ExamGecko
Home Home / Microsoft / SC-900

Microsoft SC-900 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

What can you protect by using the information protection solution in the Microsoft 365 compliance center?

A.

computers from zero-day exploits

A.

computers from zero-day exploits

Answers
B.

users from phishing attempts

B.

users from phishing attempts

Answers
C.

files from malware and viruses

C.

files from malware and viruses

Answers
D.

sensitive data from being exposed to unauthorized users

D.

sensitive data from being exposed to unauthorized users

Answers
Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide

What can you specify in Microsoft 365 sensitivity labels?

A.

how long files must be preserved

A.

how long files must be preserved

Answers
B.

when to archive an email message

B.

when to archive an email message

Answers
C.

which watermark to add to files

C.

which watermark to add to files

Answers
D.

where to store files

D.

where to store files

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 83
Correct answer: Question 83

Explanation:

Box 1: No

Advanced Audit helps organizations to conduct forensic and compliance investigations by increasing audit log retention.

Box 2: No

Box 3: Yes

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/advanced-audit?view=o365-worldwide

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 84
Correct answer: Question 84

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 85
Correct answer: Question 85

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-sensitivity-labels?view=o365-worldwide

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Define the perimeter by physical locations.

A.

Define the perimeter by physical locations.

Answers
B.

Use identity as the primary security boundary.

B.

Use identity as the primary security boundary.

Answers
C.

Always verify the permissions of a user explicitly.

C.

Always verify the permissions of a user explicitly.

Answers
D.

Always assume that the user system can be breached.

D.

Always assume that the user system can be breached.

Answers
E.

Use the network as the primary security boundary.

E.

Use the network as the primary security boundary.

Answers
Suggested answer: B, C, D

Explanation:

Reference:

https://docs.microsoft.com/en-us/security/zero-trust/

HOTSPOT

Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.


Question 87
Correct answer: Question 87

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/security-center/secure-score-access-and-track

You have an Azure subscription.

You need to implement approval-based, time-bound role activation.

What should you use?

A.

Windows Hello for Business

A.

Windows Hello for Business

Answers
B.

Azure Active Directory (Azure AD) Identity Protection

B.

Azure Active Directory (Azure AD) Identity Protection

Answers
C.

access reviews in Azure Active Directory (Azure AD)

C.

access reviews in Azure Active Directory (Azure AD)

Answers
D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

D.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Answers
Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.


Question 89
Correct answer: Question 89

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa

When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

All users must authenticate from a registered device.

A.

All users must authenticate from a registered device.

Answers
B.

Administrators must always use Azure Multi-Factor Authentication (MFA).

B.

Administrators must always use Azure Multi-Factor Authentication (MFA).

Answers
C.

Azure Multi-Factor Authentication (MFA) registration is required for all users.

C.

Azure Multi-Factor Authentication (MFA) registration is required for all users.

Answers
D.

All users must authenticate by using passwordless sign-in.

D.

All users must authenticate by using passwordless sign-in.

Answers
E.

All users must authenticate by using Windows Hello.

E.

All users must authenticate by using Windows Hello.

Answers
Suggested answer: B, C

Explanation:

Security defaults make it easy to protect your organization with the following preconfigured security settings:

Requiring all users to register for Azure AD Multi-Factor Authentication.

Requiring administrators to do multi-factor authentication.

Blocking legacy authentication protocols.

Requiring users to do multi-factor authentication when necessary. Protecting privileged activities like access to the Azure portal.

Reference: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-defaults

Total 199 questions
Go to page: of 20