Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals Online Training
Microsoft SC-900 Online Training
The questions for SC-900 were last updated at May 05,2025.
- Exam Code: SC-900
- Exam Name: Microsoft Security Compliance and Identity Fundamentals
- Certification Provider: Microsoft
- Latest update: May 05,2025
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?
- A . Microsoft Secure Score
- B . Productivity Score
- C . Secure score in Azure Security Center
- D . Compliance score
What do you use to provide real-time integration between Azure Sentinel and another security source?
- A . Azure AD Connect
- B . a Log Analytics workspace
- C . Azure Information Protection
- D . a data connector
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?
- A . the Microsoft Endpoint Manager admin center
- B . Azure Cost Management + Billing
- C . Microsoft Service Trust Portal
- D . the Azure Active Directory admin center
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
- A . the management of mobile devices
- B . the permissions for the user data stored in Azure
- C . the creation and management of user accounts
- D . the management of the physical hardware
Question 68 is A,D:
Azure Firewall is a cloud-native, stateful firewall service that provides network-level protection for resources in your Azure Virtual Network (VNet). It can:
Question 51 is yes, yes, no:
Private key is used by the signer to create the digital signature.
Public key is used by others to verify the signature’s authenticity.
The private key must be kept secret and is never used for verification — only for signing.
Question 41 is 3x yes:
Encryption: Sensitivity labels can apply encryption to protect documents and emails.
Headers and Footers: Labels can insert custom headers and footers into Word, Excel, and PowerPoint files.
Watermarks: Labels can apply visual markings such as watermarks to both documents and emails.
Question 14 is A:
Azure AD Privileged Identity Management (PIM) allows you to manage, control, and monitor access to important resources in Azure AD, Azure, and other Microsoft Online Services. One of its key features is just-in-time (JIT) access, which enables users to activate privileged roles for a limited time, such as a two-hour window, to complete administrative tasks.