Microsoft Security, Compliance, and Identity Fundamentals SC-900 Exam Questions

Page: 1 / 14
Total 211 questions
Question 1

Which Microsoft Purview data classification type supports the use of regular expressions?



Answer : C

Sensitive Information Types (SITs) support regular expressions (regex), which allow for custom pattern matching to detect sensitive content like credit card numbers, social security numbers, or custom identifiers. Regex is fundamental to the detection logic within SITs.

SCI Extract: 'Sensitive information types use pattern matching techniques, including regular expressions, keyword matches, and checksums to identify sensitive data.'


Question 2

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?



Answer : C

Microsoft's SCI documentation explains that Information Barriers (part of Microsoft Purview and enforced across Microsoft Teams, SharePoint, OneDrive, and Exchange) are used to ''restrict communication and collaboration between specific groups of users to avoid conflicts of interest or to comply with regulatory obligations.'' Policies define which segments can communicate and which must be blocked, and they control chat, channel conversations, meetings, file sharing, and e-discovery visibility between the defined segments. Typical scenarios include preventing communication between investment banking and research, or between merger deal teams and the rest of the organization. This is fundamentally different from other features: Sensitivity label policies classify and protect content but do not block who can talk to whom; Customer Lockbox manages Microsoft engineer access to customer data during support; and Privileged Access Management (PAM) limits admin task approvals and elevated operations, not end-user communication. When the requirement is to ''restrict communication and the sharing of information between members of two departments,'' Microsoft prescribes Information Barriers as the purpose-built capability to enforce those restrictions across collaboration workloads.


Question 3

What can you use to provide threat detection for Azure SQL Managed Instance?



Answer : C

For Azure data services such as Azure SQL Managed Instance, Microsoft provides threat detection and protection through Microsoft Defender for Cloud (via Microsoft Defender for SQL). Microsoft documentation states that Defender for Cloud ''provides advanced threat protection for your SQL resources,'' including Azure SQL Database and Azure SQL Managed Instance, by ''continuously monitoring for anomalous activities and potential SQL injection, brute force, and exploitation attempts.'' When enabled, the plan ''generates security alerts when suspicious activities are detected,'' and these alerts can be surfaced in Defender for Cloud, forwarded to Microsoft Sentinel, or integrated with workflows for response. Microsoft Secure Score is a security posture metric, application security groups are for network segmentation in Azure, and Azure Bastion provides secure RDP/SSH over TLS---none of these deliver database-specific threat detection. Therefore, to provide threat detection for Azure SQL Managed Instance, you use Microsoft Defender for Cloud (Defender for SQL).


Question 4

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.



Answer : B, C, D

Microsoft's Zero Trust guidance in the Security, Compliance, and Identity (SCI) materials frames three core principles: ''Verify explicitly,'' ''Use least-privilege access,'' and ''Assume breach.'' The guidance explains that identity is the new control plane in cloud-based environments: identity becomes the primary security boundary, with access decisions evaluated continuously using signals such as user identity, device health, location, and risk. In Zero Trust, organizations must ''verify explicitly''---that is, require strong authentication and explicit authorization for every access request, not just initial logon, and base decisions on the permissions and context presented. The model also directs organizations to ''assume breach'', operating with the expectation that an attacker may already be inside the environment and therefore applying containment practices such as micro-segmentation, telemetry, and rapid detection and response. Conversely, the traditional notion of defining the perimeter by physical locations or network boundaries is explicitly rejected; the documentation emphasizes that network location is no longer a reliable trust signal and should not be treated as the primary boundary. Therefore, the statements that align with Microsoft's Zero Trust principles are: Use identity as the primary security boundary (B), Always verify user permissions explicitly (C), and Always assume the user/system can be breached (D).


Question 5

What is a function of Conditional Access session controls?



Answer : A

Conditional Access session controls enable user app access and sessions to be monitored and controlled in real time based on access and session policies.

Based on this definition, the best answer for your question isB. enable limited experiences, such as blocking download of sensitive information.

https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-session


Question 6

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?



Answer : C

Azure AD Privileged Identity Management (PIM) provides just-in-time privileged access to Azure AD and Azure resources


https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure

Question 7

What is an example of encryption at rest?



Answer : B

In Microsoft's SCI guidance, encryption at rest is defined as protecting data when it is stored on a disk or other persistent media. Microsoft describes it as controls that ''help safeguard your data to meet your organizational security and compliance commitments by encrypting data when it is persisted,'' distinguishing it from protections for data in transit. Within Azure and Microsoft 365, examples include Azure Disk Encryption for IaaS VMs (using BitLocker for Windows and DM-Crypt for Linux), server-side encryption for storage accounts, and Transparent Data Encryption for databases. A virtual machine's OS and data disks encrypted with BitLocker or DM-Crypt are canonical cases of at-rest encryption because the encryption keys protect the physical media; the data becomes unreadable if the disks are accessed outside the authorized context. By contrast, site-to-site VPN, HTTPS web sessions, and encrypted email protect data in transit---they secure network communications but do not encrypt the data where it is stored. Therefore, among the options provided, encrypting a virtual machine disk is the correct example of encryption at rest in Microsoft's security model.


Page:    1 / 14   
Total 211 questions