Independence Day Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

SC-900 PDF

$42

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SC-900 PDF + Testing Engine

$57

$189.99

3 Months Free Update

  • Exam Name: Microsoft Security Compliance and Identity Fundamentals
  • Last Update: Jul 17, 2024
  • Questions and Answers: 186
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SC-900 Engine

$48

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SC-900 Practice Exam Questions with Answers Microsoft Security Compliance and Identity Fundamentals Certification

Question # 6

Which compliance feature should you use to identify documents that are employee resumes?

A.

pre-trained classifiers

B.

Content explorer

C.

Activity explorer

D.

eDiscovery

Full Access
Question # 7

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 8

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 9

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 11

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 12

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 13

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

A.

Microsoft Defender for Cloud

B.

Azure Blueprints

C.

Microsoft Sentinel

D.

Azure Policy

Full Access
Question # 14

What can you use to ensure that all the users in a specific group must use multi-factor authentication (MFA) to sign in to Azure AD?

A.

Azure Policy

B.

a communication compliance policy

C.

a Conditional Access policy

D.

a user risk policy

Full Access
Question # 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 16

When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

All users must authenticate from a registered device.

B.

Administrators must always use Azure Multi-Factor Authentication (MFA).

C.

Azure Multi-Factor Authentication (MFA) registration is required for all users.

D.

All users must authenticate by using passwordless sign-in.

E.

All users must authenticate by using Windows Hello.

Full Access
Question # 17

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 18

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

A.

the management of mobile devices

B.

the permissions for the user data stored in Azure

C.

the creation and management of user accounts

D.

the management of the physical hardware

Full Access
Question # 19

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

Full Access
Question # 20

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

A.

Windows 10 and iOS only

B.

Windows 10 and Android only

C.

Windows 10, Android, and iOS

D.

Windows 10 only

Full Access
Question # 21

You plan to move resources to the cloud.

You are evaluating the use of Infrastructure as a service (laaS),

Platform as a service (PaaS), and Software as a service (SaaS) cloud models.

You plan to manage only the data, user accounts, and user devices for a cloud-based app.

Which cloud model will you use?

A.

IaaS

B.

SaaS

C.

PaaS

Full Access
Question # 22

What can you use to view the Microsoft Secure Score for Devices?

A.

Microsoft Defender for Cloud Apps

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Office 365

Full Access
Question # 23

What is an assessment in Compliance Manager?

A.

A grouping of controls from a specific regulation, standard or policy.

B.

Recommended guidance to help organizations align with their corporate standards.

C.

A dictionary of words that are not allowed in company documents.

D.

A policy initiative that includes multiple policies.

Full Access
Question # 24

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 25

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 26

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 27

You have an Azure subscription.

You need to implement approval-based, tiProme-bound role activation.

What should you use?

A.

Windows Hello for Business

B.

Azure Active Directory (Azure AD) Identity Protection

C.

access reviews in Azure Active Directory (Azure AD)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Full Access
Question # 28

What can you use to provide threat detection for Azure SQL Managed Instance?

A.

Microsoft Secure Score

B.

application security groups

C.

Microsoft Defender for Cloud

D.

Azure Bastion

Full Access
Question # 29

What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

automated investigation and remediation

B.

transport encryption

C.

shadow IT detection

D.

attack surface reduction

Full Access
Question # 30

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

SC-900 question answer

Full Access
Question # 31

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

SC-900 question answer

Full Access
Question # 32

What is a characteristic of a sensitivity label in Microsoft 365?

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Full Access
Question # 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 34

Which statement represents a Microsoft privacy principle?

A.

Microsoft does not collect any customer data.

B.

Microsoft uses hosted customer email and chat data for targeted advertising.

C.

Microsoft manages privacy settings for its customers.

D.

Microsoft respects the local privacy laws that are applicable to its customers.

Full Access
Question # 35

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 36

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

A.

applications

B.

network controls

C.

operating systems

D.

accounts and identities

Full Access
Question # 37

You need to keep a copy of all files in a Microsoft SharePoint site for one year, even if users delete the files from the site. What should you apply to the site?

A.

a data loss prevention (DLP) policy

B.

a retention policy

C.

an insider risk policy

D.

a sensitivity label policy

Full Access
Question # 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 39

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

A.

to control how often users must change their passwords

B.

to identify devices to which users can sign in without using multi-factor authentication (MFA)

C.

to encrypt a password by using globally recognized encryption standards

D.

to prevent users from using specific words in their passwords

Full Access
Question # 40

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 41

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 42

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Full Access
Question # 43

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 44

Which Microsoft Purview solution can be used to identify data leakage?

A.

insider risk management

B.

Compliance Manager

C.

communication compliance

D.

eDiscovery

Full Access
Question # 45

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 47

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 48

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 49

For each of the following statements, select Yes if the statement is true Otherwise, select No.

NOTE Each correct selection is worth one point.

SC-900 question answer

Full Access
Question # 50

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

A.

Windows 10 and newer only

B.

Windows 10 and newer and Android only

C.

Windows 10 and newer and macOS only

D.

Windows 10 and newer, Android, and macOS

Full Access
Question # 51

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 52

What can you use to deploy Azure resources across multiple subscriptions in a consistent manner?

A.

Microsoft Sentinel

B.

Microsoft Defender for Cloud

C.

Azure Policy

D.

Azure Blueprints

Full Access
Question # 53

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access
Question # 54

For each of the following statement, select Yes if the statement is true Otherwise, select No.

NOTE: Each connect selection a worth one point.

SC-900 question answer

Full Access
Question # 55

Select the answer that correctly completes the sentence.

SC-900 question answer

Full Access