Free SC-900 Exam Practice Questions
Practice for SC-900 Microsoft Security, Compliance, and Identity Fundamentals exam - disclaimer
-
Exam Code: SC-900
Exam Title: Microsoft Security, Compliance, and Identity Fundamentals - Exam Provider: Microsoft
- Total Exam Questions: 234
- Last Updated On: 27-May-2024
Exercise : Exam SC 900 Microsoft Security Compliance and Identity Fundamentals MCQ Questions and Answers
Question 1
An organization has developed an app to allow users to be able to sign in with their Facebook, Google, or Twitter credentials. What type of authentication is being used?
A. |
B. |
C. |
Correct Answer : B. Azure AD B2C
Description :
No answer description available for this question. Let us discuss.
Question 2
An organization has recently conducted a security audit and found that four people who have left were still active and assigned global admin roles. The users have now been deleted but the IT organization has been asked to recommend a solution to prevent a similar security lapse happening in future. Which solution should they recommend?
A. |
B. |
C. |
Correct Answer : A. Privileged Identity Management.
Description :
No answer description available for this question. Let us discuss.
Question 3
Which of the following is the process of checking if a signed-in user has access to a particular resource in Azure?
A. |
B. |
C. |
D. |
Correct Answer : D. Authorization
Description :
No answer description available for this question. Let us discuss.
Question 4
In a hybrid identity model, what can you use to sync identities between Active Directory Domain services and Azure Active Directory?
A. |
B. |
C. |
D. |
Correct Answer : D. Azure AD Connect
Description :
No answer description available for this question. Let us discuss.
Question 5
The compliance admin has been asked to use Advanced e-Discovery to help a legal team that is working on a case. What is the workflow the admin will use?
A. |
B. |
C. |
Correct Answer : A. Add custodians to a case, search custodial sources for relevant data, add data to a review set, review and analyze data, then finally export and download the case data.
Description :
No answer description available for this question. Let us discuss.
Question 6
Which of the following describes what an admin would need to select to view security cards grouped by risk, detection trends, configuration, and health, among others?
A. |
B. |
C. |
Correct Answer : C. Group by topic.
Description :
No answer description available for this question. Let us discuss.
Question 7
Within the organization, some emails are confidential and should be encrypted so that only authorized users can read them. How can this requirement be implemented?
A. |
B. |
C. |
Correct Answer : A. Use sensitivity labels
Description :
No answer description available for this question. Let us discuss.
Question 8
Which of the following would provide "Protection against large scale internet attacks"?
A. |
B. |
C. |
D. |
Correct Answer : A. Azure DDoS Protection
Description :
No answer description available for this question. Let us discuss.
Question 9
Match Microsoft 365 insider risk management workflow step to the appropriate task. "Create cases in the Case dashboard"
A. |
B. |
C. |
Correct Answer : C. Investigate
Description :
No answer description available for this question. Let us discuss.
Question 10
Your company is planning on using Azure Cloud services. They are looking at the different security aspects when it comes to Microsoft privacy. Is Shared Responsibility Model a key Microsoft privacy principal?
A. |
B. |
Correct Answer : A. False
Description :
No answer description available for this question. Let us discuss.