Microsoft Security, Compliance, and Identity Fundamentals SC-900 Exam Practice Test

Page: 1 / 14
Total 209 questions
Question 1

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.



Answer : B, C, D


Question 2

What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?



Answer : D

Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction capability.


https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide

Question 3

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?



Answer : D


Question 4

What can you specify in Microsoft 365 sensitivity labels?



Question 5

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?



Answer : D

https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure

Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management: Provide just-in-time privileged access to Azure AD and Azure resources Assign time-bound access to resources using start and end dates Require approval to activate privileged roles Enforce multi-factor authentication to activate any role Use justification to understand why users activate Get notifications when privileged roles are activated Conduct access reviews to ensure users still need roles Download audit history for internal or external audit Prevents removal of the last active Global Administrator role assignment


Question 6

What is an example of encryption at rest?



Question 7

What do you use to provide real-time integration between Azure Sentinel and another security source?



Answer : D

To on-board Azure Sentinel, you first need to connect to your security sources. Azure Sentinel comes with a number of connectors for Microsoft solutions, including Microsoft 365 Defender solutions, and Microsoft 365 sources, including Office 365, Azure AD, Microsoft Defender for Identity, and Microsoft Cloud App Security, etc.


https://docs.microsoft.com/en-us/azure/sentinel/overview

Page:    1 / 14   
Total 209 questions