Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Online Training
Microsoft SC-900 Online Training
The questions for SC-900 were last updated at May 11,2025.
- Exam Code: SC-900
- Exam Name: Microsoft Security Compliance and Identity Fundamentals
- Certification Provider: Microsoft
- Latest update: May 11,2025
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
- A . Plan
- B . Manage
- C . Adopt
- D . Govern
- E . Define Strategy
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
What is an example of encryption at rest?
- A . encrypting communications by using a site-to-site VPN
- B . encrypting a virtual machine disk
- C . accessing a website by using an encrypted HTTPS connection
- D . sending an encrypted email
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?
- A . sensitivity label policies
- B . Customer Lockbox
- C . information Barriers
- D . Privileged Access Management (PAM)
Question 68 is A,D:
Azure Firewall is a cloud-native, stateful firewall service that provides network-level protection for resources in your Azure Virtual Network (VNet). It can:
Question 51 is yes, yes, no:
Private key is used by the signer to create the digital signature.
Public key is used by others to verify the signature’s authenticity.
The private key must be kept secret and is never used for verification — only for signing.
Question 41 is 3x yes:
Encryption: Sensitivity labels can apply encryption to protect documents and emails.
Headers and Footers: Labels can insert custom headers and footers into Word, Excel, and PowerPoint files.
Watermarks: Labels can apply visual markings such as watermarks to both documents and emails.
Question 14 is A:
Azure AD Privileged Identity Management (PIM) allows you to manage, control, and monitor access to important resources in Azure AD, Azure, and other Microsoft Online Services. One of its key features is just-in-time (JIT) access, which enables users to activate privileged roles for a limited time, such as a two-hour window, to complete administrative tasks.