New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Microsoft SC-900 - Microsoft Security Compliance and Identity Fundamentals

Page: 4 / 7
Total 208 questions

Which two types of devices can be managed by using Endpoint data loss prevention (Endpoint DLP)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Windows 11

B.

Linux

C.

iOS

D.

macOS

E.

Android

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

To which three locations can a data loss prevention (DLP) policy be applied? Each correct answer presents a complete solution.

NOTE: Each correct answer is worth one point.

A.

Microsoft Exchange Online email

B.

Microsoft OneDrive accounts

C.

Microsoft Exchange Online public folders

D.

Microsoft Teams chat and channel messages

E.

Microsoft Viva Engage

Select the answer that correctly completes the sentence.

Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

fingerprint

B.

facial recognition

C.

PIN

D.

email verification

E.

security question

You need to create a data loss prevention (DLP) policy. What should you use?

A.

the Microsoft 365 admin center

B.

the Microsoft Endpoint Manager admin center

C.

the Microsoft 365 Defender portal

D.

the Microsoft 365 Compliance center

Select the answer that correctly completes the sentence.

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

A.

Microsoft Defender for Office 365

B.

Microsoft Defender Antivirus

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Endpoint

Match the types of Conditional Access signals to the appropriate definitions.

To answer, drag the appropriate Conditional Access signal type from the column on the left to its definition on the right. Each signal type may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

For each of the following statement, select Yes if the statement is true Otherwise, select No.

NOTE: Each connect selection a worth one point.