Microsoft Security Compliance and Identity Fundamentals Questions and Answers
Select the answer that correctly completes the sentence.
Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?
Select the answer that correctly completes the sentence.
Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
Select the answer that correctly completes the sentence.
You have an Azure subscription.
You need to implement approval-based, tiProme-bound role activation.
What should you use?
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
What feature supports email as a method of authenticating users?
Select the answer that correctly completes the sentence.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
What is an example of encryption at rest?
What is an assessment in Compliance Manager?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?
What can you use to deploy Azure resources across multiple subscriptions in a consistent manner?
Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Which pillar of identity relates to tracking the resources accessed by a user?
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Select the answer that correctly completes the sentence.
You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Which service includes the Attack simulation training feature?
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Which feature is included in Microsoft Entra ID Governance?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?
Select the answer that correctly completes the sentence.
Select the answer that correctly completes the sentence.
In a Core eDiscovery workflow, what should you do before you can search for content?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Select the answer that correctly completes the sentence.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Select the answer that correctly completes the sentence.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
What is a characteristic of a sensitivity label in Microsoft 365?
Select the answer that correctly completes the sentence.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point
Select the answer that correctly completes the sentence.
What can be created in Active Directory Domain Services (AD DS)?
What do you use to provide real-time integration between Azure Sentinel and another security source?
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.
in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.
Select the answer that correctly completes the sentence.
Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?
Select the answer that correctly completes the sentence.
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.