options:

A.

cloud security posture management (CSPM)

B.

DevSecOps

C.

cloud workload protection platform (CWPP)

D.

security information and event management (SIEM)

Question 37

Select the answer that correctly completes the sentence.

Options:

Question 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 39

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Define the perimeter by physical locations.

B.

Use identity as the primary security boundary.

C.

Always verity the permissions of a user explicitly.

D.

Always assume that the user system can be breached.

E.

Use the network as the primary security boundary.

Question 40

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 41

Select the answer that correctly completes the sentence.

Options:

Question 42

What can you use to protect against malicious links sent in email messages, chat messages, and channels?

Options:

A.

Microsoft Defender for Identity

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Cloud Apps

D.

Microsoft Defender for Office 365

Question 43

Select The answer that correctly completes the sentence.

Options:

Question 44

Select the answer that correctly completes the sentence.

Options:

Question 45

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Question 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 47

What can you specify in Microsoft 365 sensitivity labels?

Options:

A.

how long files must be preserved

B.

when to archive an email message

C.

which watermark to add to files

D.

where to store files

Question 48

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Plan

B.

Manage

C.

Adopt

D.

Govern

E.

Define Strategy

Question 49

Select the answer that correctly completes the sentence.

Options:

Question 50

Select the answer that correctly completes the sentence.

Options:

Question 51

What are two reasons to deploy multiple virtual networks instead of using just one virtual network? Each correct answer presents a complete solution.

NOTE; Each correct selection is worth one point.

Options:

A.

to separate the resources for budgeting

B.

to meet Governance policies

C.

to isolate the resources

D.

to connect multiple types of resources

Question 52

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Microsoft Defender for Cloud

B.

Azure Blueprints

C.

Microsoft Sentinel

D.

Azure Policy

Question 53

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 54

What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

to discover and control the use of shadow IT

B.

to provide secure connections to Azure virtual machines

C.

to protect sensitive information hosted anywhere in the cloud

D.

to provide pass-through authentication to on-premises applications

E.

to prevent data leaks to noncompliant apps and limit access to regulated data

Question 55

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 56

Which two types of devices can be managed by using Endpoint data loss prevention (Endpoint DLP)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Windows 11

B.

Linux

C.

iOS

D.

macOS

E.

Android

Question 57

Select the answer that correctly completes the sentence.

Options:

Question 58

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 59

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 60

When you enable Azure AD Multi-Factor Authentication (MFA), how many factors are required for authentication?

Options:

A.

1

B.

2

C.

3

D.

4

Question 61

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 62

Select the answer that correctly completes the sentence.

Options:

Demo: 62 questions
Total 208 questions