Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

SC-900 Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Questions 4

Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

Options:

A.

Microsoft Service Trust Portal

B.

Compliance Manager

C.

Microsoft 365 compliance center

D.

Microsoft Support

Buy Now
Questions 5

You are evaluating the compliance score in Microsoft Purview Compliance Manager.

Match the compliance score action subcategories to the appropriate actions.

To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 6

What can you use to ensure that all the users in a specific group must use multi-factor authentication (MFA) to sign in to Azure AD?

Options:

A.

Azure Policy

B.

a communication compliance policy

C.

a Conditional Access policy

D.

a user risk policy

Buy Now
Questions 7

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 8

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 9

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

text message (SMS)

B.

Microsoft Authenticator app

C.

email verification

D.

phone call

E.

security question

Buy Now
Questions 10

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Define the perimeter by physical locations.

B.

Use identity as the primary security boundary.

C.

Always verity the permissions of a user explicitly.

D.

Always assume that the user system can be breached.

E.

Use the network as the primary security boundary.

Buy Now
Questions 11

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 12

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 13

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 14

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

Options:

A.

applications

B.

network controls

C.

operating systems

D.

accounts and identities

Buy Now
Questions 15

Which pillar of identity relates to tracking the resources accessed by a user?

Options:

A.

auditing

B.

authorization

C.

authentication

D.

administration

Buy Now
Questions 16

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.

Options:

Buy Now
Questions 17

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 18

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 19

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 20

What is a use case for implementing information barrier policies in Microsoft 365?

Options:

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

Buy Now
Questions 21

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 22

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

Options:

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

Buy Now
Questions 23

Which service includes the Attack simulation training feature?

Options:

Buy Now
Questions 24

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 25

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 26

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 27

Which statement represents a Microsoft privacy principle?

Options:

A.

Microsoft does not collect any customer data.

B.

Microsoft uses hosted customer email and chat data for targeted advertising.

C.

Microsoft manages privacy settings for its customers.

D.

Microsoft respects the local privacy laws that are applicable to its customers.

Buy Now
Questions 28

You have an Azure subscription that contains a Log Analytics workspace.

You need to onboard Microsoft Sentinel.

What should you do first?

Options:

A.

Create a hunting query.

B.

Correlate alerts into incidents.

C.

Connect to your security sources.

D.

Create a custom detection rule.

Buy Now
Questions 29

Which portal contains the solution catalog?

Options:

A.

Microsoft 365 Apps admin center

B.

Microsoft 365 Defender portal

C.

Microsoft 365 admin center

D.

Microsoft Purview compliance portal

Buy Now
Questions 30

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 31

When you enable Azure AD Multi-Factor Authentication (MFA), how many factors are required for authentication?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 32

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 33

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 34

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 35

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 36

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 37

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 39

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 40

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 41

You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?

Options:

A.

an SSH client

B.

PowerShell remoting

C.

the Azure portal

D.

the Remote Desktop Connection client

Buy Now
Questions 42

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 43

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 44

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

Options:

A.

the Microsoft Endpoint Manager admin center

B.

Azure Cost Management + Billing

C.

Microsoft Service Trust Portal

D.

the Azure Active Directory admin center

Buy Now
Questions 45

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 46

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Buy Now
Questions 47

You plan to move resources to the cloud.

You are evaluating the use of Infrastructure as a service (laaS),

Platform as a service (PaaS), and Software as a service (SaaS) cloud models.

You plan to manage only the data, user accounts, and user devices for a cloud-based app.

Which cloud model will you use?

Options:

A.

IaaS

B.

SaaS

C.

PaaS

Buy Now
Questions 48

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 49

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 50

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 51

In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?

Options:

A.

Active Directory Federation Services (AD FS)

B.

Azure Sentinel

C.

Azure AD Connect

D.

Azure Ad Privileged Identity Management (PIM)

Buy Now
Questions 52

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 53

What can you use to view the Microsoft Secure Score for Devices?

Options:

A.

Microsoft Defender for Cloud Apps

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Office 365

Buy Now
Questions 54

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Exam Code: SC-900
Exam Name: Microsoft Security Compliance and Identity Fundamentals
Last Update: May 1, 2024
Questions: 183
SC-900 pdf

SC-900 PDF

$31.5  $90
SC-900 Engine

SC-900 Testing Engine

$36.75  $105
SC-900 PDF + Engine

SC-900 PDF + Testing Engine

$49  $140