Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Exam Practice Test

Page: 1 / 21
Total 209 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Question 1

Select the answer that correctly completes the sentence.

Question # 1

Options:

Question 2

Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 2

Options:

Question 3

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 3

Options:

Question 4

Select the answer that correctly completes the sentence.

Question # 4

Options:

Question 5

Select the answer that correctly completes the sentence.

Question # 5

Options:

Question 6

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Question 7

What can you use to view the Microsoft Secure Score for Devices?

Options:

A.

Microsoft Defender for Cloud Apps

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Office 365

Question 8

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 8

Options:

Question 9

You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?

Options:

A.

an SSH client

B.

PowerShell remoting

C.

the Azure portal

D.

the Remote Desktop Connection client

Question 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 10

Options:

Question 11

Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

Options:

A.

Microsoft Service Trust Portal

B.

Compliance Manager

C.

Microsoft 365 compliance center

D.

Microsoft Support

Question 12

Select the answer that correctly completes the sentence.

Question # 12

Options:

Question 13

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.

Microsoft Defender for Cloud

B.

Azure Blueprints

C.

Microsoft Sentinel

D.

Azure Policy

Question 14

Select the answer that correctly completes the sentence.

Question # 14

Options:

Question 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Question # 15

Options:

Question 16

Select the answer that correctly completes the sentence.

Question # 16

Options:

Question 17

Select the answer that correctly completes the sentence.

Question # 17

Options:

Question 18

What is a use case for implementing information barrier policies in Microsoft 365?

Options:

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

Question 19

What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

automated investigation and remediation

B.

transport encryption

C.

shadow IT detection

D.

attack surface reduction

Question 20

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.

Question # 20

Options:

Question 21

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?

Options:

A.

Attack simulator

B.

Reports

C.

Hunting

D.

Incidents

Question 22

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?

Options:

A.

Audit

B.

Compliance Manager

C.

Content Search

D.

Alerts

Question 23

Select the answer that correctly completes the sentence.

Question # 23

Options:

Question 24

In a Core eDiscovery workflow, what should you do before you can search for content?

Options:

A.

Create an eDiscovery hold.

B.

Run Express Analysis.

C.

Configure attorney-client privilege detection.

D.

Export and download results.

Question 25

ON NO: 27 HOTSPOT

Select the answer that correctly completes the sentence.

Question # 25

Options:

Question 26

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 26

Options:

Question 27

You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.

in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.

Question # 27

Options:

Question 28

Select the answer that correctly completes the sentence.

Question # 28

Options:

Question 29

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 29

Options:

Question 30

Which Microsoft Purview solution can be used to identify data leakage?

Options:

A.

insider risk management

B.

Compliance Manager

C.

communication compliance

D.

eDiscovery

Question 31

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 31

Options:

Question 32

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 32

Options:

Question 33

What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?

Options:

A.

Azure Active Directory (Azure AD) Identity Protection

B.

a conditional access policy

C.

Azure role-based access control (Azure RBAC)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Question 34

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Question # 34

Options:

Question 35

Select the answer that correctly completes the sentence.

Question # 35

Options:

Question 36

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

Options:

A.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

B.

Azure Multi-Factor Authentication (MFA)

C.

Azure Active Directory (Azure AD) Identity Protection

D.

conditional access policies

Question 37

Which service includes the Attack simulation training feature?

Options:

Question 38

Select the answer that correctly completes the sentence.

Question # 38

Options:

Question 39

Which solution performs security assessments and automatically generates alerts when a vulnerability is found?

Options:

A.

cloud security posture management (CSPM)

B.

DevSecOps

C.

cloud workload protection platform (CWPP)

D.

security information and event management (SIEM)

Question 40

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Question # 40

Options:

Question 41

Select the answer that correctly completes the sentence.

Question # 41

Options:

Question 42

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

Options:

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

Question 43

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 43

Options:

Question 44

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 44

Options:

Question 45

Select the answer that correctly completes the sentence.

Question # 45

Options:

Question 46

NO: 73 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 46

Options:

Question 47

In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?

Options:

A.

Active Directory Federation Services (AD FS)

B.

Azure Sentinel

C.

Azure AD Connect

D.

Azure Ad Privileged Identity Management (PIM)

Question 48

What Microsoft Purview feature can use machine learning algorithms to detect and automatically protect sensitive items?

Options:

A.

eDiscovery

B.

Data loss prevention

C.

Information risks

D.

Communication compliance

Question 49

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

Options:

A.

network security groups (NSGs)

B.

Azure AD Privileged Identity Management (PIM)

C.

conditional access policies

D.

resource locks

Question 50

Select the answer that correctly completes the sentence.

Question # 50

Options:

Question 51

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Question 52

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Question # 52

Options:

Question 53

You are evaluating the compliance score in Microsoft Purview Compliance Manager.

Match the compliance score action subcategories to the appropriate actions.

To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Question # 53

Options:

Question 54

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

Options:

A.

Content Search

B.

sensitivity labels

C.

retention policies

D.

eDiscovery

Question 55

Select the answer that correctly completes the sentence.

Question # 55

Options:

Question 56

Select the answer that correctly completes the sentence.

Question # 56

Options:

Question 57

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Configure external access for partner organizations.

B.

Export risk detection to third-party utilities.

C.

Automate the detection and remediation of identity based-risks.

D.

Investigate risks that relate to user authentication.

E.

Create and automatically assign sensitivity labels to data.

Question 58

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 58

Options:

Question 59

Which compliance feature should you use to identify documents that are employee resumes?

Options:

A.

pre-trained classifiers

B.

Content explorer

C.

Activity explorer

D.

eDiscovery

Question 60

Which portal contains the solution catalog?

Options:

A.

Microsoft 365 Apps admin center

B.

Microsoft 365 Defender portal

C.

Microsoft 365 admin center

D.

Microsoft Purview compliance portal

Question 61

Select the answer that correctly completes the sentence.

Question # 61

Options:

Page: 1 / 21
Total 209 questions