Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Exam Practice Test

Page: 1 / 20
Total 198 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

text message (SMS)

B.

Microsoft Authenticator app

C.

email verification

D.

phone call

E.

security question

Question 2

Select the answer that correctly completes the sentence.

Options:

Question 3

Which statement represents a Microsoft privacy principle?

Options:

A.

Microsoft does not collect any customer data.

B.

Microsoft uses hosted customer email and chat data for targeted advertising.

C.

Microsoft manages privacy settings for its customers.

D.

Microsoft respects the local privacy laws that are applicable to its customers.

Question 4

Select the answer that correctly completes the sentence.

Options:

Question 5

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

Options:

A.

the Microsoft Endpoint Manager admin center

B.

Azure Cost Management + Billing

C.

Microsoft Service Trust Portal

D.

the Azure Active Directory admin center

Question 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 7

Select the answer that correctly completes the sentence.

Options:

Question 8

Select the answer that correctly completes the sentence.

Options:

Question 9

Select the answer that correctly completes the sentence.

Options:

Question 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 11

Select the answer that correctly completes the sentence.

Options:

Question 12

Which security feature is available in the free mode of Microsoft Defender for Cloud?

Options:

A.

vulnerability scanning of virtual machines

B.

secure score

C.

just-in-time (JIT) VM access to Azure virtual machines

D.

threat protection alerts

Question 13

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Microsoft Defender for Cloud

B.

Azure Blueprints

C.

Microsoft Sentinel

D.

Azure Policy

Question 14

Select the answer that correctly completes the sentence.

Options:

Question 15

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and newer only

B.

Windows 10 and newer and Android only

C.

Windows 10 and newer and macOS only

D.

Windows 10 and newer, Android, and macOS

Question 16

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Display policy tips to users who are about to violate your organization’s policies.

B.

Enable disk encryption on endpoints.

C.

Protect documents in Microsoft OneDrive that contain sensitive information.

D.

Apply security baselines to devices.

Question 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 18

Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 19

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 20

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 21

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?

Options:

A.

Attack simulator

B.

Reports

C.

Hunting

D.

Incidents

Question 22

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 23

Select the answer that correctly completes the sentence.

Options:

Question 24

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 25

Select the answer that correctly completes the sentence.

Options:

Question 26

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 27

Which solution performs security assessments and automatically generates alerts when a vulnerability is found?

Options:

A.

cloud security posture management (CSPM)

B.

DevSecOps

C.

cloud workload protection platform (CWPP)

D.

security information and event management (SIEM)

Question 28

What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?

Options:

A.

Azure Active Directory (Azure AD) Identity Protection

B.

a conditional access policy

C.

Azure role-based access control (Azure RBAC)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Question 29

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Configure external access for partner organizations.

B.

Export risk detection to third-party utilities.

C.

Automate the detection and remediation of identity based-risks.

D.

Investigate risks that relate to user authentication.

E.

Create and automatically assign sensitivity labels to data.

Question 30

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Question 31

Select the answer that correctly completes the sentence.

Options:

Question 32

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Plan

B.

Manage

C.

Adopt

D.

Govern

E.

Define Strategy

Question 33

Select the answer that correctly completes the sentence.

Options:

Question 34

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 35

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 36

Select the answer that correctly completes the sentence.

Options:

Question 37

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Question 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 39

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 40

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 41

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Azure Defender

B.

Azure Blueprints

C.

Azure Sentinel

D.

Azure Policy

Question 42

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

Options:

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

Question 43

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 44

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Question 45

What is an example of encryption at rest?

Options:

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Question 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 47

Which type of identity is created when you register an application with Active Directory (Azure AD)?

Options:

A.

a user account

B.

a user-assigned managed identity

C.

a system-assigned managed identity

D.

a service principal

Question 48

Select the answer that correctly completes the sentence.

Options:

Question 49

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 50

Select the answer that correctly completes the sentence.

Options:

Question 51

Select the answer that correctly completes the sentence.

Options:

Question 52

Select the answer that correctly completes the sentence.

Options:

Question 53

Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

fingerprint

B.

facial recognition

C.

PIN

D.

email verification

E.

security question

Question 54

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

Options:

A.

sensitivity label policies

B.

Customer Lockbox

C.

information Barriers

D.

Privileged Access Management (PAM)

Question 55

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 56

Select the answer that correctly completes the sentence.

Options:

Question 57

You need to keep a copy of all files in a Microsoft SharePoint site for one year, even if users delete the files from the site. What should you apply to the site?

Options:

A.

a data loss prevention (DLP) policy

B.

a retention policy

C.

an insider risk policy

D.

a sensitivity label policy

Page: 1 / 20
Total 198 questions