New Year Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Microsoft Security Compliance and Identity Fundamentals Question and Answers

Microsoft Security Compliance and Identity Fundamentals

Last Update Dec 30, 2025
Total Questions : 208

We are offering FREE SC-900 Microsoft exam questions. All you do is to just go and sign up. Give your details, prepare SC-900 free exam questions and then go for complete pool of Microsoft Security Compliance and Identity Fundamentals test questions that will help you more.

SC-900 pdf

SC-900 PDF

$40.25  $114.99
SC-900 Engine

SC-900 Testing Engine

$47.25  $134.99
SC-900 PDF + Engine

SC-900 PDF + Testing Engine

$61.25  $174.99
Questions 1

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 2

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

Options:

A.  

sensitivity label policies

B.  

Customer Lockbox

C.  

information Barriers

D.  

Privileged Access Management (PAM)

Discussion 0
Questions 3

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?

Options:

A.  

Audit

B.  

Compliance Manager

C.  

Content Search

D.  

Alerts

Discussion 0
Questions 4

You need to create a data loss prevention (DLP) policy. What should you use?

Options:

A.  

the Microsoft 365 admin center

B.  

the Microsoft Endpoint Manager admin center

C.  

the Microsoft 365 Defender portal

D.  

the Microsoft 365 Compliance center

Discussion 0
Questions 5

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 6

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 7

Match the Microsoft Defender for Office 365 feature to the correct description.

To answer, drag the appropriate feature from the column on the left to its description on the right. Each feature may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Discussion 0
Questions 8

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 9

What is an example of encryption at rest?

Options:

A.  

encrypting communications by using a site-to-site VPN

B.  

encrypting a virtual machine disk

C.  

accessing a website by using an encrypted HTTPS connection

D.  

sending an encrypted email

Discussion 0
Questions 10

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?

Options:

A.  

Attack simulator

B.  

Reports

C.  

Hunting

D.  

Incidents

Discussion 0
Questions 11

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 12

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 13

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 14

When you enable Azure AD Multi-Factor Authentication (MFA), how many factors are required for authentication?

Options:

A.  

1

B.  

2

C.  

3

D.  

4

Discussion 0
Questions 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 16

What should you use in the Microsoft Defender portal to view security trends and track the protection status of identities?

Options:

A.  

Secure score

B.  

Reports

C.  

Hunting

D.  

Incidents

Discussion 0
Questions 17

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 18

What can you protect by using the information protection solution in the Microsoft 365 compliance center?

Options:

A.  

computers from zero-day exploits

B.  

users from phishing attempts

C.  

files from malware and viruses

D.  

sensitive data from being exposed to unauthorized users

Discussion 0
Questions 19

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 20

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 21

Which Microsoft Defender for Cloud metric displays the overall security health of an Azure subscription?

Options:

A.  

resource health

B.  

secure score

C.  

the status of recommendations

D.  

completed controls

Discussion 0
Questions 22

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 23

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 24

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 25

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

Options:

A.  

network security groups (NSGs)

B.  

Azure AD Privileged Identity Management (PIM)

C.  

conditional access policies

D.  

resource locks

Discussion 0
Questions 26

Which two actions can you perform by using Azure Key Vault? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Store Azure Resource Manager (ARM) templates.

B.  

Implement Azure DDoS Protection.

C.  

Implement network security groups (NSGs).

D.  

Store keys.

E.  

Store secrets.

Discussion 0
Questions 27

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.  

Windows 10 and newer only

B.  

Windows 10 and newer and Android only

C.  

Windows 10 and newer and macOS only

D.  

Windows 10 and newer, Android, and macOS

Discussion 0
Questions 28

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 29

What do you use to provide real-time integration between Azure Sentinel and another security source?

Options:

A.  

Azure AD Connect

B.  

a Log Analytics workspace

C.  

Azure Information Protection

D.  

a data connector

Discussion 0
Questions 30

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Define the perimeter by physical locations.

B.  

Use identity as the primary security boundary.

C.  

Always verity the permissions of a user explicitly.

D.  

Always assume that the user system can be breached.

E.  

Use the network as the primary security boundary.

Discussion 0
Questions 31

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 32

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

Options:

A.  

the Microsoft Endpoint Manager admin center

B.  

Azure Cost Management + Billing

C.  

Microsoft Service Trust Portal

D.  

the Azure Active Directory admin center

Discussion 0
Questions 33

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 34

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 35

Select The answer that correctly completes the sentence.

Options:

Discussion 0
Questions 36

For each of the following statement, select Yes if the statement is true Otherwise, select No.

NOTE: Each connect selection a worth one point.

Options:

Discussion 0
Questions 37

Which Microsoft Purview data classification type supports the use of regular expressions?

Options:

A.  

exact data match (EDM)

B.  

fingerprint classifier

C.  

sensitive information types (SlTs)

D.  

trainable classifier

Discussion 0
Questions 38

What is an assessment in Compliance Manager?

Options:

A.  

A grouping of controls from a specific regulation, standard or policy.

B.  

Recommended guidance to help organizations align with their corporate standards.

C.  

A dictionary of words that are not allowed in company documents.

D.  

A policy initiative that includes multiple policies.

Discussion 0
Questions 39

You plan to move resources to the cloud.

You are evaluating the use of Infrastructure as a service (laaS),

Platform as a service (PaaS), and Software as a service (SaaS) cloud models.

You plan to manage only the data, user accounts, and user devices for a cloud-based app.

Which cloud model will you use?

Options:

A.  

IaaS

B.  

SaaS

C.  

PaaS

Discussion 0
Questions 40

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 41

What is a function of Conditional Access session controls?

Options:

A.  

prompting multi-factor authentication (MFA)

B.  

enable limited experiences, such as blocking download of sensitive information

C.  

enforcing device compliance

D.  

enforcing client app compliance

Discussion 0
Questions 42

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 43

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 44

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 45

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 47

What are two reasons to deploy multiple virtual networks instead of using just one virtual network? Each correct answer presents a complete solution.

NOTE; Each correct selection is worth one point.

Options:

A.  

to separate the resources for budgeting

B.  

to meet Governance policies

C.  

to isolate the resources

D.  

to connect multiple types of resources

Discussion 0
Questions 48

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 49

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

Options:

A.  

Microsoft Defender for Office 365

B.  

Microsoft Defender Antivirus

C.  

Microsoft Defender for Identity

D.  

Microsoft Defender for Endpoint

Discussion 0
Questions 50

Which compliance feature should you use to identify documents that are employee resumes?

Options:

A.  

pre-trained classifiers

B.  

Content explorer

C.  

Activity explorer

D.  

eDiscovery

Discussion 0
Questions 51

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 52

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 53

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.

Options:

Discussion 0
Questions 54

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Plan

B.  

Manage

C.  

Adopt

D.  

Govern

E.  

Define Strategy

Discussion 0
Questions 55

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 56

You have an Azure subscription.

You need to implement approval-based, tiProme-bound role activation.

What should you use?

Options:

A.  

Windows Hello for Business

B.  

Azure Active Directory (Azure AD) Identity Protection

C.  

access reviews in Azure Active Directory (Azure AD)

D.  

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Discussion 0
Questions 57

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 58

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 59

Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.  

a network interface

B.  

an Azure App Service web app

C.  

a virtual network

D.  

a virtual network subnet

E.  

a resource group

Discussion 0
Questions 60

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 61

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

Options:

A.  

applications

B.  

network controls

C.  

operating systems

D.  

accounts and identities

Discussion 0
Questions 62

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Discussion 0