SC-900 Exam Practice Test

SC-900 Exam Practice Test

SC-900 Exam Practice Tests

1 / 10

Your organization requires a tool to assess its compliance against various regulatory standards (like GDPR or HIPAA) and provides actionable recommendations to improve its compliance posture. Which Microsoft Purview service is designed for this?

2 / 10

Which Azure networking security service is used to create a network boundary for a set of Azure virtual machines and defines inbound and outbound rules based on IP addresses, ports, and protocols?

3 / 10

A security administrator needs to monitor and respond to security events and alerts from various sources across their Microsoft 365 and Azure environments in a centralized manner. Which Microsoft security solution provides Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities?

4 / 10

What is the primary benefit of implementing Multi-Factor Authentication (MFA) for user accounts?

5 / 10

An organization wants to ensure that specific sensitive documents, once labeled, cannot be modified or deleted for a period of seven years to meet regulatory requirements. Which Microsoft Purview capability is designed for this purpose?

6 / 10

Which type of identity in Azure AD represents a user account synchronized from an on-premises Active Directory Domain Services (AD DS) environment?

7 / 10

A company wants to identify and remediate misconfigurations across its Azure resources to improve its overall security posture. Which Microsoft security solution is primarily designed for Cloud Security Posture Management (CSPM) and provides a "Secure Score"?

8 / 10

Which Azure Active Directory (Azure AD) feature allows administrators to enforce policies that require users to meet specific conditions (e.g., specific location, compliant device) before being granted access to applications or data?

9 / 10

According to the Shared Responsibility Model in cloud computing, for an Infrastructure-as-a-Service (IaaS) offering, who is typically responsible for the security of the operating system and installed applications?

10 / 10

Which security principle emphasizes that all users, devices, and applications, whether inside or outside the organizational network, must be verified before granting access to resources?

Your score is

The average score is 68%

0%