Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Microsoft SC-900 Dumps Questions Answers

Page: 1 / 14
Total 198 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Question 1

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Question 2

For each of the following statements, select Yes if the statement is true Otherwise, select No.

NOTE Each correct selection is worth one point.

Options:

Question 3

What can you use to provide threat detection for Azure SQL Managed Instance?

Options:

A.

Microsoft Secure Score

B.

application security groups

C.

Microsoft Defender for Cloud

D.

Azure Bastion

Question 4

Select the answer that correctly completes the sentence.

Options:

Question 5

What is a function of Conditional Access session controls?

Options:

A.

prompting multi-factor authentication (MFA)

B.

enable limited experiences, such as blocking download of sensitive information

C.

enforcing device compliance

D.

enforcing client app compliance

Question 6

Which statement represents a Microsoft privacy principle?

Options:

A.

Microsoft does not collect any customer data.

B.

Microsoft uses hosted customer email and chat data for targeted advertising.

C.

Microsoft manages privacy settings for its customers.

D.

Microsoft respects the local privacy laws that are applicable to its customers.

Question 7

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Question 8

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 9

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 10

Select the answer that correctly completes the sentence.

Options:

Question 11

Select the answer that correctly completes the sentence.

Options:

Question 12

Which pillar of identity relates to tracking the resources accessed by a user?

Options:

A.

auditing

B.

authorization

C.

authentication

D.

administration

Question 13

Select the answer that correctly completes the sentence.

Options:

Question 14

You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?

Options:

A.

an SSH client

B.

PowerShell remoting

C.

the Azure portal

D.

the Remote Desktop Connection client

Question 15

Select the answer that correctly completes the sentence.

Options:

Question 16

Select the answer that correctly completes the sentence.

Options:

Question 17

Select the answer that correctly completes the sentence.

Options:

Question 18

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Question 19

What can you specify in Microsoft 365 sensitivity labels?

Options:

A.

how long files must be preserved

B.

when to archive an email message

C.

which watermark to add to files

D.

where to store files

Question 20

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Question 21

Which security feature is available in the free mode of Microsoft Defender for Cloud?

Options:

A.

vulnerability scanning of virtual machines

B.

secure score

C.

just-in-time (JIT) VM access to Azure virtual machines

D.

threat protection alerts

Question 22

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 23

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Question 24

For each of the following statement, select Yes if the statement is true Otherwise, select No.

NOTE: Each connect selection a worth one point.

Options:

Question 25

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

Options:

A.

to control how often users must change their passwords

B.

to identify devices to which users can sign in without using multi-factor authentication (MFA)

C.

to encrypt a password by using globally recognized encryption standards

D.

to prevent users from using specific words in their passwords

Question 26

Select the answer that correctly completes the sentence.

Options:

Question 27

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

text message (SMS)

B.

Microsoft Authenticator app

C.

email verification

D.

phone call

E.

security question

Question 28

What is an example of encryption at rest?

Options:

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Question 29

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 30

Which two cards are available in the Microsoft 365 Defender portal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

Users at risk

B.

Compliance Score

C.

Devices at risk

D.

Service Health

E.

User Management

Question 31

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and newer only

B.

Windows 10 and newer and Android only

C.

Windows 10 and newer and macOS only

D.

Windows 10 and newer, Android, and macOS

Question 32

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 34

What do you use to provide real-time integration between Azure Sentinel and another security source?

Options:

A.

Azure AD Connect

B.

a Log Analytics workspace

C.

Azure Information Protection

D.

a data connector

Question 35

Select the answer that correctly completes the sentence.

Options:

Question 36

Select the answer that correctly completes the sentence.

Options:

Question 37

Select the answer that correctly completes the sentence.

Options:

Question 38

Select the answer that correctly completes the sentence.

Options:

Question 39

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 40

Select the answer that correctly completes the sentence.

Options:

Question 41

Select the answer that correctly completes the sentence.

Options:

Question 42

Select the answer that correctly completes the sentence.

Options:

Question 43

Select the answer that correctly completes the sentence.

Options:

Question 44

Select the answer that correctly completes the sentence.

Options:

Question 45

Select the answer that correctly completes the sentence.

Options:

Question 46

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

Options:

A.

network security groups (NSGs)

B.

Azure AD Privileged Identity Management (PIM)

C.

conditional access policies

D.

resource locks

Question 47

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?

Options:

A.

threat modeling

B.

identity as the security perimeter

C.

defense in depth

D.

the shared responsibility model

Question 48

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Azure Defender

B.

Azure Blueprints

C.

Azure Sentinel

D.

Azure Policy

Question 49

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

Options:

A.

applications

B.

network controls

C.

operating systems

D.

accounts and identities

Question 50

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 51

You have an Azure subscription that contains a Log Analytics workspace.

You need to onboard Microsoft Sentinel.

What should you do first?

Options:

A.

Create a hunting query.

B.

Correlate alerts into incidents.

C.

Connect to your security sources.

D.

Create a custom detection rule.

Question 52

Which type of identity is created when you register an application with Active Directory (Azure AD)?

Options:

A.

a user account

B.

a user-assigned managed identity

C.

a system-assigned managed identity

D.

a service principal

Question 53

What can you protect by using the information protection solution in the Microsoft 365 compliance center?

Options:

A.

computers from zero-day exploits

B.

users from phishing attempts

C.

files from malware and viruses

D.

sensitive data from being exposed to unauthorized users

Question 54

What can you use to deploy Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Microsoft Sentinel

B.

Microsoft Defender for Cloud

C.

Azure Policy

D.

Azure Blueprints

Question 55

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 56

In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?

Options:

A.

Active Directory Federation Services (AD FS)

B.

Azure Sentinel

C.

Azure AD Connect

D.

Azure Ad Privileged Identity Management (PIM)

Question 57

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Microsoft Defender for Cloud

B.

Azure Blueprints

C.

Microsoft Sentinel

D.

Azure Policy

Page: 1 / 14
Total 198 questions