Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Microsoft SC-900 - Microsoft Security Compliance and Identity Fundamentals

Page: 5 / 7
Total 210 questions

Select the answer that correctly completes the sentence.

Which Microsoft Purview data classification type supports the use of regular expressions?

A.

exact data match (EDM)

B.

fingerprint classifier

C.

sensitive information types (SlTs)

D.

trainable classifier

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

A.

retention policies

B.

data loss prevention (DLP) policies

C.

conditional access policies

D.

information barriers

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

You company is evaluating various security products, including a security information and event management (SIEM) solution. You need to provide information about the functionality of SIEM solutions. What is a function of a SIEM solution?

A.

the ability to review network activity and provide reports about which applications and services can communicate

B.

an alerting system that triggers an alert when users reach their Azure spending limit

C.

the ability to review logs and provide reports about malicious activity

D.

automated incident remediation

Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

A.

Microsoft Service Trust Portal

B.

Compliance Manager

C.

Microsoft 365 compliance center

D.

Microsoft Support

Select the answer that correctly completes the sentence.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.