Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Microsoft Security Compliance and Identity Fundamentals Question and Answers

Microsoft Security Compliance and Identity Fundamentals

Last Update Apr 2, 2026
Total Questions : 210

We are offering FREE SC-900 Microsoft exam questions. All you do is to just go and sign up. Give your details, prepare SC-900 free exam questions and then go for complete pool of Microsoft Security Compliance and Identity Fundamentals test questions that will help you more.

SC-900 pdf

SC-900 PDF

$40.25  $114.99
SC-900 Engine

SC-900 Testing Engine

$47.25  $134.99
SC-900 PDF + Engine

SC-900 PDF + Testing Engine

$61.25  $174.99
Questions 1

What are two reasons to deploy multiple virtual networks instead of using just one virtual network? Each correct answer presents a complete solution.

NOTE; Each correct selection is worth one point.

Options:

A.  

to separate the resources for budgeting

B.  

to meet Governance policies

C.  

to isolate the resources

D.  

to connect multiple types of resources

Discussion 0
Questions 2

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 3

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Discussion 0
Questions 4

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

Options:

A.  

sensitivity label policies

B.  

Customer Lockbox

C.  

information Barriers

D.  

Privileged Access Management (PAM)

Discussion 0
Questions 5

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?

Options:

A.  

Attack simulator

B.  

Reports

C.  

Hunting

D.  

Incidents

Discussion 0
Questions 6

Select The answer that correctly completes the sentence.

Options:

Discussion 0
Questions 7

What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?

Options:

A.  

automated remediation

B.  

automated investigation

C.  

advanced hunting

D.  

network protection

Discussion 0
Questions 8

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 9

Which portal contains the solution catalog?

Options:

A.  

Microsoft 365 Apps admin center

B.  

Microsoft 365 Defender portal

C.  

Microsoft 365 admin center

D.  

Microsoft Purview compliance portal

Discussion 0
Questions 10

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 11

Which three authentication methods can Microsoft Entra users use to reset their password? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

text message to a phone

B.  

certificate

C.  

mobile app notification

D.  

security questions

E.  

picture password

Discussion 0
Questions 12

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 13

Which pillar of identity relates to tracking the resources accessed by a user?

Options:

A.  

auditing

B.  

authorization

C.  

authentication

D.  

administration

Discussion 0
Questions 14

Which statement represents a Microsoft privacy principle?

Options:

A.  

Microsoft does not collect any customer data.

B.  

Microsoft uses hosted customer email and chat data for targeted advertising.

C.  

Microsoft manages privacy settings for its customers.

D.  

Microsoft respects the local privacy laws that are applicable to its customers.

Discussion 0
Questions 15

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 16

Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Azure virtual machines

B.  

Azure Active Directory (Azure AD) users

C.  

Microsoft Exchange Online inboxes

D.  

Azure virtual networks

E.  

Microsoft SharePoint Online sites

Discussion 0
Questions 17

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 18

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Options:

A.  

phone call

B.  

text message (SMS)

C.  

email verification

D.  

Microsoft Authenticator app

E.  

security question

Discussion 0
Questions 19

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

Options:

A.  

applications

B.  

network controls

C.  

operating systems

D.  

accounts and identities

Discussion 0
Questions 20

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 21

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 22

What should you use in the Microsoft Defender portal to view security trends and track the protection status of identities?

Options:

A.  

Secure score

B.  

Reports

C.  

Hunting

D.  

Incidents

Discussion 0
Questions 23

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 24

Which solution performs security assessments and automatically generates alerts when a vulnerability is found?

Options:

A.  

cloud security posture management (CSPM)

B.  

DevSecOps

C.  

cloud workload protection platform (CWPP)

D.  

security information and event management (SIEM)

Discussion 0
Questions 25

What can be created in Active Directory Domain Services (AD DS)?

Options:

A.  

line-of-business (106) applications that require modem authentication

B.  

mob devices

C.  

computer accounts

D.  

software as a service (SaaS) applications that require modem authentication

Discussion 0
Questions 26

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 27

What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

to discover and control the use of shadow IT

B.  

to provide secure connections to Azure virtual machines

C.  

to protect sensitive information hosted anywhere in the cloud

D.  

to provide pass-through authentication to on-premises applications

E.  

to prevent data leaks to noncompliant apps and limit access to regulated data

Discussion 0
Questions 28

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 29

You have an Azure subscription that contains a Log Analytics workspace.

You need to onboard Microsoft Sentinel.

What should you do first?

Options:

A.  

Create a hunting query.

B.  

Correlate alerts into incidents.

C.  

Connect to your security sources.

D.  

Create a custom detection rule.

Discussion 0
Questions 30

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 31

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 32

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 33

What is a use case for implementing information barrier policies in Microsoft 365?

Options:

A.  

to restrict unauthenticated access to Microsoft 365

B.  

to restrict Microsoft Teams chats between certain groups within an organization

C.  

to restrict Microsoft Exchange Online email between certain groups within an organization

D.  

to restrict data sharing to external email recipients

Discussion 0
Questions 34

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 35

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 36

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 37

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 38

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

Options:

A.  

the Microsoft Endpoint Manager admin center

B.  

Azure Cost Management + Billing

C.  

Microsoft Service Trust Portal

D.  

the Azure Active Directory admin center

Discussion 0
Questions 39

What is a characteristic of a sensitivity label in Microsoft 365?

Options:

A.  

persistent

B.  

encrypted

C.  

restricted to predefined categories

Discussion 0
Questions 40

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Options:

Discussion 0
Questions 41

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 42

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

Options:

A.  

network security groups (NSGs)

B.  

Azure AD Privileged Identity Management (PIM)

C.  

conditional access policies

D.  

resource locks

Discussion 0
Questions 43

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Options:

Discussion 0
Questions 44

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 45

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 47

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 48

What feature supports email as a method of authenticating users?

Options:

A.  

Microsoft Entra ID Protection

B.  

Microsoft Entra Multi-Factor Authentication (MFA)

C.  

self-service password reset (SSPR)

D.  

Microsoft Entra Password Protection

Discussion 0
Questions 49

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 50

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 51

Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

fingerprint

B.  

facial recognition

C.  

PIN

D.  

email verification

E.  

security question

Discussion 0
Questions 52

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 53

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 54

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 55

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 56

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 57

Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

Options:

A.  

Microsoft Service Trust Portal

B.  

Compliance Manager

C.  

Microsoft 365 compliance center

D.  

Microsoft Support

Discussion 0
Questions 58

Select the answer that correctly completes the sentence.

Options:

Discussion 0
Questions 59

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 60

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

Options:

A.  

the management of mobile devices

B.  

the permissions for the user data stored in Azure

C.  

the creation and management of user accounts

D.  

the management of the physical hardware

Discussion 0
Questions 61

Which security feature is available in the free mode of Microsoft Defender for Cloud?

Options:

A.  

vulnerability scanning of virtual machines

B.  

secure score

C.  

just-in-time (JIT) VM access to Azure virtual machines

D.  

threat protection alerts

Discussion 0
Questions 62

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 63

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Options:

Discussion 0