New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft Certified: Security Compliance and Identity Fundamentals SC-900 Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Select the answer that correctly completes the sentence.

Question # 1


Expert Solution
Questions # 2:

What feature supports email as a method of authenticating users?

Options:

A.

Microsoft Entra ID Protection


B.

Microsoft Entra Multi-Factor Authentication (MFA)


C.

self-service password reset (SSPR)


D.

Microsoft Entra Password Protection


Expert Solution
Questions # 3:

In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?

Options:

A.

Active Directory Federation Services (AD FS)


B.

Azure Sentinel


C.

Azure AD Connect


D.

Azure Ad Privileged Identity Management (PIM)


Expert Solution
Questions # 4:

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 4


Expert Solution
Questions # 5:

When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

All users must authenticate from a registered device.


B.

Administrators must always use Azure Multi-Factor Authentication (MFA).


C.

Azure Multi-Factor Authentication (MFA) registration is required for all users.


D.

All users must authenticate by using passwordless sign-in.


E.

All users must authenticate by using Windows Hello.


Expert Solution
Questions # 6:

You need to keep a copy of all files in a Microsoft SharePoint site for one year, even if users delete the files from the site. What should you apply to the site?

Options:

A.

a data loss prevention (DLP) policy


B.

a retention policy


C.

an insider risk policy


D.

a sensitivity label policy


Expert Solution
Questions # 7:

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Question # 7


Expert Solution
Questions # 8:

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?

Options:

A.

threat modeling


B.

identity as the security perimeter


C.

defense in depth


D.

the shared responsibility model


Expert Solution
Questions # 9:

Select the answer that correctly completes the sentence.

Question # 9


Expert Solution
Questions # 10:

Select the answer that correctly completes the sentence.

Question # 10


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions