Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Microsoft SC-900 - Microsoft Security Compliance and Identity Fundamentals

Page: 2 / 7
Total 210 questions

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.

What can you use to view the Microsoft Secure Score for Devices?

A.

Microsoft Defender for Cloud Apps

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Office 365

Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?

A.

access reviews

B.

managed identities

C.

conditional access policies

D.

Azure AD Identity Protection

Which Microsoft Defender for Cloud metric displays the overall security health of an Azure subscription?

A.

resource health

B.

secure score

C.

the status of recommendations

D.

completed controls

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Select the answer that correctly completes the sentence.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Plan

B.

Manage

C.

Adopt

D.

Govern

E.

Define Strategy

Select the answer that correctly completes the sentence.

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Display policy tips to users who are about to violate your organization’s policies.

B.

Enable disk encryption on endpoints.

C.

Protect documents in Microsoft OneDrive that contain sensitive information.

D.

Apply security baselines to devices.