Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Online Training
Microsoft SC-900 Online Training
The questions for SC-900 were last updated at May 11,2025.
- Exam Code: SC-900
- Exam Name: Microsoft Security Compliance and Identity Fundamentals
- Certification Provider: Microsoft
- Latest update: May 11,2025
What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution. NOTE: Each correct selection is worth one point.
- A . automated investigation and remediation
- B . transport encryption
- C . shadow IT detection
- D . attack surface reduction
DRAG DROP
Match the Azure networking service to the appropriate description.
To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all. NOTE: Each correct match is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?
- A . Audit
- B . Compliance Manager
- C . Content Search
- D . Alerts
Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . Display policy tips to users who are about to violate your organization’s policies.
- B . Enable disk encryption on endpoints.
- C . Protect documents in Microsoft OneDrive that contain sensitive information.
- D . Apply security baselines to devices.
Question 68 is A,D:
Azure Firewall is a cloud-native, stateful firewall service that provides network-level protection for resources in your Azure Virtual Network (VNet). It can:
Question 51 is yes, yes, no:
Private key is used by the signer to create the digital signature.
Public key is used by others to verify the signature’s authenticity.
The private key must be kept secret and is never used for verification — only for signing.
Question 41 is 3x yes:
Encryption: Sensitivity labels can apply encryption to protect documents and emails.
Headers and Footers: Labels can insert custom headers and footers into Word, Excel, and PowerPoint files.
Watermarks: Labels can apply visual markings such as watermarks to both documents and emails.
Question 14 is A:
Azure AD Privileged Identity Management (PIM) allows you to manage, control, and monitor access to important resources in Azure AD, Azure, and other Microsoft Online Services. One of its key features is just-in-time (JIT) access, which enables users to activate privileged roles for a limited time, such as a two-hour window, to complete administrative tasks.