ExamGecko
Home / Microsoft / SC-900 / List of questions
Ask Question

Microsoft SC-900 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report
Export
Collapse

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?

conditional access policies

conditional access policies

Azure AD Identity Protection

Azure AD Identity Protection

Azure AD Privileged Identity Management (PIM)

Azure AD Privileged Identity Management (PIM)

authentication method policies

authentication method policies

Suggested answer: C

Explanation:

Azure AD Privileged Identity Management (PIM) provides just-in-time privileged access to Azure AD and Azure resources

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure

asked 05/10/2024
Corentin ADJOVI
36 questions

Question 42

Report
Export
Collapse

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

text message (SMS)

text message (SMS)

Microsoft Authenticator app

Microsoft Authenticator app

email verification

email verification

phone call

phone call

security question

security question

Suggested answer: A, B, D

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods

asked 05/10/2024
Jozsef Stelly
47 questions

Question 43

Report
Export
Collapse

What should you use in the Microsoft 365 Defender portal to view security trends and track the protection status of identities?

Attack simulator

Attack simulator

Reports

Reports

Hunting

Hunting

Incidents

Incidents

Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/reports-and-insights-in-security-and-compliance?view=o365-worldwide

asked 05/10/2024
DOMINIC FERNANDEZ
40 questions

Question 44

Report
Export
Collapse

What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.

NOTE: Each correct selection is worth one point.

automated investigation and remediation

automated investigation and remediation

transport encryption

transport encryption

shadow IT detection

shadow IT detection

attack surface reduction

attack surface reduction

Suggested answer: A, D

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide

asked 05/10/2024
Moraes, Jefferson
45 questions

Question 45

Report
Export
Collapse

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Display policy tips to users who are about to violate your organization’s policies.

Display policy tips to users who are about to violate your organization’s policies.

Enable disk encryption on endpoints.

Enable disk encryption on endpoints.

Protect documents in Microsoft OneDrive that contain sensitive information.

Protect documents in Microsoft OneDrive that contain sensitive information.

Apply security baselines to devices.

Apply security baselines to devices.

Suggested answer: A, C

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

asked 05/10/2024
Jarrell John Garcia
37 questions

Question 46

Report
Export
Collapse

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

Content Search

Content Search

sensitivity labels

sensitivity labels

retention policies

retention policies

eDiscovery

eDiscovery

Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide

asked 05/10/2024
Babak Sadeghpour
28 questions

Question 47

Report
Export
Collapse

What is a use case for implementing information barrier policies in Microsoft 365?

to restrict unauthenticated access to Microsoft 365

to restrict unauthenticated access to Microsoft 365

to restrict Microsoft Teams chats between certain groups within an organization

to restrict Microsoft Teams chats between certain groups within an organization

to restrict Microsoft Exchange Online email between certain groups within an organization

to restrict Microsoft Exchange Online email between certain groups within an organization

to restrict data sharing to external email recipients

to restrict data sharing to external email recipients

Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/information-barriers-policies?view=o365-worldwide

asked 05/10/2024
Joshua Muentes
46 questions

Question 48

Report
Export
Collapse

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

Azure Defender

Azure Defender

Azure Blueprints

Azure Blueprints

Azure Sentinel

Azure Sentinel

Azure Policy

Azure Policy

Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/governance/blueprints/overview

asked 05/10/2024
Erik de Bont
39 questions

Question 49

Report
Export
Collapse

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?

Audit

Audit

Compliance Manager

Compliance Manager

Content Search

Content Search

Alerts

Alerts

Suggested answer: C

Explanation:

The Content Search tool in the Security & Compliance Center can be used to quickly find email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations, and instant messaging conversations in Skype for Business. The first step is to starting using the Content Search tool to choose content locations to search and configure a keyword query to search for specific items.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/search-for-content?view=o365-worldwide

asked 05/10/2024
IllDisposed ToBTS
31 questions

Question 50

Report
Export
Collapse

DRAG DROP

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.


Microsoft SC-900 image Question 50 108697 10052024010936000
Correct answer: Microsoft SC-900 image answer Question 50 108697 10052024010936000

Explanation:

Box 1: Azure Firewall

Azure Firewall provide Source Network Address Translation and Destination Network Address Translation.

Box 2: Azure Bastion

Azure Bastion provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS.

Box 3: Network security group (NSG)

You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network.

Reference:

https://docs.microsoft.com/en-us/azure/networking/fundamentals/networking-overview

https://docs.microsoft.com/en-us/azure/bastion/bastion-overview

https://docs.microsoft.com/en-us/azure/firewall/features

https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview

asked 05/10/2024
Hendrik van Bemmel
32 questions
Total 199 questions
Go to page: of 20
Search