Microsoft SC-900 Practice Test - Questions Answers, Page 9
List of questions
Related questions
What can you protect by using the information protection solution in the Microsoft 365 compliance center?
computers from zero-day exploits
users from phishing attempts
files from malware and viruses
sensitive data from being exposed to unauthorized users
What can you specify in Microsoft 365 sensitivity labels?
how long files must be preserved
when to archive an email message
which watermark to add to files
where to store files
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Define the perimeter by physical locations.
Use identity as the primary security boundary.
Always verify the permissions of a user explicitly.
Always assume that the user system can be breached.
Use the network as the primary security boundary.
HOTSPOT
Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.
You have an Azure subscription.
You need to implement approval-based, time-bound role activation.
What should you use?
Windows Hello for Business
Azure Active Directory (Azure AD) Identity Protection
access reviews in Azure Active Directory (Azure AD)
Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
All users must authenticate from a registered device.
Administrators must always use Azure Multi-Factor Authentication (MFA).
Azure Multi-Factor Authentication (MFA) registration is required for all users.
All users must authenticate by using passwordless sign-in.
All users must authenticate by using Windows Hello.
Question