ExamGecko
Home Home / Microsoft / SC-900

Microsoft SC-900 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Which type of identity is created when you register an application with Active Directory (Azure AD)?

A.

a user account

A.

a user account

Answers
B.

a user-assigned managed identity

B.

a user-assigned managed identity

Answers
C.

a system-assigned managed identity

C.

a system-assigned managed identity

Answers
D.

a service principal

D.

a service principal

Answers
Suggested answer: D

Explanation:

When you register an application through the Azure portal, an application object and service principal are automatically created in your home directory or tenant.

Reference: https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal

Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Configure external access for partner organizations.

A.

Configure external access for partner organizations.

Answers
B.

Export risk detection to third-party utilities.

B.

Export risk detection to third-party utilities.

Answers
C.

Automate the detection and remediation of identity based-risks.

C.

Automate the detection and remediation of identity based-risks.

Answers
D.

Investigate risks that relate to user authentication.

D.

Investigate risks that relate to user authentication.

Answers
E.

Create and automatically assign sensitivity labels to data.

E.

Create and automatically assign sensitivity labels to data.

Answers
Suggested answer: B, C, D

You have a Microsoft 365 E3 subscription.

You plan to audit user activity by using the unified audit log and Basic Audit.

For how long will the audit records be retained?

A.

15 days

A.

15 days

Answers
B.

30 days

B.

30 days

Answers
C.

90 days

C.

90 days

Answers
D.

180 days

D.

180 days

Answers
Suggested answer: C

To which type of resource can Azure Bastion provide secure access?

A.

Azure Files

A.

Azure Files

Answers
B.

Azure SQL Managed Instances

B.

Azure SQL Managed Instances

Answers
C.

Azure virtual machines

C.

Azure virtual machines

Answers
D.

Azure App Service

D.

Azure App Service

Answers
Suggested answer: C

Explanation:

Azure Bastion provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS.

Reference: https://docs.microsoft.com/en-us/azure/bastion/bastion-overview

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 95
Correct answer: Question 95

Explanation:

Box 1: Yes

Phishing scams are external threats.

Box 2: Yes

Insider risk management is a compliance solution in Microsoft 365.

Box 3: No

Insider risk management helps minimize internal risks from users. These include: Leaks of sensitive data and data spillage Confidentiality violations Intellectual property (IP) theft Fraud Insider trading Regulatory compliance violationsReference:https://docs.microsoft.com/en-us/microsoft-365/compliance/insider-risk-management?view=o365- worldwidehttps://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance- center?view=o365-worldwide


What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

to discover and control the use of shadow IT

A.

to discover and control the use of shadow IT

Answers
B.

to provide secure connections to Azure virtual machines

B.

to provide secure connections to Azure virtual machines

Answers
C.

to protect sensitive information hosted anywhere in the cloud

C.

to protect sensitive information hosted anywhere in the cloud

Answers
D.

to provide pass-through authentication to on-premises applications

D.

to provide pass-through authentication to on-premises applications

Answers
E.

to prevent data leaks to noncompliant apps and limit access to regulated data

E.

to prevent data leaks to noncompliant apps and limit access to regulated data

Answers
Suggested answer: A, C, E

Explanation:

Reference: https://docs.microsoft.com/en-us/defender-cloud-apps/what-is-defender-for-cloud-apps

DRAG DROP

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.


Question 97
Correct answer: Question 97

Explanation:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/insider-risk-management?view=o365-worldwide

What can you use to view the Microsoft Secure Score for Devices?

A.

Microsoft Defender for Cloud Apps

A.

Microsoft Defender for Cloud Apps

Answers
B.

Microsoft Defender for Endpoint

B.

Microsoft Defender for Endpoint

Answers
C.

Microsoft Defender for Identity

C.

Microsoft Defender for Identity

Answers
D.

Microsoft Defender for Office 365

D.

Microsoft Defender for Office 365

Answers
Suggested answer: B

Explanation:

Microsoft Secure Score for Devices

Artikel

12.05.2022

3 Minuten Lesedauer

Applies to:

Microsoft Defender for Endpoint Plan 2

Microsoft Defender Vulnerability Management

Microsoft 365 Defender

Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. To sign up for the Defender Vulnerability Management public preview or if you have any questions, contact us ([email protected]). Already have Microsoft Defender for Endpoint P2? Sign up for a free trial of the Defender Vulnerability Management Add-on. Configuration score is now part of vulnerability management as Microsoft Secure Score for Devices.

Your score for devices is visible in the Defender Vulnerability Management dashboard of the Microsoft 365 Defender portal. A higher Microsoft Secure Score for Devices means your endpoints are more resilient from cybersecurity threat attacks. It reflects the collective security configuration state of your devices across the following categories:

Application

Operating system

Network

Accounts

Security controls

Select a category to go to the Security recommendations page and view the relevant recommendations. Turn on the Microsoft Secure Score connector

Forward Microsoft Defender for Endpoint signals, giving Microsoft Secure Score visibility into the device security posture. Forwarded data is stored and processed in the same location as your Microsoft Secure Score data. Changes might take up to a few hours to reflect in the dashboard.

In the navigation pane, go to Settings > Endpoints > General > Advanced features Scroll down to Microsoft Secure Score and toggle the setting to On. Select Save preferences.

How it works

Microsoft Secure Score for Devices currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management. The data in the Microsoft Secure Score for Devices card is the product of meticulous and ongoing vulnerability discovery process. It is aggregated with configuration discovery assessments that continuously:

Compare collected configurations to the collected benchmarks to discover misconfigured assets Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction) Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams) Collect and monitor changes of security control configuration state from all assets

Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

a network interface

A.

a network interface

Answers
B.

an Azure App Service web app

B.

an Azure App Service web app

Answers
C.

a virtual network

C.

a virtual network

Answers
D.

a virtual network subnet

D.

a virtual network subnet

Answers
E.

a resource group

E.

a resource group

Answers
Suggested answer: A, D

Explanation:


What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

A.

Microsoft Defender for Cloud

A.

Microsoft Defender for Cloud

Answers
B.

Azure Blueprints

B.

Azure Blueprints

Answers
C.

Microsoft Sentinel

C.

Microsoft Sentinel

Answers
D.

Azure Policy

D.

Azure Policy

Answers
Suggested answer: B
Total 199 questions
Go to page: of 20