Microsoft SC-900 Certification Exam Questions and Answers PDF

Page 1

MICROSOFT SC-900 CERTIFICATION EXAM QUESTIONS AND ANSWERS PDF Microsoft SC-900 Exam

EDUSUM.COM Get complete detail on SC-900 exam guide to crack Microsoft Security Compliance and Identity Fundamentals. You can collect all information on SC-900 tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on Microsoft Security Compliance and Identity Fundamentals and get ready to crack SC-900 certification. Explore all information on SC900 exam with number of questions, passing percentage and time duration to complete test.


WWW.EDUSUM.COM

PDF

Introduction to Microsoft Certified Security Compliance and Identity Fundamentals Exam The Microsoft SC-900 Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the Security, Compliance, and Identity Fundamentals certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. This study guide for the Microsoft Security Compliance and Identity Fundamentals will help guide you through the study process for your certification.

SC-900 Microsoft Security Compliance and Identity Fundamentals Exam Summary ● Exam Name: Microsoft Security Compliance and Identity Fundamentals ● Exam Code: SC-900

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

1


WWW.EDUSUM.COM

PDF

● ● ● ● ●

Exam Price: $550 (USD) Duration: 120 mins Number of Questions: 40-60 Passing Score: 700 / 1000 Books / Training: Course SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals ● Schedule Exam: Pearson VUE ● Sample Questions: Microsoft Security, Compliance, and Identity Fundamentals Sample Questions ● Recommended Practice: Microsoft SC-900 Certification Practice Exam

Exam Syllabus: SC-900 Microsoft Certified Security Compliance and Identity Fundamentals Topic

Details

Describe the Concepts of Security, Compliance, and Identity (5-10%)

Describe security and compliance concepts & methodologies

Define identity concepts

- describe the Zero-Trust methodology - describe the shared responsibility model - define defense in depth - describe common threats - describe encryption and hashing - describe cloud adoption framework - define identity as the primary security perimeter - define authentication - define authorization - describe what identity providers are - describe what Active Directory is - describe the concept of Federated services - define common Identity Attacks

Describe the capabilities of Microsoft Identity and Access Management Solutions (25-30%) - describe Azure AD identity types (users, devices, groups, Describe the basic identity service principals/applications) services and identity types - describe what hybrid identity is of Azure AD - describe the different external identity types (Guest Users)

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

2


WWW.EDUSUM.COM

PDF

Topic

Details - describe the different authentication methods - describe self-service password reset Describe the authentication - describe password protection and management capabilities of Azure AD capabilities - describe Multi-factor Authentication - describe Windows Hello for Business Describe access - describe what conditional access is management capabilities of - describe uses and benefits of conditional access Azure AD - describe the benefits of Azure AD roles - describe what identity governance is Describe the identity - describe what entitlement management and access protection & governance reviews is capabilities of Azure AD - describe the capabilities of PIM - describe Azure AD Identity Protection

Describe the capabilities of Microsoft Security Solutions (30-35%) - describe Azure Network Security groups - describe Azure DDoS protection Describe basic security - describe what Azure Firewall is capabilities in Azure - describe what Azure Bastion is - describe what Web Application Firewall is - describe ways Azure encrypts data - describe Cloud security posture management (CSPM) - describe Microsoft Defender for Cloud Describe security - describe secure score in Microsoft Defender Cloud management capabilities of - describe enhanced security of Microsoft Defender for Azure Cloud - describe security baselines for Azure Describe security - define the concepts of SIEM, SOAR, XDR capabilities of Microsoft - describe how of Microsoft Sentinel provides integrated Sentinel threat protection - describe Microsoft 365 Defender services - describe Microsoft Defender for Identity (formerly Azure Describe threat protection ATP) with Microsoft 365 - describe Microsoft Defender for Office 365 (formerly Defender Office 365 ATP) - describe Microsoft Defender for Endpoint (formerly

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

3


WWW.EDUSUM.COM

PDF

Topic

Details Microsoft Defender ATP) - describe Microsoft Defender for Cloud Apps - describe the Microsoft 365 Defender portal Describe security - describe how to use Microsoft Secure Score management capabilities of - describe security reports and dashboards Microsoft 365 - describe incidents and incident management capabilities - describe what Intune is Describe endpoint security - describe endpoint security with Intune with Microsoft Intune - describe the endpoint security with the Microsoft Endpoint Manager admin center

Describe the Capabilities of Microsoft Compliance Solutions (25-30%) - describe the offerings of the Service Trust portal Describe the compliance - describe Microsoft’s privacy principles management capabilities in - describe the compliance center Microsoft - describe compliance manager - describe use and benefits of compliance score - describe data classification capabilities Describe information - describe the value of content and activity explorer protection and governance - describe sensitivity labels capabilities of Microsoft - describe Retention Polices and Retention Labels 365 - describe Records Management - describe Data Loss Prevention - describe Insider risk management solution - describe communication compliance Describe insider risk - describe information barriers capabilities in Microsoft 365 - describe privileged access management - describe customer lockbox - describe the purpose of eDiscovery - describe the capabilities of the content search tool Describe the eDiscovery - describe the core eDiscovery workflow and audit capabilities of - describe the advanced eDiscovery workflow Microsoft 365 - describe the core audit capabilities of M365 - describe purpose and value of Advanced Auditing Describe resource - describe the use of Azure Resource locks governance capabilities in - describe what Azure Blueprints is Azure - define Azure Policy and describe its use cases

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

4


WWW.EDUSUM.COM

PDF

Microsoft SC-900 Certification Sample Questions and Answers To make you familiar with Microsoft Security Compliance and Identity Fundamentals (SC-900) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for Security, Compliance, and Identity Fundamentals SC-900 Certification to test your understanding of Microsoft SC-900 process with real Microsoft certification exam environment.

SC-900 Microsoft Security Compliance and Identity Fundamentals Sample Questions:01. What kind of Azure Active Directory (Azure AD) identity acts as a service principal, is linked to an Azure resource, and is automatically deleted when the resource is deleted? a) Guest user b) System-assigned managed identity c) User-assigned managed identify d) Device 02. What do you use to provide real-time integration between Azure Sentinel and another security source? a) Azure AD Connect b) a Log Analytics workspace c) Azure Information Protection d) a connector 03. In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing? a) the management of mobile devices b) the permissions for the user data stored in Azure c) the creation and management of user accounts d) the management of the physical hardware 04. Which feature provides the extended detection and response (XDR) capability of Azure Sentinel? a) integration with the Microsoft 365 compliance center b) support for threat hunting

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

5


WWW.EDUSUM.COM

PDF

c) integration with Microsoft 365 Defender d) support for Azure Monitor Workbooks 05. Which two categories are available under the Reports section of the Microsoft 365 Security Center? a) Secure scores b) Identities c) Apps d) Risks 06. In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? a) Plan b) Manage c) Adopt d) Govern e) Define Strategy 07. What can you use to provision Azure resources across multiple subscriptions in a consistent manner? a) Azure Blueprints b) Azure Defender c) Azure Policy d) Azure Sentinel 08. Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers? a) retention policies b) conditional access policies c) data loss prevention (DLP) policies d) information barriers 09. Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions? a) eDiscovery b) retention policies c) Content Search d) sensitivity labels

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

6


WWW.EDUSUM.COM

PDF

10. What are two capabilities of Microsoft Defender for Endpoint? a) automated investigation and remediation b) transport encryption c) shadow IT detection d) attack surface reduction

Answers:Answer 1:- b Answer 2:- d Answer 3:- d Answer 4:- c Answer 5:- b, c Answer 6:- a, e Answer 7:- a Answer 8:- c Answer 9:- d Answer 10:- a, d

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

7


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.