Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

SC-900 Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Questions 4

Which two types of devices can be managed by using Endpoint data loss prevention (Endpoint DLP)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Windows 11

B.

Linux

C.

iOS

D.

macOS

E.

Android

Buy Now
Questions 5

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 7

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 8

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 9

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 10

Which two cards are available in the Microsoft 365 Defender portal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

Users at risk

B.

Compliance Score

C.

Devices at risk

D.

Service Health

E.

User Management

Buy Now
Questions 11

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 12

Match the types of compliance score actions to the appropriate tasks.

To answer. drag the appropriate action type from the column on the left to its task on the right. Each type may be used once. more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 13

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 14

When you enable Azure AD Multi-Factor Authentication (MFA), how many factors are required for authentication?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 15

You need to create a data loss prevention (DLP) policy. What should you use?

Options:

A.

the Microsoft 365 admin center

B.

the Microsoft Endpoint Manager admin center

C.

the Microsoft 365 Defender portal

D.

the Microsoft 365 Compliance center

Buy Now
Questions 16

You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?

Options:

A.

an SSH client

B.

PowerShell remoting

C.

the Azure portal

D.

the Remote Desktop Connection client

Buy Now
Questions 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 18

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

Options:

A.

network security groups (NSGs)

B.

Azure AD Privileged Identity Management (PIM)

C.

conditional access policies

D.

resource locks

Buy Now
Questions 19

What can you use to provide threat detection for Azure SQL Managed Instance?

Options:

A.

Microsoft Secure Score

B.

application security groups

C.

Microsoft Defender for Cloud

D.

Azure Bastion

Buy Now
Questions 20

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 21

You are evaluating the compliance score in Microsoft Purview Compliance Manager.

Match the compliance score action subcategories to the appropriate actions.

To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 22

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 23

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 24

You have an Azure subscription.

You need to implement approval-based time-bound role activation.

What should you use?

Options:

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Conditional access

C.

Microsoft Entra Privileged Management

D.

Microsoft Entra Access Reviews

Buy Now
Questions 25

Which compliance feature should you use to identify documents that are employee resumes?

Options:

A.

pre-trained classifiers

B.

Content explorer

C.

Activity explorer

D.

eDiscovery

Buy Now
Questions 26

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 27

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

Options:

A.

applications

B.

network controls

C.

operating systems

D.

accounts and identities

Buy Now
Questions 28

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Configure external access for partner organizations.

B.

Export risk detection to third-party utilities.

C.

Automate the detection and remediation of identity based-risks.

D.

Investigate risks that relate to user authentication.

E.

Create and automatically assign sensitivity labels to data.

Buy Now
Questions 29

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 30

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 31

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 32

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Buy Now
Questions 34

Which type of identity is created when you register an application with Active Directory (Azure AD)?

Options:

A.

a user account

B.

a user-assigned managed identity

C.

a system-assigned managed identity

D.

a service principal

Buy Now
Questions 35

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 36

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 37

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 38

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Display policy tips to users who are about to violate your organization’s policies.

B.

Enable disk encryption on endpoints.

C.

Protect documents in Microsoft OneDrive that contain sensitive information.

D.

Apply security baselines to devices.

Buy Now
Questions 39

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Buy Now
Questions 40

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.

Windows 10 and newer only

B.

Windows 10 and newer and Android only

C.

Windows 10 and newer and macOS only

D.

Windows 10 and newer, Android, and macOS

Buy Now
Questions 41

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 42

Which Microsoft Purview feature allows users to identify content that should be protected?

Options:

A.

Sensitivity Labels

B.

Insider Risks

C.

Data Loss prevention

D.

eDiscovery

Buy Now
Questions 43

Which solution performs security assessments and automatically generates alerts when a vulnerability is found?

Options:

A.

cloud security posture management (CSPM)

B.

DevSecOps

C.

cloud workload protection platform (CWPP)

D.

security information and event management (SIEM)

Buy Now
Questions 44

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?

Options:

A.

Attack simulator

B.

Reports

C.

Hunting

D.

Incidents

Buy Now
Questions 45

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 46

Match the Microsoft Defender for Office 365 feature to the correct description.

To answer, drag the appropriate feature from the column on the left to its description on the right. Each feature may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 47

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

Options:

A.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

B.

Azure Multi-Factor Authentication (MFA)

C.

Azure Active Directory (Azure AD) Identity Protection

D.

conditional access policies

Buy Now
Questions 48

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 49

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Buy Now
Questions 50

Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

fingerprint

B.

facial recognition

C.

PIN

D.

email verification

E.

security question

Buy Now
Questions 51

Which security feature is available in the free mode of Microsoft Defender for Cloud?

Options:

A.

vulnerability scanning of virtual machines

B.

secure score

C.

just-in-time (JIT) VM access to Azure virtual machines

D.

threat protection alerts

Buy Now
Questions 52

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 53

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Buy Now
Questions 54

ON NO: 27 HOTSPOT

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 55

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Define the perimeter by physical locations.

B.

Use identity as the primary security boundary.

C.

Always verity the permissions of a user explicitly.

D.

Always assume that the user system can be breached.

E.

Use the network as the primary security boundary.

Buy Now
Questions 56

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 57

What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?

Options:

A.

Azure Active Directory (Azure AD) Identity Protection

B.

a conditional access policy

C.

Azure role-based access control (Azure RBAC)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Buy Now
Questions 58

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 59

Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Azure virtual machines

B.

Azure Active Directory (Azure AD) users

C.

Microsoft Exchange Online inboxes

D.

Azure virtual networks

E.

Microsoft SharePoint Online sites

Buy Now
Questions 60

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 61

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Exam Code: SC-900
Exam Name: Microsoft Security Compliance and Identity Fundamentals
Last Update: Aug 15, 2025
Questions: 205
SC-900 pdf

SC-900 PDF

$33.25  $94.99
SC-900 Engine

SC-900 Testing Engine

$38.5  $109.99
SC-900 PDF + Engine

SC-900 PDF + Testing Engine

$50.75  $144.99