Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Microsoft SC-900 Dumps

Page: 1 / 20
Total 198 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Question 1

Select the answer that correctly completes the sentence.

as

Options:

Question 2

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and iOS only

B.

Windows 10 and Android only

C.

Windows 10, Android, and iOS

D.

Windows 10 only

Question 3

Select the answer that correctly completes the sentence.

as

Options:

Question 4

Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?

Options:

A.

Microsoft Secure Score

B.

Productivity Score

C.

Secure score in Azure Security Center

D.

Compliance score

Question 5

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?

Options:

A.

threat modeling

B.

identity as the security perimeter

C.

defense in depth

D.

the shared responsibility model

Question 6

What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?

Options:

A.

automated remediation

B.

automated investigation

C.

advanced hunting

D.

network protection

Question 7

Select the answer that correctly completes the sentence.

as

Options:

Question 8

You have an Azure subscription.

You need to implement approval-based, tiProme-bound role activation.

What should you use?

Options:

A.

Windows Hello for Business

B.

Azure Active Directory (Azure AD) Identity Protection

C.

access reviews in Azure Active Directory (Azure AD)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Question 9

Select the answer that correctly completes the sentence.

as

Options:

Question 10

Select the answer that correctly completes the sentence.

as

Options:

Question 11

What feature supports email as a method of authenticating users?

Options:

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Multi-Factor Authentication (MFA)

C.

self-service password reset (SSPR)

D.

Microsoft Entra Password Protection

Question 12

Select the answer that correctly completes the sentence.

as

Options:

Question 13

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 14

Select the answer that correctly completes the sentence.

as

Options:

Question 15

Select the answer that correctly completes the sentence.

as

Options:

Question 16

What is an example of encryption at rest?

Options:

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Question 17

What is an assessment in Compliance Manager?

Options:

A.

A grouping of controls from a specific regulation, standard or policy.

B.

Recommended guidance to help organizations align with their corporate standards.

C.

A dictionary of words that are not allowed in company documents.

D.

A policy initiative that includes multiple policies.

Question 18

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 19

Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?

Options:

A.

integration with the Microsoft 365 compliance center

B.

support for threat hunting

C.

integration with Microsoft 365 Defender

D.

support for Azure Monitor Workbooks

Question 20

What can you use to deploy Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Microsoft Sentinel

B.

Microsoft Defender for Cloud

C.

Azure Policy

D.

Azure Blueprints

Question 21

Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

a network interface

B.

an Azure App Service web app

C.

a virtual network

D.

a virtual network subnet

E.

a resource group

Question 22

Which pillar of identity relates to tracking the resources accessed by a user?

Options:

A.

auditing

B.

authorization

C.

authentication

D.

administration

Question 23

Select the answer that correctly completes the sentence.

as

Options:

Question 24

Select the answer that correctly completes the sentence.

as

Options:

Question 25

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 26

Select the answer that correctly completes the sentence.

as

Options:

Question 27

You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?

Options:

A.

an SSH client

B.

PowerShell remoting

C.

the Azure portal

D.

the Remote Desktop Connection client

Question 28

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 29

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 30

Which service includes the Attack simulation training feature?

Options:

Question 31

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

as

Options:

Question 32

Which feature is included in Microsoft Entra ID Governance?

Options:

A.

Verifiable credentials

B.

Permissions Management

C.

Identity Protection

D.

Privileged Identity Management

Question 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 34

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 35

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

Options:

A.

retention policies

B.

data loss prevention (DLP) policies

C.

conditional access policies

D.

information barriers

Question 36

Select the answer that correctly completes the sentence.

as

Options:

Question 37

Select the answer that correctly completes the sentence.

as

Options:

Question 38

In a Core eDiscovery workflow, what should you do before you can search for content?

Options:

A.

Create an eDiscovery hold.

B.

Run Express Analysis.

C.

Configure attorney-client privilege detection.

D.

Export and download results.

Question 39

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 40

Select the answer that correctly completes the sentence.

as

Options:

Question 41

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 42

Select the answer that correctly completes the sentence.

as

Options:

Question 43

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 44

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Question 45

Select the answer that correctly completes the sentence.

as

Options:

Question 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

as

Options:

Question 47

Select the answer that correctly completes the sentence.

as

Options:

Question 48

What can be created in Active Directory Domain Services (AD DS)?

Options:

A.

line-of-business (106) applications that require modem authentication

B.

mob devices

C.

computer accounts

D.

software as a service (SaaS) applications that require modem authentication

Question 49

What do you use to provide real-time integration between Azure Sentinel and another security source?

Options:

A.

Azure AD Connect

B.

a Log Analytics workspace

C.

Azure Information Protection

D.

a data connector

Question 50

Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?

Options:

A.

access reviews

B.

managed identities

C.

conditional access policies

D.

Azure AD Identity Protection

Question 51

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Question 52

You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.

in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.

as

Options:

Question 53

Select the answer that correctly completes the sentence.

as

Options:

Question 54

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

Options:

A.

network security groups (NSGs)

B.

Azure AD Privileged Identity Management (PIM)

C.

conditional access policies

D.

resource locks

Question 55

Select the answer that correctly completes the sentence.

as

Options:

Question 56

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

text message (SMS)

B.

Microsoft Authenticator app

C.

email verification

D.

phone call

E.

security question

Question 57

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

as

Options:

Page: 1 / 20
Total 198 questions