Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Exam Practice Test

Demo: 57 questions
Total 198 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Question 1

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 2

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

Options:

A.

the Microsoft Endpoint Manager admin center

B.

Azure Cost Management + Billing

C.

Microsoft Service Trust Portal

D.

the Azure Active Directory admin center

Question 3

Select the answer that correctly completes the sentence.

Options:

Question 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 5

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Question 6

Select the answer that correctly completes the sentence.

Options:

Question 7

What can you specify in Microsoft 365 sensitivity labels?

Options:

A.

how long files must be preserved

B.

when to archive an email message

C.

which watermark to add to files

D.

where to store files

Question 8

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Plan

B.

Manage

C.

Adopt

D.

Govern

E.

Define Strategy

Question 9

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Question 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 11

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 12

Select the answer that correctly completes the sentence.

Options:

Question 13

Select the answer that correctly completes the sentence.

Options:

Question 14

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 16

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 18

Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 19

Which type of identity is created when you register an application with Active Directory (Azure AD)?

Options:

A.

a user account

B.

a user-assigned managed identity

C.

a system-assigned managed identity

D.

a service principal

Question 20

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?

Options:

A.

threat modeling

B.

identity as the security perimeter

C.

defense in depth

D.

the shared responsibility model

Question 21

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 22

Select the answer that correctly completes the sentence.

Options:

Question 23

For each of the following statements, select Yes if the statement is true Otherwise, select No.

NOTE Each correct selection is worth one point.

Options:

Question 24

Select the answer that correctly completes the sentence.

Options:

Question 25

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and newer only

B.

Windows 10 and newer and Android only

C.

Windows 10 and newer and macOS only

D.

Windows 10 and newer, Android, and macOS

Question 26

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 27

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 28

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

text message (SMS)

B.

Microsoft Authenticator app

C.

email verification

D.

phone call

E.

security question

Question 29

What can be created in Active Directory Domain Services (AD DS)?

Options:

A.

line-of-business (106) applications that require modem authentication

B.

mob devices

C.

computer accounts

D.

software as a service (SaaS) applications that require modem authentication

Question 30

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 31

Select the answer that correctly completes the sentence.

Options:

Question 32

Select the answer that correctly completes the sentence.

Options:

Question 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 34

Select the answer that correctly completes the sentence.

Options:

Question 35

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

Options:

A.

sensitivity label policies

B.

Customer Lockbox

C.

information Barriers

D.

Privileged Access Management (PAM)

Question 36

Select the answer that correctly completes the sentence.

Options:

Question 37

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 38

What Microsoft Purview feature can use machine learning algorithms to detect and automatically protect sensitive items?

Options:

A.

eDiscovery

B.

Data loss prevention

C.

Information risks

D.

Communication compliance

Question 39

Which solution performs security assessments and automatically generates alerts when a vulnerability is found?

Options:

A.

cloud security posture management (CSPM)

B.

DevSecOps

C.

cloud workload protection platform (CWPP)

D.

security information and event management (SIEM)

Question 40

Which Microsoft Defender for Cloud metric displays the overall security health of an Azure subscription?

Options:

A.

resource health

B.

secure score

C.

the status of recommendations

D.

completed controls

Question 41

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Question 42

What feature supports email as a method of authenticating users?

Options:

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Multi-Factor Authentication (MFA)

C.

self-service password reset (SSPR)

D.

Microsoft Entra Password Protection

Question 43

Select the answer that correctly completes the sentence.

Options:

Question 44

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 45

What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?

Options:

A.

Azure Active Directory (Azure AD) Identity Protection

B.

a conditional access policy

C.

Azure role-based access control (Azure RBAC)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Question 46

Select the answer that correctly completes the sentence.

Options:

Question 47

Which three authentication methods can Microsoft Entra users use to reset their password? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

text message to a phone

B.

certificate

C.

mobile app notification

D.

security questions

E.

picture password

Question 48

Which feature is included in Microsoft Entra ID Governance?

Options:

A.

Verifiable credentials

B.

Permissions Management

C.

Identity Protection

D.

Privileged Identity Management

Question 49

Select the answer that correctly completes the sentence.

Options:

Question 50

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 51

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?

Options:

A.

Attack simulator

B.

Reports

C.

Hunting

D.

Incidents

Question 52

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

Options:

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

Question 53

You plan to move resources to the cloud.

You are evaluating the use of Infrastructure as a service (laaS),

Platform as a service (PaaS), and Software as a service (SaaS) cloud models.

You plan to manage only the data, user accounts, and user devices for a cloud-based app.

Which cloud model will you use?

Options:

A.

IaaS

B.

SaaS

C.

PaaS

Question 54

Select the answer that correctly completes the sentence.

Options:

Question 55

For each of the following statement, select Yes if the statement is true Otherwise, select No.

NOTE: Each connect selection a worth one point.

Options:

Question 56

Select the answer that correctly completes the sentence.

Options:

Question 57

You have an Azure subscription.

You need to implement approval-based, tiProme-bound role activation.

What should you use?

Options:

A.

Windows Hello for Business

B.

Azure Active Directory (Azure AD) Identity Protection

C.

access reviews in Azure Active Directory (Azure AD)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Demo: 57 questions
Total 198 questions