Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions
Advanced Sample Questions
Which of the following is NOT a component of the Microsoft 365 security and compliance center?
- a. Threat protection
- b. Data loss prevention
- c. Network security
- d. Information protection
Answer: c. Network security
Explanation: The Microsoft 365 security and compliance center provides a range of security and compliance solutions, including threat protection, data loss prevention, and information protection. However, it does not provide network security solutions.
What is the purpose of Azure Active Directory (AD)?
- a. To provide on-premises directory and identity management
- b. To provide cloud-based directory and identity management
- c. To provide virtual machine management
- d. To provide storage solutions
Answer: b. To provide cloud-based directory and identity management
Explanation: Azure Active Directory is a cloud-based directory and identity management solution provided by Microsoft. It enables organizations to manage user identities and provide access to resources.
Reference: https://azure.microsoft.com/en-us/services/active-directory/
Which of the following is NOT a security measure provided by Microsoft 365?
- a. Multi-factor authentication
- b. Mobile device management
- c. Data backup and recovery
- d. Endpoint protection
Answer: c. Data backup and recovery
Explanation: Microsoft 365 provides a range of security measures, including multi-factor authentication, mobile device management, and endpoint protection. However, it does not provide data backup and recovery solutions.
What is the purpose of Microsoft Cloud App Security?
- a. To provide cloud application discovery and risk assessment
- b. To provide network security
- c. To provide data backup and recovery
- d. To provide virtual machine management
Answer: a. To provide cloud application discovery and risk assessment
Explanation: Microsoft Cloud App Security is a cloud security solution that provides discovery and risk assessment of cloud applications used in an organization. It helps to ensure that these applications are used in a secure and compliant manner.
Reference: https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security
What is the purpose of the Microsoft 365 Compliance Center?
- a. To provide information protection and governance solutions
- b. To provide virtual machine management
- c. To provide data backup and recovery
- d. To provide network security
Answer: a. To provide information protection and governance solutions
Explanation: The Microsoft 365 Compliance Center provides information protection and governance solutions for organizations using Microsoft 365. It helps organizations to meet their legal, regulatory, and organizational compliance requirements.
What is the purpose of Azure Information Protection?
- a. To provide data backup and recovery solutions
- b. To provide network security
- c. To classify and protect sensitive information
- d. To provide virtual machine management
Answer: c. To classify and protect sensitive information
Explanation: Azure Information Protection is a solution that helps organizations classify and protect sensitive information by allowing them to label and encrypt sensitive data. This helps organizations meet their compliance and security requirements.
Reference: https://azure.microsoft.com/en-us/services/information-protection/
What is the purpose of Microsoft Intune?
- a. To provide data backup and recovery solutions
- b. To provide network security
- c. To manage and secure mobile devices
- d. To provide virtual machine management
Answer: c. To manage and secure mobile devices
Explanation: Microsoft Intune is a cloud-based mobile device management solution that helps organizations manage and secure mobile devices used by employees. It provides features such as device management, app management, and security management.
Reference: https://docs.microsoft.com/en-us/intune/
What is the purpose of Microsoft Defender for Endpoint?
- a. To provide data backup and recovery solutions
- b. To provide network security
- c. To provide threat protection for endpoints
- d. To provide virtual machine management
Answer: c. To provide threat protection for endpoints
Explanation: Microsoft Defender for Endpoint is a solution that provides threat protection for endpoints such as computers and mobile devices. It uses machine learning and other advanced security technologies to protect against threats such as viruses, malware, and unauthorized access.
What is the purpose of Microsoft Defender for Office 365?
- a. To provide data backup and recovery solutions
- b. To provide network security
- c. To protect against threats to email and collaboration tools
- d. To provide virtual machine management
Answer: c. To protect against threats to email and collaboration tools
Explanation: Microsoft Defender for Office 365 is a solution that helps protect against threats to email and collaboration tools such as Exchange Online and SharePoint Online. It uses machine learning and other security technologies to protect against email-based threats such as phishing and malware.
What is the purpose of Azure AD Premium P2?
- a. To provide data backup and recovery solutions
- b. To provide network security
- c. To provide advanced identity and access management features
- d. To provide virtual machine management
Answer: c. To provide advanced identity and access management features
Explanation: Azure AD Premium P2 is a version of Azure Active Directory that provides advanced identity and access management features, such as multi-factor authentication, access reviews, and identity protection. These features help organizations to meet their security and compliance requirements.
Reference: https://azure.microsoft.com/en-us/pricing/details/active-directory/
Basic Sample Questions
Question 1 – As the first line of defense against cyber threats, what feature of Microsoft Defender for Endpoint reduces the attack surface?
- A. automated remediation
- B. automated investigation
- C. advanced hunting
- D. network protection
Correct Answer: D
Question 2 – What score is used to assess an organization’s progress when it comes to reducing the risks associated with data protection and regulatory compliance?
- A. Microsoft Secure Score
- B. Productivity Score
- C. Secure score in Azure Security Center
- D. Compliance score
Correct Answer: D
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide
Question 3 – In order to provide real-time integration between Azure Sentinel and another security source, what do you use?
- A. Azure AD Connect
- B. a Log Analytics workspace
- C. Azure Information Protection
- D. a connector
Correct Answer: D
Reference: https://docs.microsoft.com/en-us/azure/sentinel/overview
Question 4 – In which Microsoft portal can you find information about how Microsoft cloud services are compliant with regulatory standards, such as International Organization for Standardization (ISO)?
- A. the Microsoft Endpoint Manager admin center
- B. Azure Cost Management + Billing
- C. Microsoft Service Trust Portal
- D. the Azure Active Directory admin center
Correct Answer: C
Question 5 – Microsoft is solely responsible for what in the shared responsibility model for an Azure deployment?
- A. managing mobile devices
- B. permissions for the user data stored in Azure
- C. creating and managing user accounts
- D. managing the physical hardware
Correct Answer: D
Question 6 – Which two of the given types of resources are protected by using Azure Firewall?
- A. Azure virtual machines
- B. Azure Active Directory (Azure AD) users
- C. Microsoft Exchange Online inboxes
- D. Azure virtual networks
- E. Microsoft SharePoint Online sites
Correct Answer: DE
Question 7 – Implementing a security strategy and setting up multiple layers of defense throughout a network infrastructure is on your list of to-dos. Which of the following security methodology does this represent?
- A. threat modeling
- B. identity as the security perimeter
- C. defense in depth
- D. the shared responsibility model
Correct Answer: C
Question 8 – Is there a tool available for scanning email attachments and forwarding them only if they’re malware-free?
- A. Microsoft Defender for Office 365
- B. Microsoft Defender Antivirus
- C. Microsoft Defender for Identity
- D. Microsoft Defender for Endpoint
Correct Answer: A
Question 9 – Azure Sentinel provides extended detection and response (XDR) capabilities through which feature?
- A. integration with the Microsoft 365 compliance center
- B. support for threat hunting
- C. integration with Microsoft 365 Defender
- D. support for Azure Monitor Workbooks
Correct Answer: C
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/eval-overview?view=o365-worldwide
Question 10 – What threat detection methods can you use with Azure SQL Managed Instances?
- A. Microsoft Secure Score
- B. application security groups
- C. Microsoft Defender for Cloud
- D. Azure Bastion
Correct Answer: C
Question 11 – Microsoft Intune-managed devices cannot access corporate resources through which Azure Active Directory feature?
- A. network security groups (NSGs)
- B. Azure AD Privileged Identity Management (PIM)
- C. conditional access policies
- D. resource locks
Correct Answer: C
Question 12 – What are the two phases that precede the Ready phase in the Microsoft Cloud Adoption Framework for Azure?
- A. Plan
- B. Manage
- C. Adopt
- D. Govern
- E. Define Strategy
Correct Answer: AE
Reference: https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview
Question 13 – HOTSPOT – Choose Yes if the statement is true for each. If not, select No.
Hot Area:
Statements | Yes/No |
Applying system updates increases an organization’s secure score in Microsoft Defender for Cloud | |
The secure score in Microsoft Defender for Cloud can evaluate resources across multiple azure subscriptions | |
Enabling multi-factor authentication (MFA) increases an organization’s secure score in Microsoft Defender for Cloud |
Correct Answer:
Statements | Yes/No |
Applying system updates increase an organization’s secure score in Microsoft Defender for Cloud | Yes |
The secure score in Microsoft Defender for Cloud can evaluate resources across multiple azure subscriptions | Yes |
Enabling multi-factor authentication (MFA) increases an organization’s secure score in Microsoft Defender for Cloud | Yes |
Reference: https://docs.microsoft.com/en-us/azure/security-center/secure-score-security-controls
Question 14 – HOTSPOT – Choose Yes if the statement is true for each. If not, select No.
Hot Area:
Statements | Yes/No |
All Azure Active Directory (Azure AD) license editions include the same features | |
You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal | |
You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant |
Correct Answer:
Statements | Yes/No |
All Azure Active Directory (Azure AD) license editions include the same features | NO |
You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal | YES |
You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant | NO |
Question 15 – HOTSPOT – Select the answer that correctly completes the sentence.
Hot Area:
Azure blueprints | Provides best practices from Microsft employees, partners, and customers, including tools and guidance to assist in an Azure deployment |
Azure policy | |
The Microsoft Cloud Adoption Framework for Azure | |
A resource lock |
Correct Answer:
Azure blueprints | Provides best practices from Microsft employees, partners, and customers, including tools and guidance to assist in an Azure deployment |
Azure policy | |
The Microsoft Cloud Adoption Framework for Azure | |
A resource lock |
Reference: https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/get-started/
Question 16 – HOTSPOT – Select the answer that correctly completes the sentence.
Hot Area:
Customer lockbox | Is used to identify, hold, and export electronic information that might be used in an investigation |
Data loss prevention (DLP) | |
eDiscovery | |
A resource lock |
Correct Answer:
Customer lockbox | Is used to identify, hold, and export electronic information that might be used in an investigation |
Data loss prevention (DLP) | |
eDiscovery | |
A resource lock |
Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview
Question 17 – HOTSPOT – Select the answer that correctly completes the sentence.
Hot Area:
Federation is used to establish | between organizations | |
Multi-factor authentication (MFA) | ||
A trust relationship | ||
User account synchronization | ||
A VPN connection |
Correct Answer:
Federation is used to establish | between organizations | |
Multi-factor authentication (MFA) | ||
A trust relationship | ||
User account synchronization | ||
A VPN connection |
Reference: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed
Question 18 – HOTSPOT – Select the answer that correctly completes the sentence.
Hot Area:
Statements | Yes/No |
Verify explicitly is one of the guiding principles of Zero Trust | |
Assume breach is on the guiding principles of Zero Trust | |
The Zero Trust security model assumes that a firewall secures the internal network from external threats |
Correct Answer:
Statements | Yes/No |
Verify explicitly is one of the guiding principles of Zero Trust | YES |
Assume breach is on the guiding principles of Zero Trust | YES |
The Zero Trust security model assumes that a firewall secures the internal network from external threats | NO |
Reference: https://docs.microsoft.com/en-us/security/zero-trust/
Question 19 – HOTSPOT – Select the answer that correctly completes the sentence.
Hot Area:
Statements | Yes/No |
Control is a key privacy principle of Microsoft | |
Transparency is a key privacy principle of Microsoft | |
Shares responsibility is key privacy of Microsoft |
Correct Answer:
Statements | Yes/No |
Control is a key privacy principle of Microsoft | YES |
Transparency is a key privacy principle of Microsoft | YES |
Shares responsibility is key privacy of Microsoft | NO |
Question 20 – HOTSPOT – Select the answer that correctly completes the sentence.
Hot Area:
a file makes the data in the file readable and usable to viewers that have the appropriate key | |
Archiving | |
Compressing | |
Deduplicating | |
Encrypting |
Correct Answer:
a file makes the data in the file readable and usable to viewers that have the appropriate key | |
Archiving | |
Compressing | |
Deduplicating | |
Encrypting |