Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Microsoft SC-900 - Microsoft Security Compliance and Identity Fundamentals

Page: 1 / 7
Total 209 questions

Select the answer that correctly completes the sentence.

What can you use to ensure that all the users in a specific group must use multi-factor authentication (MFA) to sign in to Azure AD?

A.

Azure Policy

B.

a communication compliance policy

C.

a Conditional Access policy

D.

a user risk policy

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

A.

Microsoft Defender for Cloud

B.

Azure Blueprints

C.

Microsoft Sentinel

D.

Azure Policy

Which two types of devices can be managed by using Endpoint data loss prevention (Endpoint DLP)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Windows 11

B.

Linux

C.

iOS

D.

macOS

E.

Android

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Which Microsoft Purview solution can be used to identify data leakage?

A.

insider risk management

B.

Compliance Manager

C.

communication compliance

D.

eDiscovery

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Which feature is included in Microsoft Entra ID Governance?

A.

Verifiable credentials

B.

Permissions Management

C.

Identity Protection

D.

Privileged Identity Management

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?

A.

threat modeling

B.

identity as the security perimeter

C.

defense in depth

D.

the shared responsibility model