Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Microsoft > Microsoft Certifications > SC-900 > SC-900 Online Practice Questions and Answers

SC-900 Online Practice Questions and Answers

Questions 4

HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

Buy Now

Correct Answer:

Questions 5

HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

Buy Now

Correct Answer:

Reference: https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview

Questions 6

HOTSPOT

You have a Microsoft 365 E5 tenant.

You create sensitivity labels as shown in the Sensitivity Labels exhibit.

The Confidential/External sensitivity label is configured to encrypt files and emails when applied to content. The sensitivity labels are published as shown in the Published exhibit.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide

Questions 7

HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

Buy Now

Correct Answer:

Reference: https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-defaults

Questions 8

HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

Buy Now

Correct Answer:

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide

Questions 9

HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

Buy Now

Correct Answer:

Box 1: Yes A certificate is required that provides a private and a public key. Box 2: Yes The public key is used to validate the private key that is associated with a digital signature. Box 3: NO

Questions 10

HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

Buy Now

Correct Answer:

Box 1: vulnerabilities Microsoft 365 Defender portal is the new home for monitoring and managing security across your identities, data, devices, and apps, you will need to access various portals for certain specialized tasks. It used to monitor and respond to threat activity and strengthen security posture across your identities, email, data, endpoints, and apps with Microsoft 365 Defender

Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/portals

Questions 11

What do you use to provide real-time integration between Azure Sentinel and another security source?

A. Azure AD Connect

B. a Log Analytics workspace

C. Azure Information Protection

D. a connector

Buy Now

Correct Answer: D

To on-board Azure Sentinel, you first need to connect to your security sources. Azure Sentinel comes with a number of connectors for Microsoft solutions, including Microsoft 365 Defender solutions, and Microsoft 365 sources, including Office 365, Azure AD, Microsoft Defender for Identity, and Microsoft Cloud App Security, etc.

Reference: https://docs.microsoft.com/en-us/azure/sentinel/overview

Questions 12

What is a characteristic of a sensitivity label in Microsoft 365?

A. encrypted

B. restricted to predefined categories

C. persistent

Buy Now

Correct Answer: C

How sensitivity labels work in Power BI

When you apply a sensitivity label to Power BI content and files, it's similar to applying a tag on that resource that has the following benefits:

Customizable - you can create categories for different levels of sensitive content in your organization, such as Personal, Public, General, Confidential, and Highly Confidential.

Clear text - since the label is in clear text, it's easy for users to understand how to treat the content according to sensitivity label guidelines.

Persistent - after a sensitivity label has been applied to content, it accompanies that content when it's exported to Excel, PowerPoint and PDF files, downloaded to .pbix, or saved (in Desktop) and becomes the basis for applying and enforcing

policies.

Reference: https://docs.microsoft.com/en-us/power-bi/enterprise/service-security-sensitivity-label-overview

Questions 13

What can be created in Active Directory Domain Services (AD DS)?

A. line-of-business (LOB) applications that require modern authentication

B. computer accounts

C. software as a service (SaaS) applications that require modern authentication

D. mobile devices

Buy Now

Correct Answer: B

What is computer account in Active Directory?

A computer account represents your desktop or laptop computer to the Active Directory.

Reference:

https://commons.lbl.gov/display/itfaq/Active+Directory

Exam Code: SC-900
Exam Name: Microsoft Security Compliance and Identity Fundamentals
Last Update: Jun 20, 2025
Questions: 242

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.