ExamGecko
Home / Microsoft / SC-900 / List of questions
Ask Question

Microsoft SC-900 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Microsoft SC-900 image Question 61 108708 10052024010936000
Correct answer: Microsoft SC-900 image answer Question 61 108708 10052024010936000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview

asked 05/10/2024
Henock Asmerom
43 questions

Question 62

Report Export Collapse

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Microsoft SC-900 image Question 62 108709 10052024010936000
Correct answer: Microsoft SC-900 image answer Question 62 108709 10052024010936000
Explanation:

Box 1: Yes

Conditional access policies can be applied to all users

Box 2: No

Conditional access policies are applied after first-factor authentication is completed.

Box 3: Yes

Users with devices of specific platforms or marked with a specific state can be used when enforcing Conditional Access policies.

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview

asked 05/10/2024
Emily Luijten
51 questions

Question 63

Report Export Collapse

HOTSPOT

Select the answer that correctly completes the sentence.


Microsoft SC-900 image Question 63 108710 10052024010936000
Correct answer: Microsoft SC-900 image answer Question 63 108710 10052024010936000
Explanation:

When you register an application through the Azure portal, an application object and service principal are automatically created in your home directory or tenant.

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal

asked 05/10/2024
Carlos Roberto
57 questions

Question 64

Report Export Collapse

Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

fingerprint

fingerprint

facial recognition

facial recognition

PIN

PIN

email verification

email verification

security question

security question

Suggested answer: A, B, C
Explanation:

Reference:

https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication

asked 05/10/2024
J.L.M. van Loo
51 questions

Question 65

Report Export Collapse

HOTSPOT

Select the answer that correctly completes the sentence.


Microsoft SC-900 image Question 65 108712 10052024010936000
Correct answer: Microsoft SC-900 image answer Question 65 108712 10052024010936000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-defaults

asked 05/10/2024
Sharhonda Herman
54 questions

Question 66

Report Export Collapse

What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?

automated remediation

automated remediation

automated investigation

automated investigation

advanced hunting

advanced hunting

network protection

network protection

Suggested answer: D
Explanation:

Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction capability.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide

asked 05/10/2024
Steve Parnell
34 questions

Question 67

Report Export Collapse

HOTSPOT

Select the answer that correctly completes the sentence.


Microsoft SC-900 image Question 67 108714 10052024010936000
Correct answer: Microsoft SC-900 image answer Question 67 108714 10052024010936000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/overview

asked 05/10/2024
Liam Harris
56 questions

Question 68

Report Export Collapse

Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Azure virtual machines

Azure virtual machines

Azure Active Directory (Azure AD) users

Azure Active Directory (Azure AD) users

Microsoft Exchange Online inboxes

Microsoft Exchange Online inboxes

Azure virtual networks

Azure virtual networks

Microsoft SharePoint Online sites

Microsoft SharePoint Online sites

Suggested answer: D, E
asked 05/10/2024
Azwihangwisi Ntikane
42 questions

Question 69

Report Export Collapse

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?

threat modeling

threat modeling

identity as the security perimeter

identity as the security perimeter

defense in depth

defense in depth

the shared responsibility model

the shared responsibility model

Suggested answer: C
Explanation:

Reference:

https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth

asked 05/10/2024
Romain Casagrande
38 questions

Question 70

Report Export Collapse

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Microsoft SC-900 image Question 70 108717 10052024010936000
Correct answer: Microsoft SC-900 image answer Question 70 108717 10052024010936000
asked 05/10/2024
Francisli Lilles
48 questions
Total 199 questions
Go to page: of 20