0% found this document useful (0 votes)
10 views16 pages

SC 900 Demo

The document provides a demo version of the SC-900 exam questions and answers related to Microsoft Security, Compliance, and Identity Fundamentals. It includes various types of questions, such as HOTSPOT and multiple-choice, along with references to Microsoft documentation for further study. Additionally, it offers a link to purchase the full exam file and a discount coupon for the purchase.

Uploaded by

harperella546
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views16 pages

SC 900 Demo

The document provides a demo version of the SC-900 exam questions and answers related to Microsoft Security, Compliance, and Identity Fundamentals. It includes various types of questions, such as HOTSPOT and multiple-choice, along with references to Microsoft documentation for further study. Additionally, it offers a link to purchase the full exam file and a discount coupon for the purchase.

Uploaded by

harperella546
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Microsoft

SC-900 Exam
Security, Compliance, and Identity Fundamentals

Questions & Answers


(Demo Version - Limited Content)

Thank you for Downloading SC-900 exam PDF Demo

Get Full File:

https://authorizedumps.com/sc-900-dumps/

www.authorizedumps.com
Questions & Answers PDF Page 2

Version: 15.0

Question: 1

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Answer:
Explanation:

Question: 2

www.authorizedumps.com
Questions & Answers PDF Page 3

HOTSPOT

Select the answer that correctly completes the sentence.

Answer:
Explanation:

Reference:
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/get-started/

Question: 3
HOTSPOT

Select the answer that correctly completes the sentence.

www.authorizedumps.com
Questions & Answers PDF Page 4

Answer:

eDiscovery
https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide

Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview

Question: 4
HOTSPOT

Select the answer that correctly completes the sentence.

Answer:
Explanation:

Question: 5

HOTSPOT

Select the answer that correctly completes the sentence.

www.authorizedumps.com
Questions & Answers PDF Page 5

Answer:
Explanation:

Federation is a collection of domains that have established trust. Reference:


https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed

Question: 6
HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Answer:
Explanation:

www.authorizedumps.com
Questions & Answers PDF Page 6

Box 1: Yes
System updates reduces security vulnerabilities, and provide a more stable environment for end
users. Not applying updates leaves unpatched vulnerabilities and results in environments that are
susceptible to attacks.

Box 2: Yes

Box 3: Yes
If you only use a password to authenticate a user, it leaves an attack vector open. With MFA enabled,
your accounts are more secure.

Reference:
https://docs.microsoft.com/en-us/azure/security-center/secure-score-security-controls

Question: 7

Which score measures an organization's progress in completing actions that help reduce risks
associated to data protection and regulatory standards?

A. Microsoft Secure Score


B. Productivity Score
C. Secure score in Azure Security Center
D. Compliance score

Answer: D
Explanation:

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-
worldwide

https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-
calculation?view=o365- worldwide

www.authorizedumps.com
Questions & Answers PDF Page 7

Question: 8
What do you use to provide real-time integration between Azure Sentinel and another security
source?

A. Azure AD Connect
B. a Log Analytics workspace
C. Azure Information Protection
D. a data connector

Answer: D
Explanation:

To on-board Azure Sentinel, you first need to connect to your security sources. Azure Sentinel comes
with a number of connectors for Microsoft solutions, including Microsoft 365 Defender solutions, and
Microsoft 365 sources, including Office 365, Azure AD, Microsoft Defender for Identity, and Microsoft
Cloud App Security, etc.

Reference:
https://docs.microsoft.com/en-us/azure/sentinel/overview

Question: 9
Which Microsoft portal provides information about how Microsoft cloud services comply with
regulatory standard, such as International Organization for Standardization (ISO)?

A. the Microsoft Endpoint Manager admin center


B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center

Answer: C
Explanation:

The Microsoft Service Trust Portal contains details about Microsoft's implementation of controls and
processes that protect our cloud services and the customer data therein.

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-

www.authorizedumps.com
Questions & Answers PDF Page 8

portal?view=o365- worldwide

Question: 10
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for
managing?

A. the management of mobile devices


B. the permissions for the user data stored in Azure
C. the creation and management of user accounts
D. the management of the physical hardware

Answer: D
Explanation:

Question: 11
HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Answer:
Explanation:

www.authorizedumps.com
Questions & Answers PDF Page 9

Box 1: Yes

Box 2: Yes

Box 3: No
The Zero Trust model does not assume that everything behind the corporate firewall is safe, the Zero
Trust model assumes breach and verifies each request as though it originated from an uncontrolled
network.

Reference:
https://docs.microsoft.com/en-us/security/zero-trust/

Question: 12
HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Answer:
Explanation:

www.authorizedumps.com
Questions & Answers PDF Page 10

Reference: https://privacy.microsoft.com/en-US/

Question: 13
HOTSPOT

Select the answer that correctly completes the sentence.

Answer:
Explanation:

Question: 14
What can you use to provide a user with a two-hour window to complete an administrative task in
Azure?

www.authorizedumps.com
Questions & Answers PDF Page 11

A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)


B. Azure Multi-Factor Authentication (MFA)
C. Azure Active Directory (Azure AD) Identity Protection
D. conditional access policies

Answer: D
Explanation:

https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-
configure
Privileged Identity Management provides time-based and approval-based role activation to mitigate
the risks of excessive, unnecessary, or misused access permissions on resources that you care about.
Here are some of the key features of Privileged Identity Management: Provide just-in-time privileged
access to Azure AD and Azure resources Assign time-bound access to resources using start and end
dates Require approval to activate privileged roles Enforce multi-factor authentication to activate any
role Use justification to understand why users activate Get notifications when privileged roles are
activated Conduct access reviews to ensure users still need roles Download audit history for internal
or external audit Prevents removal of the last active Global Administrator role assignment

Question: 15

In a hybrid identity model, what can you use to sync identities between Active Directory Domain
Services (AD DS) and Azure Active Directory (Azure AD)?

A. Active Directory Federation Services (AD FS)


B. Azure Sentinel
C. Azure AD Connect
D. Azure Ad Privileged Identity Management (PIM)

Answer: C
Explanation:

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-azure-ad-connect

www.authorizedumps.com
Questions & Answers PDF Page 12

Question: 16
HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Answer:
Explanation:

Box 1: Yes
Azure AD supports custom roles.

Box 2: Yes
Global Administrator has access to all administrative features in Azure Active Directory. Box 3: No

www.authorizedumps.com
Questions & Answers PDF Page 13

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/concept-understand-roles
https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference

Question: 17
HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Answer:
Explanation:

www.authorizedumps.com
Questions & Answers PDF Page 14

Box 1: No
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.

Box 2: Yes
Microsoft 365 uses Azure Active Directory (Azure AD). Azure Active Directory (Azure AD) is included
with your Microsoft 365 subscription.

Box 3: Yes
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.

Reference:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-
identity?view=o365-worldwide

Question: 18
HOTSPOT

Select the answer that correctly completes the sentence.

Answer:
Explanation:

Biometrics templates are stored locally on a device. Reference:


https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-
overview

Question: 19
What is the purpose of Azure Active Directory (Azure AD) Password Protection?

A. to control how often users must change their passwords


B. to identify devices to which users can sign in without using multi-factor authentication (MFA)

www.authorizedumps.com
Questions & Answers PDF Page 15

C. to encrypt a password by using globally recognized encryption standards


D. to prevent users from using specific words in their passwords

Answer: D
Explanation:

Explanation

Azure AD Password Protection detects and blocks known weak passwords and their variants, and can
also block additional weak terms that are specific to your organization.

With Azure AD Password Protection, default global banned password lists are automatically applied
to all users in an Azure AD tenant. To support your own business and security needs, you can define
entries in a custom banned password list.

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-
bad-on-premises

Question: 20

Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and
automatically remove users that no longer require membership in a group?

A. access reviews
B. managed identities
C. conditional access policies
D. Azure AD Identity Protection

Answer: A
Explanation:

Explanation

Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group
memberships, access to enterprise applications, and role assignments.

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview

www.authorizedumps.com
Thank You for trying SC-900 PDF Demo

https://authorizedumps.com/sc-900-dumps/

Start Your SC-900 Preparation

[Limited Time Offer] Use Coupon " SAVE20 " for extra 20%
discount the purchase of PDF file. Test your
SC-900 preparation with actual exam questions

www.authorizedumps.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy