SC-900 Preparation Exam (2023)

All Azure Active Directory (Azure AD) license editions include the same features.
Yes
No
You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal.
Yes
No
You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant.
Yes
No
_______________ provides best practices from Microsoft employees, partners, and customers, including tools and guidance to assist in an Azure deployment.
__________ is used to identify, hold, and export electronic information that might be used in an investigation.
You can manage Microsoft Intune by using the _____________.
Federation is used to establish __________ between organizations.
Applying system updates increases an organization's secure score in Azure Security Center.
Yes
No
The secure score in Azure Security Center can evaluate resources across multiple Azure subscriptions.
Yes
No
Enabling multi-factor authentication (MFA) increases an organization's secure score in Azure Security Center.
Yes
No
Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?
A. Microsoft Secure Score
B. Productivity Score
C. Secure score in Azure Security Center
D. Compliance Score
What do you use to provide real-time integration between Azure Sentinel and another security source?
A. Azure AD Connect
B. a Log Analytics workspace
C. Azure Information Protection
D. A connector
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?
A. the Microsoft Endpoint Manager admin center
B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
A. The management of mobile devices
B. The permissions for the user data stored in Azure
C. The creation and management of user accounts
D. The management of the physical hardware
Verify explicitly is one of the guiding principles of Zero Trust.
Yes
No
Assume breach is one of the guiding principles of Zero Trust.
Yes
No
The Zero Trust security model assumes that a firewall secures the internal network from external threats.
Yes
No
Control is a key privacy principle of Microsoft.
Yes
No
Transparency is a key privacy principle of Microsoft.
Yes
No
Shared responsibility is a key privacy principle of Microsoft.
Yes
No
______ a file makes the data in the file readable and usable to viewers that have the appropriate key.
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
B. Azure Multi-Factor Authentication (MFA)
C. Azure Active Directory (Azure AD) Identity Protection
D. Conditional access policies
N a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?
A. Active Directory Federation Services (AD FS)
B. Azure Sentinel
C. Azure AD Connect
D. Azure Ad Privileged Identity Management (PIM)
You can create custom roles in Azure Active Directory (Azure AD).
Yes
No
Global administrator is a role in Azure Active Directory (Azure AD).
Yes
No
An Azure Active Directory (Azure AD) user can be assigned only one role.
Yes
No
Azure Active Directory (Azure AD) is deployed to an on-premises environment.
Yes
No
Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription.
Yes
No
Azure Active Directory (Azure AD) is an identity and access management service.
Yes
No
With Windows Hello for Business, a user's biometric data used for authentication
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
A. To control how often users must change their passwords
B. To identify devices to which users can sign in without using multi-factor authentication (MFA)
C. To encrypt a password by using globally recognized encryption standards
D. To prevent users from using specific words in their passwords
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?
A. Access reviews
B. Managed identities
C. Conditional access policies
D. Azure AD Identity Protection
________ requires additional verification, such as verification code sent to a mobile phone.
Conditional access policies can use the device state as a signal.
Yes
No
Conditional access policies apply before first-factor authentication is complete.
Yes
No
Conditional access policies can trigger multi-factor authentication (MFA) if a user attempts to access a specific application.
Yes
No
_______ is a cloud-based solution that leverages on-premises Active Directory signals to identify, detect, and investigate advanced threats.
Microsoft Defender for Identity can identify advanced threats from ______________ signals.
Azure Active Directory (Azure AD) is _________ used for authentication and authorization.
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
A. Conditional access policies
B. Azure AD Identity Protection
C. Azure AD Privileged Identity Management (PIM)
D. Authentication method policies
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
A. Text message (SMS)
B. Microsoft Authenticator app
C. Email verification
D. Phone call
E. Security question
________ can use conditional access policies to control sessions in real time.
Azure DDoS Protection Standard can be used to protect ___________ .
What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?
A. Attack simulator
B. Reports
C. Hunting
D. Incidents
You can use _______ in the Microsoft 365 security center to identify devices that are affected by an alert.
What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.
A. Automated investigation and remediation
B. Transport encryption
C. shadow IT detection
D. Attack surface reduction
_______ Provides Network Address Translation (NAT) services.
Azure Bastion
Azure Firewall
Network security group (NSG)
_______ Provides secure and seamless Remote Desktop connectivity to Azure virtual machines.
Azure Bastion
Azure Firewall
Network security group (NSG)
_______ Provides traffic filtering that can be applied to specific network interfaces on a virtual network.
Azure Bastion
Azure Firewall
Network security group (NSG)
________ is a cloud-native security information and event management (SIEM) and security orchestration automated response (SOAR) solution used to provide a single solution for alert detection, threat visibility, proactive hunting and threat response.
Azure Defender can detect vulnerabilities and threats for Azure Storage.
Yes
No
Cloud Security Posture Management (CPSM) is available for all Azure subscriptions.
Yes
No
Azure Security Center can evaluate the security of workloads deployed to Azure or on-premises.
Yes
No
You can use ________ in the Microsoft 365 security center to view an aggregation of alerts that relate to the same attack.
With Advanced Audit in Microsoft 365, you can identify when email items were accessed.
Yes
No
Advanced Audit in Microsoft 365 supports the same retention period of audit logs as core auditing.
Yes
No
Advanced Audit in Microsoft 365 allocates customer-dedicated bandwidth for accessing audit data.
Yes
No
Azure Active Directory (Azure AD) Identity Protection can add users to groups based on the users' risk level.
Yes
No
Azure Active Directory (Azure AD) Identity Protection can detect whether user credentials were leaked to the public.
Yes
No
Azure Active Directory (Azure AD) Identity Protection can be used to invoke Multi-Factor Authentication based on a user's risk level.
Yes
No
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?
A. Audit
B. Compliance Manager
C. Content Search
D. Alerts
Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.
A. Display policy tips to users who are about to violate your organization’s policies.
B. Enable disk encryption on endpoints.
C. Protect documents in Microsoft OneDrive that contain sensitive information.
D. Apply security baselines to devices.
Compliance Manager assesses compliance data __________ for an organization.
Sensitivity labels can be used to encrypt documents.
Yes
No
Sensitivity labels can add headers and footers to documents.
Yes
No
Sensitivity labels can apply watermarks to emails.
Yes
No
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?
A. Content Search
B. Sensitivity labels
C. Retention policies
D. eDiscovery
Compliance Manager tracks only customer-managed controls.
Yes
No
Compliance Manager provides predefined templates for creating assessments.
Yes
No
Compliance Manager can help you assess whether data adheres to specific data protection standards.
Yes
No
Azure Policy supports automatic remediation.
Yes
No
Azure Policy can be used to ensure that new resources adhere to corporate standards.
Yes
No
Compliance evaluation in Azure Policy occurs only when a target resource is created or modified.
Yes
No
What is a use case for implementing information barrier policies in Microsoft 365?
A. To restrict unauthenticated access to Microsoft 365
B. To restrict Microsoft Teams chats between certain groups within an organization
C. To restrict Microsoft Exchange Online email between certain groups within an organization
D. To restrict data sharing to external email recipients
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
A. Azure Defender
B. Azure Blueprints
C. Azure Sentinel
D. Azure Policy
{"name":"SC-900 Preparation Exam (2023)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"All Azure Active Directory (Azure AD) license editions include the same features., You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal., You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.