New Year Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

SC-900 Microsoft Security Compliance and Identity Fundamentals Questions and Answers

Questions 4

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 5

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 7

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 8

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 9

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 10

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Buy Now
Questions 11

What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

to discover and control the use of shadow IT

B.

to provide secure connections to Azure virtual machines

C.

to protect sensitive information hosted anywhere in the cloud

D.

to provide pass-through authentication to on-premises applications

E.

to prevent data leaks to noncompliant apps and limit access to regulated data

Buy Now
Questions 12

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

Options:

A.

to control how often users must change their passwords

B.

to identify devices to which users can sign in without using multi-factor authentication (MFA)

C.

to encrypt a password by using globally recognized encryption standards

D.

to prevent users from using specific words in their passwords

Buy Now
Questions 13

What are two reasons to deploy multiple virtual networks instead of using just one virtual network? Each correct answer presents a complete solution.

NOTE; Each correct selection is worth one point.

Options:

A.

to separate the resources for budgeting

B.

to meet Governance policies

C.

to isolate the resources

D.

to connect multiple types of resources

Buy Now
Questions 14

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 16

Which two cards are available in the Microsoft 365 Defender portal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

Users at risk

B.

Compliance Score

C.

Devices at risk

D.

Service Health

E.

User Management

Buy Now
Questions 17

Which Microsoft Purview solution can be used to identify data leakage?

Options:

A.

insider risk management

B.

Compliance Manager

C.

communication compliance

D.

eDiscovery

Buy Now
Questions 18

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 19

In the shared responsibility model, for what is Microsoft responsible when managing Azure virtual machines?

Options:

A.

Updating the operating system.

B.

Configuring the permissions for shared folders.

C.

Updating the firmware of the disk controller.

D.

Updating installed applications.

Buy Now
Questions 20

What is a use case for implementing information barrier policies in Microsoft 365?

Options:

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

Buy Now
Questions 21

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 22

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 23

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 24

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Buy Now
Questions 25

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 26

What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?

Options:

A.

Azure Active Directory (Azure AD) Identity Protection

B.

a conditional access policy

C.

Azure role-based access control (Azure RBAC)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Buy Now
Questions 27

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 28

What do you use to provide real-time integration between Azure Sentinel and another security source?

Options:

A.

Azure AD Connect

B.

a Log Analytics workspace

C.

Azure Information Protection

D.

a data connector

Buy Now
Questions 29

Which compliance feature should you use to identify documents that are employee resumes?

Options:

A.

pre-trained classifiers

B.

Content explorer

C.

Activity explorer

D.

eDiscovery

Buy Now
Questions 30

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 31

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 32

When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

All users must authenticate from a registered device.

B.

Administrators must always use Azure Multi-Factor Authentication (MFA).

C.

Azure Multi-Factor Authentication (MFA) registration is required for all users.

D.

All users must authenticate by using passwordless sign-in.

E.

All users must authenticate by using Windows Hello.

Buy Now
Questions 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 34

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 35

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 36

To which three locations can a data loss prevention (DLP) policy be applied? Each correct answer presents a complete solution.

NOTE: Each correct answer is worth one point.

Options:

A.

Microsoft Exchange Online email

B.

Microsoft OneDrive accounts

C.

Microsoft Exchange Online public folders

D.

Microsoft Teams chat and channel messages

E.

Microsoft Viva Engage

Buy Now
Questions 37

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Buy Now
Questions 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 39

What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

automated investigation and remediation

B.

transport encryption

C.

shadow IT detection

D.

attack surface reduction

Buy Now
Questions 40

What can you use to ensure that all the users in a specific group must use multi-factor authentication (MFA) to sign in to Azure AD?

Options:

A.

Azure Policy

B.

a communication compliance policy

C.

a Conditional Access policy

D.

a user risk policy

Buy Now
Questions 41

What can you use to protect against malicious links sent in email messages, chat messages, and channels?

Options:

A.

Microsoft Defender for Identity

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Cloud Apps

D.

Microsoft Defender for Office 365

Buy Now
Questions 42

Match the types of compliance score actions to the appropriate tasks.

To answer. drag the appropriate action type from the column on the left to its task on the right. Each type may be used once. more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Buy Now
Questions 43

What should you create to search and export content preserved in an eDiscovery hold?

Options:

A.

a Microsoft SharePoint Online site

B.

a case

C.

a Microsoft Exchange Online public folder

D.

Azure Files

Buy Now
Questions 44

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 45

To which type of resource can Azure Bastion provide secure access?

Options:

A.

Azure Files

B.

Azure SQL Managed Instances

C.

Azure virtual machines

D.

Azure App Service

Buy Now
Questions 46

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 47

What can be created in Active Directory Domain Services (AD DS)?

Options:

A.

line-of-business (106) applications that require modem authentication

B.

mob devices

C.

computer accounts

D.

software as a service (SaaS) applications that require modem authentication

Buy Now
Questions 48

completes the sentence.

Options:

Buy Now
Questions 49

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 50

What is an example of encryption at rest?

Options:

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Buy Now
Questions 51

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 52

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 53

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 54

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Questions 55

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

Options:

A.

network security groups (NSGs)

B.

Azure AD Privileged Identity Management (PIM)

C.

conditional access policies

D.

resource locks

Buy Now
Questions 56

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?

Options:

A.

Attack simulator

B.

Reports

C.

Hunting

D.

Incidents

Buy Now
Questions 57

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Plan

B.

Manage

C.

Adopt

D.

Govern

E.

Define Strategy

Buy Now
Questions 58

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 59

Select the answer that correctly completes the sentence.

Options:

Buy Now
Questions 60

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

Options:

A.

the management of mobile devices

B.

the permissions for the user data stored in Azure

C.

the creation and management of user accounts

D.

the management of the physical hardware

Buy Now
Questions 61

You have an Azure subscription.

You need to implement approval-based, tiProme-bound role activation.

What should you use?

Options:

A.

Windows Hello for Business

B.

Azure Active Directory (Azure AD) Identity Protection

C.

access reviews in Azure Active Directory (Azure AD)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Buy Now
Questions 62

Select the answer that correctly completes the sentence.

Options:

Buy Now
Exam Code: SC-900
Exam Name: Microsoft Security Compliance and Identity Fundamentals
Last Update: Dec 31, 2025
Questions: 208
SC-900 pdf

SC-900 PDF

$28.5  $94.99
SC-900 Engine

SC-900 Testing Engine

$33  $109.99
SC-900 PDF + Engine

SC-900 PDF + Testing Engine

$43.5  $144.99