Big Cyber Monday Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Exam Practice Test

Page: 1 / 21
Total 208 questions

Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Question 1

Select the answer that correctly completes the sentence.

Question # 1

Options:

Question 2

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 2

Options:

Question 3

Which Microsoft Purview data classification type supports the use of regular expressions?

Options:

A.

exact data match (EDM)

B.

fingerprint classifier

C.

sensitive information types (SlTs)

D.

trainable classifier

Question 4

Select the answer that correctly completes the sentence.

Question # 4

Options:

Question 5

Which feature is included in Microsoft Entra ID Governance?

Options:

A.

Verifiable credentials

B.

Permissions Management

C.

Identity Protection

D.

Privileged Identity Management

Question 6

Select the answer that correctly completes the sentence.

Question # 6

Options:

Question 7

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 7

Options:

Question 8

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 8

Options:

Question 9

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

Options:

A.

to control how often users must change their passwords

B.

to identify devices to which users can sign in without using multi-factor authentication (MFA)

C.

to encrypt a password by using globally recognized encryption standards

D.

to prevent users from using specific words in their passwords

Question 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Question # 10

Options:

Question 11

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Question # 11

Options:

Question 12

Select the answer that correctly completes the sentence.

Question # 12

Options:

Question 13

Select the answer that correctly completes the sentence.

Question # 13

Options:

Question 14

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Question 15

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and newer only

B.

Windows 10 and newer and Android only

C.

Windows 10 and newer and macOS only

D.

Windows 10 and newer, Android, and macOS

Question 16

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 16

Options:

Question 17

Select the answer that correctly completes the sentence.

Question # 17

Options:

Question 18

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 18

Options:

Question 19

Select The answer that correctly completes the sentence.

Question # 19

Options:

Question 20

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Question # 20

Options:

Question 21

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Plan

B.

Manage

C.

Adopt

D.

Govern

E.

Define Strategy

Question 22

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 22

Options:

Question 23

Select the answer that correctly completes the sentence.

Question # 23

Options:

Question 24

Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 24

Options:

Question 25

You are evaluating the compliance score in Microsoft Purview Compliance Manager.

Match the compliance score action subcategories to the appropriate actions.

To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Question # 25

Options:

Question 26

To which three locations can a data loss prevention (DLP) policy be applied? Each correct answer presents a complete solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Microsoft Exchange Online email

B.

Microsoft OneDrive accounts

C.

Microsoft Exchange Online public folders

D.

Microsoft Teams chat and channel messages

E.

Microsoft Viva Engage

Question 27

Which type of identity is created when you register an application with Active Directory (Azure AD)?

Options:

A.

a user account

B.

a user-assigned managed identity

C.

a system-assigned managed identity

D.

a service principal

Question 28

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 28

Options:

Question 29

completes the sentence.

Question # 29

Options:

Question 30

Select the answer that correctly completes the sentence.

Question # 30

Options:

Question 31

Select the answer that correctly completes the sentence.

Question # 31

Options:

Question 32

What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?

Options:

A.

Azure Active Directory (Azure AD) Identity Protection

B.

a conditional access policy

C.

Azure role-based access control (Azure RBAC)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Question 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 33

Options:

Question 34

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 34

Options:

Question 35

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 35

Options:

Question 36

Match the types of compliance score actions to the appropriate tasks.

To answer. drag the appropriate action type from the column on the left to its task on the right. Each type may be used once. more than once, or not at all.

NOTE: Each correct match is worth one point.

Question # 36

Options:

Question 37

What should you use in the Microsoft Defender portal to view security trends and track the protection status of identities?

Options:

A.

Secure score

B.

Reports

C.

Hunting

D.

Incidents

Question 38

Select the answer that correctly completes the sentence.

Question # 38

Options:

Question 39

What can you protect by using the information protection solution in the Microsoft 365 compliance center?

Options:

A.

computers from zero-day exploits

B.

users from phishing attempts

C.

files from malware and viruses

D.

sensitive data from being exposed to unauthorized users

Question 40

What feature supports email as a method of authenticating users?

Options:

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Multi-Factor Authentication (MFA)

C.

self-service password reset (SSPR)

D.

Microsoft Entra Password Protection

Question 41

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Configure external access for partner organizations.

B.

Export risk detection to third-party utilities.

C.

Automate the detection and remediation of identity based-risks.

D.

Investigate risks that relate to user authentication.

E.

Create and automatically assign sensitivity labels to data.

Question 42

Select the answer that correctly completes the sentence.

Question # 42

Options:

Question 43

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 43

Options:

Question 44

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?

Options:

A.

conditional access policies

B.

Azure AD Identity Protection

C.

Azure AD Privileged Identity Management (PIM)

D.

authentication method policies

Question 45

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 45

Options:

Question 46

Which two cards are available in the Microsoft 365 Defender portal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

Users at risk

B.

Compliance Score

C.

Devices at risk

D.

Service Health

E.

User Management

Question 47

Which portal contains the solution catalog?

Options:

A.

Microsoft 365 Apps admin center

B.

Microsoft 365 Defender portal

C.

Microsoft 365 admin center

D.

Microsoft Purview compliance portal

Question 48

Select the answer that correctly completes the sentence.

Question # 48

Options:

Question 49

Which service includes the Attack simulation training feature?

Options:

Question 50

In the shared responsibility model, for what is Microsoft responsible when managing Azure virtual machines?

Options:

A.

Updating the operating system.

B.

Configuring the permissions for shared folders.

C.

Updating the firmware of the disk controller.

D.

Updating installed applications.

Question 51

Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?

Options:

A.

Microsoft Secure Score

B.

Productivity Score

C.

Secure score in Azure Security Center

D.

Compliance score

Question 52

Select the answer that correctly completes the sentence.

Question # 52

Options:

Question 53

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and iOS only

B.

Windows 10 and Android only

C.

Windows 10, Android, and iOS

D.

Windows 10 only

Question 54

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 54

Options:

Question 55

What is an example of encryption at rest?

Options:

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Question 56

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 56

Options:

Question 57

Select the answer that correctly completes the sentence.

Question # 57

Options:

Question 58

What can be created in Active Directory Domain Services (AD DS)?

Options:

A.

line-of-business (106) applications that require modem authentication

B.

mob devices

C.

computer accounts

D.

software as a service (SaaS) applications that require modem authentication

Question 59

Select the answer that correctly completes the sentence.

Question # 59

Options:

Question 60

What is a use case for implementing information barrier policies in Microsoft 365?

Options:

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

Question 61

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

Options:

A.

sensitivity label policies

B.

Customer Lockbox

C.

information Barriers

D.

Privileged Access Management (PAM)

Question 62

Select the answer that correctly completes the sentence.

Question # 62

Options:

Page: 1 / 21
Total 208 questions