Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Exam Practice Test

Demo: 63 questions
Total 210 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Question 1

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 2

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 3

Select the answer that correctly completes the sentence.

Options:

Question 4

Which score measures an organization ' s progress in completing actions that help reduce risks associated to data protection and regulatory standards?

Options:

A.

Microsoft Secure Score

B.

Productivity Score

C.

Secure score in Azure Security Center

D.

Compliance score

Question 5

What is an assessment in Compliance Manager?

Options:

A.

A grouping of controls from a specific regulation, standard or policy.

B.

Recommended guidance to help organizations align with their corporate standards.

C.

A dictionary of words that are not allowed in company documents.

D.

A policy initiative that includes multiple policies.

Question 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 7

Select the answer that correctly completes the sentence.

Options:

Question 8

Select the answer that correctly completes the sentence.

Options:

Question 9

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

Options:

A.

to control how often users must change their passwords

B.

to identify devices to which users can sign in without using multi-factor authentication (MFA)

C.

to encrypt a password by using globally recognized encryption standards

D.

to prevent users from using specific words in their passwords

Question 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 11

Select the answer that correctly completes the sentence.

Options:

Question 12

Which two actions can you perform by using Azure Key Vault? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Store Azure Resource Manager (ARM) templates.

B.

Implement Azure DDoS Protection.

C.

Implement network security groups (NSGs).

D.

Store keys.

E.

Store secrets.

Question 13

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 14

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 15

Select the answer that correctly completes the sentence.

Options:

Question 16

What can you use to view the Microsoft Secure Score for Devices?

Options:

A.

Microsoft Defender for Cloud Apps

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Office 365

Question 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 18

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 19

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 20

Select the answer that correctly completes the sentence.

Options:

Question 21

You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.

in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.

Options:

Question 22

Select the answer that correctly completes the sentence.

Options:

Question 23

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 24

Which Microsoft Purview solution can be used to identify data leakage?

Options:

A.

insider risk management

B.

Compliance Manager

C.

communication compliance

D.

eDiscovery

Question 25

Select the answer that correctly completes the sentence.

Options:

Question 26

Which feature is included in Microsoft Entra ID Governance?

Options:

A.

Verifiable credentials

B.

Permissions Management

C.

Identity Protection

D.

Privileged Identity Management

Question 27

Select the answer that correctly completes the sentence.

Options:

Question 28

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Question 29

Which Microsoft Defender for Cloud metric displays the overall security health of an Azure subscription?

Options:

A.

resource health

B.

secure score

C.

the status of recommendations

D.

completed controls

Question 30

Select the answer that correctly completes the sentence.

Options:

Question 31

Which security feature is available in the free mode of Microsoft Defender for Cloud?

Options:

A.

vulnerability scanning of virtual machines

B.

secure score

C.

just-in-time (JIT) VM access to Azure virtual machines

D.

threat protection alerts

Question 32

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 33

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Azure Defender

B.

Azure Blueprints

C.

Azure Sentinel

D.

Azure Policy

Question 34

To which type of resource can Azure Bastion provide secure access?

Options:

A.

Azure Files

B.

Azure SQL Managed Instances

C.

Azure virtual machines

D.

Azure App Service

Question 35

Which type of identity is created when you register an application with Active Directory (Azure AD)?

Options:

A.

a user account

B.

a user-assigned managed identity

C.

a system-assigned managed identity

D.

a service principal

Question 36

Select the answer that correctly completes the sentence.

Options:

Question 37

Select the answer that correctly completes the sentence.

Options:

Question 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 39

Match the types of compliance score actions to the appropriate tasks.

To answer. drag the appropriate action type from the column on the left to its task on the right. Each type may be used once. more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Question 40

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 41

What do you use to provide real-time integration between Azure Sentinel and another security source?

Options:

A.

Azure AD Connect

B.

a Log Analytics workspace

C.

Azure Information Protection

D.

a data connector

Question 42

Which service includes the Attack simulation training feature?

Options:

Question 43

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 44

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

Options:

A.

retention policies

B.

data loss prevention (DLP) policies

C.

conditional access policies

D.

information barriers

Question 45

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Question 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 47

You have an Azure subscription that contains a Log Analytics workspace.

You need to onboard Microsoft Sentinel.

What should you do first?

Options:

A.

Create a hunting query.

B.

Correlate alerts into incidents.

C.

Connect to your security sources.

D.

Create a custom detection rule.

Question 48

What is an example of encryption at rest?

Options:

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Question 49

You have a Microsoft 365 E3 subscription.

You plan to audit user activity by using the unified audit log and Basic Audit.

For how long will the audit records be retained?

Options:

A.

15 days

B.

30 days

C.

90 days

D.

180 days

Question 50

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 51

Select the answer that correctly completes the sentence.

Options:

Question 52

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and newer only

B.

Windows 10 and newer and Android only

C.

Windows 10 and newer and macOS only

D.

Windows 10 and newer, Android, and macOS

Question 53

Select the answer that correctly completes the sentence.

Options:

Question 54

Select the answer that correctly completes the sentence.

Options:

Question 55

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 56

Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

a network interface

B.

an Azure App Service web app

C.

a virtual network

D.

a virtual network subnet

E.

a resource group

Question 57

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 58

Select the answer that correctly completes the sentence.

Options:

Question 59

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and iOS only

B.

Windows 10 and Android only

C.

Windows 10, Android, and iOS

D.

Windows 10 only

Question 60

Select the answer that correctly completes the sentence.

Options:

Question 61

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

Options:

A.

Content Search

B.

sensitivity labels

C.

retention policies

D.

eDiscovery

Question 62

What feature supports email as a method of authenticating users?

Options:

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Multi-Factor Authentication (MFA)

C.

self-service password reset (SSPR)

D.

Microsoft Entra Password Protection

Question 63

Select the answer that correctly completes the sentence.

Options:

Demo: 63 questions
Total 210 questions