New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Microsoft SC-900 - Microsoft Security Compliance and Identity Fundamentals

Page: 6 / 7
Total 208 questions

Select The answer that correctly completes the sentence.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

A.

applications

B.

network controls

C.

operating systems

D.

accounts and identities

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Which security feature is available in the free mode of Microsoft Defender for Cloud?

A.

vulnerability scanning of virtual machines

B.

secure score

C.

just-in-time (JIT) VM access to Azure virtual machines

D.

threat protection alerts

Select the answer that correctly completes the sentence.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?

A.

automated remediation

B.

automated investigation

C.

advanced hunting

D.

network protection

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

A.

sensitivity label policies

B.

Customer Lockbox

C.

information Barriers

D.

Privileged Access Management (PAM)

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy