Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Microsoft Security Compliance and Identity Fundamentals Question and Answers

Microsoft Security Compliance and Identity Fundamentals

Last Update Sep 20, 2025
Total Questions : 209

We are offering FREE SC-900 Microsoft exam questions. All you do is to just go and sign up. Give your details, prepare SC-900 free exam questions and then go for complete pool of Microsoft Security Compliance and Identity Fundamentals test questions that will help you more.

SC-900 pdf

SC-900 PDF

$40.25  $114.99
SC-900 Engine

SC-900 Testing Engine

$47.25  $134.99
SC-900 PDF + Engine

SC-900 PDF + Testing Engine

$61.25  $174.99
Questions 1

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 2

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?

Options:

A.  

threat modeling

B.  

identity as the security perimeter

C.  

defense in depth

D.  

the shared responsibility model

Discussion 0
Questions 3

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Discussion 0
Questions 4

Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?

Options:

A.  

integration with the Microsoft 365 compliance center

B.  

support for threat hunting

C.  

integration with Microsoft 365 Defender

D.  

support for Azure Monitor Workbooks

Discussion 0
Questions 5

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 6

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 7

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 8

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Define the perimeter by physical locations.

B.  

Use identity as the primary security boundary.

C.  

Always verity the permissions of a user explicitly.

D.  

Always assume that the user system can be breached.

E.  

Use the network as the primary security boundary.

Discussion 0
Questions 9

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

Options:

A.  

sensitivity label policies

B.  

Customer Lockbox

C.  

C.  

information Barriers

D.  

Privileged Access Management (PAM)

Discussion 0
Questions 10

To which type of resource can Azure Bastion provide secure access?

Options:

A.  

Azure Files

B.  

Azure SQL Managed Instances

C.  

Azure virtual machines

D.  

Azure App Service

Discussion 0
Questions 11

Select The answer that correctly completes the sentence.

Options:

Discussion 0
Questions 12

What can you use to ensure that all the users in a specific group must use multi-factor authentication (MFA) to sign in to Azure AD?

Options:

A.  

Azure Policy

B.  

a communication compliance policy

C.  

a Conditional Access policy

D.  

a user risk policy

Discussion 0
Questions 13

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 14

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 16

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 18

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.  

persistent

B.  

encrypted

C.  

restricted to predefined categories

Discussion 0
Questions 19

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 20

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 21

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 22

What is an assessment in Compliance Manager?

Options:

A.  

A grouping of controls from a specific regulation, standard or policy.

B.  

Recommended guidance to help organizations align with their corporate standards.

C.  

A dictionary of words that are not allowed in company documents.

D.  

A policy initiative that includes multiple policies.

Discussion 0
Questions 23

You need to keep a copy of all files in a Microsoft SharePoint site for one year, even if users delete the files from the site. What should you apply to the site?

Options:

A.  

a data loss prevention (DLP) policy

B.  

a retention policy

C.  

an insider risk policy

D.  

a sensitivity label policy

Discussion 0
Questions 24

Which Microsoft Defender for Cloud metric displays the overall security health of an Azure subscription?

Options:

A.  

resource health

B.  

secure score

C.  

the status of recommendations

D.  

completed controls

Discussion 0
Questions 25

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 26

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 27

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Options:

A.  

Microsoft Defender for Cloud

B.  

Azure Blueprints

C.  

Microsoft Sentinel

D.  

Azure Policy

Discussion 0
Questions 28

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 29

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 30

What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

to discover and control the use of shadow IT

B.  

to provide secure connections to Azure virtual machines

C.  

to protect sensitive information hosted anywhere in the cloud

D.  

to provide pass-through authentication to on-premises applications

E.  

to prevent data leaks to noncompliant apps and limit access to regulated data

Discussion 0
Questions 31

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Discussion 0
Questions 32

What can be created in Active Directory Domain Services (AD DS)?

Options:

A.  

line-of-business (106) applications that require modem authentication

B.  

mob devices

C.  

computer accounts

D.  

software as a service (SaaS) applications that require modem authentication

Discussion 0
Questions 33

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 34

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 35

What should you use in the Microsoft Defender portal to view security trends and track the protection status of identities?

Options:

A.  

Secure score

B.  

Reports

C.  

Hunting

D.  

Incidents

Discussion 0
Questions 36

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 37

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 39

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Plan

B.  

Manage

C.  

Adopt

D.  

Govern

E.  

Define Strategy

Discussion 0
Questions 40

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 41

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

Options:

A.  

the Anomaly Detector service

B.  

Microsoft Sentinel

C.  

Azure Blueprints

D.  

Azure Policy

Discussion 0
Questions 42

NO: 73 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 43

What do you use to provide real-time integration between Azure Sentinel and another security source?

Options:

A.  

Azure AD Connect

B.  

a Log Analytics workspace

C.  

Azure Information Protection

D.  

a data connector

Discussion 0
Questions 44

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Discussion 0
Questions 45

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 46

You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.

in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.

Options:

Discussion 0
Questions 47

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 48

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 49

What can you protect by using the information protection solution in the Microsoft 365 compliance center?

Options:

A.  

computers from zero-day exploits

B.  

users from phishing attempts

C.  

files from malware and viruses

D.  

sensitive data from being exposed to unauthorized users

Discussion 0
Questions 50

Which portal contains the solution catalog?

Options:

A.  

Microsoft 365 Apps admin center

B.  

Microsoft 365 Defender portal

C.  

Microsoft 365 admin center

D.  

Microsoft Purview compliance portal

Discussion 0
Questions 51

Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

Options:

A.  

Microsoft Service Trust Portal

B.  

Compliance Manager

C.  

Microsoft 365 compliance center

D.  

Microsoft Support

Discussion 0
Questions 52

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Discussion 0
Questions 53

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 54

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.  

Windows 10 and iOS only

B.  

Windows 10 and Android only

C.  

Windows 10, Android, and iOS

D.  

Windows 10 only

Discussion 0
Questions 55

What are two reasons to deploy multiple virtual networks instead of using just one virtual network? Each correct answer presents a complete solution.

NOTE; Each correct selection is worth one point.

Options:

A.  

to separate the resources for budgeting

B.  

to meet Governance policies

C.  

to isolate the resources

D.  

to connect multiple types of resources

Discussion 0
Questions 56

What is a function of Conditional Access session controls?

Options:

A.  

prompting multi-factor authentication (MFA)

B.  

enable limited experiences, such as blocking download of sensitive information

C.  

enforcing device compliance

D.  

enforcing client app compliance

Discussion 0
Questions 57

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

Options:

A.  

Content Search

B.  

sensitivity labels

C.  

retention policies

D.  

eDiscovery

Discussion 0
Questions 58

You are evaluating the compliance score in Microsoft Purview Compliance Manager.

Match the compliance score action subcategories to the appropriate actions.

To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Discussion 0
Questions 59

Which pillar of identity relates to tracking the resources accessed by a user?

Options:

A.  

auditing

B.  

authorization

C.  

authentication

D.  

administration

Discussion 0
Questions 60

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Configure external access for partner organizations.

B.  

Export risk detection to third-party utilities.

C.  

Automate the detection and remediation of identity based-risks.

D.  

Investigate risks that relate to user authentication.

E.  

Create and automatically assign sensitivity labels to data.

Discussion 0
Questions 61

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

Options:

A.  

Windows 10 and newer only

B.  

Windows 10 and newer and Android only

C.  

Windows 10 and newer and macOS only

D.  

Windows 10 and newer, Android, and macOS

Discussion 0