Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

SC-900 Questions and Answers

Question # 6

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

A.

sensitivity label policies

B.

Customer Lockbox

C.

information Barriers

D.

Privileged Access Management (PAM)

Full Access
Question # 7

What can you use to provide threat detection for Azure SQL Managed Instance?

A.

Microsoft Secure Score

B.

application security groups

C.

Microsoft Defender for Cloud

D.

Azure Bastion

Full Access
Question # 8

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 9

Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

A.

Microsoft Service Trust Portal

B.

Compliance Manager

C.

Microsoft 365 compliance center

D.

Microsoft Support

Full Access
Question # 10

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 11

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

phone call

B.

text message (SMS)

C.

email verification

D.

Microsoft Authenticator app

E.

security question

Full Access
Question # 12

When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

All users must authenticate from a registered device.

B.

Administrators must always use Azure Multi-Factor Authentication (MFA).

C.

Azure Multi-Factor Authentication (MFA) registration is required for all users.

D.

All users must authenticate by using passwordless sign-in.

E.

All users must authenticate by using Windows Hello.

Full Access
Question # 13

Select the answer that correctly completes the sentence.

Full Access
Question # 14

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 15

Select the answer that correctly completes the sentence.

Full Access
Question # 16

Select the answer that correctly completes the sentence.

Full Access
Question # 17

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 18

Select the answer that correctly completes the sentence.

Full Access
Question # 19

What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

to discover and control the use of shadow IT

B.

to provide secure connections to Azure virtual machines

C.

to protect sensitive information hosted anywhere in the cloud

D.

to provide pass-through authentication to on-premises applications

E.

to prevent data leaks to noncompliant apps and limit access to regulated data

Full Access
Question # 20

Match the Microsoft Defender for Office 365 feature to the correct description.

To answer, drag the appropriate feature from the column on the left to its description on the right. Each feature may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Full Access
Question # 21

What can you use to view the Microsoft Secure Score for Devices?

A.

Microsoft Defender for Cloud Apps

B.

Microsoft Defender for Endpoint

C.

Microsoft Defender for Identity

D.

Microsoft Defender for Office 365

Full Access
Question # 22

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

A.

applications

B.

network controls

C.

operating systems

D.

accounts and identities

Full Access
Question # 23

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 24

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Configure external access for partner organizations.

B.

Export risk detection to third-party utilities.

C.

Automate the detection and remediation of identity based-risks.

D.

Investigate risks that relate to user authentication.

E.

Create and automatically assign sensitivity labels to data.

Full Access
Question # 25

What should you create to search and export content preserved in an eDiscovery hold?

A.

a Microsoft SharePoint Online site

B.

a case

C.

a Microsoft Exchange Online public folder

D.

Azure Files

Full Access
Question # 26

What is an example of encryption at rest?

A.

encrypting communications by using a site-to-site VPN

B.

encrypting a virtual machine disk

C.

accessing a website by using an encrypted HTTPS connection

D.

sending an encrypted email

Full Access
Question # 27

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point

Full Access
Question # 28

You are evaluating the compliance score in Microsoft Purview Compliance Manager.

Match the compliance score action subcategories to the appropriate actions.

To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Full Access
Question # 29

What is a use case for implementing information barrier policies in Microsoft 365?

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

Full Access
Question # 30

You have an Azure subscription.

You need to implement approval-based time-bound role activation.

What should you use?

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Conditional access

C.

Microsoft Entra Privileged Management

D.

Microsoft Entra Access Reviews

Full Access
Question # 31

Which Microsoft Purview solution can be used to identify data leakage?

A.

insider risk management

B.

Compliance Manager

C.

communication compliance

D.

eDiscovery

Full Access
Question # 32

Select the answer that correctly completes the sentence.

Full Access
Question # 33

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

A.

retention policies

B.

data loss prevention (DLP) policies

C.

conditional access policies

D.

information barriers

Full Access
Question # 34

Select the answer that correctly completes the sentence.

Full Access
Question # 35

What is a characteristic of a sensitivity label in Microsoft 365?

A.

persistent

B.

encrypted

C.

restricted to predefined categories

Full Access
Question # 36

What can you specify in Microsoft 365 sensitivity labels?

A.

how long files must be preserved

B.

when to archive an email message

C.

which watermark to add to files

D.

where to store files

Full Access
Question # 37

You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.

in which order should you list the service models from the most customer responsibility (on the top) to the least customer responsibility (on the bottom)? To answer, move all models from the list of models to the answer area and arrange them in the correct order.

Full Access
Question # 38

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 39

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 40

Select the answer that correctly completes the sentence.

Full Access
Question # 41

Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?

A.

Microsoft Secure Score

B.

Productivity Score

C.

Secure score in Azure Security Center

D.

Compliance score

Full Access
Question # 42

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 43

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

text message (SMS)

B.

Microsoft Authenticator app

C.

email verification

D.

phone call

E.

security question

Full Access
Question # 44

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

A.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

B.

Azure Multi-Factor Authentication (MFA)

C.

Azure Active Directory (Azure AD) Identity Protection

D.

conditional access policies

Full Access
Question # 45

What feature supports email as a method of authenticating users?

A.

Microsoft Entra ID Protection

B.

Microsoft Entra Multi-Factor Authentication (MFA)

C.

self-service password reset (SSPR)

D.

Microsoft Entra Password Protection

Full Access
Question # 46

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 47

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 48

You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?

A.

an SSH client

B.

PowerShell remoting

C.

the Azure portal

D.

the Remote Desktop Connection client

Full Access
Question # 49

Select the answer that correctly completes the sentence.

Full Access
Question # 50

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Full Access
Question # 51

You need to keep a copy of all files in a Microsoft SharePoint site for one year, even if users delete the files from the site. What should you apply to the site?

A.

a data loss prevention (DLP) policy

B.

a retention policy

C.

an insider risk policy

D.

a sensitivity label policy

Full Access
Question # 52

Select the answer that correctly completes the sentence.

Full Access
Question # 53

Select the answer that correctly completes the sentence.

Full Access
Question # 54

Select the answer that correctly completes the sentence.

Full Access
Question # 55

You have an Azure subscription that contains multiple resources.

You need to assess compliance and enforce standards for the existing resources.

What should you use?

A.

the Anomaly Detector service

B.

Microsoft Sentinel

C.

Azure Blueprints

D.

Azure Policy

Full Access
Question # 56

Select the answer that correctly completes the sentence.

Full Access
Question # 57

Select the answer that correctly completes the sentence.

Full Access