0 likes | 4 Views
SC-900 Exam Dumps - Reliable Preparation for Microsoft Security, Compliance, and Identity Fundamentals Exam. Are you preparing for the SC-900 exam and searching for effective study materials to ensure success? Look no further! The comprehensive SC-900 Exam Dumps from MicrosoftDumps deliver everything you need to excel in the Microsoft Security, Compliance, and Identity Fundamentals exam.
E N D
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Microsoft SC-900 Microsoft Security, Compliance, and Identity Fundamentals QUESTION & ANSWERS Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 1 What is the concept of Security Orchestration, Automation, and Response (SOAR)? Option A : SOAR is a cloud-based service that provides secure storage and management of cryptographic keys and digital certificates. Option B : SOAR is a software solution that automates the detection, investigation, and response to security incidents Option C : SOAR is a hardware appliance that provides network firewall and intrusion prevention services. Option D : SOAR is a methodology for managing access to cloud resources through the use of policies and procedures. Correct Answer: B Explanation/Reference: Security Orchestration, Automation, and Response (SOAR) is a software solution that automates the detection, investigation, and response to security incidents. It enables organizations to integrate and orchestrate their security tools and processes, and automate repetitive tasks to improve the efficiency and effectiveness of their security operations. The "secure storage of keys" answer is incorrect because it describes a cloud-based service that provides secure storage and management of cryptographic keys and digital certificates, which is not SOAR. The "hardware appliance" answer is incorrect because it describes a hardware appliance that provides firewall and intrusion prevention services for networks, which is not SOAR. The "policies and procedure" answer is incorrect because it describes a methodology for managing access to cloud resources through the use of policies and procedures, which is not SOAR. QUESTION: 2 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions You need to apply retention labels to all documents that contain U.S. Driver's License Number.Which of the following is the best way to do so? Option A : Create and publish a retention label to Microsoft 365 locations Option B : Create a retention policy that labels sensitive info Option C : Create and auto-apply a retention label Option D : Create a retention policy that labels specific words Correct Answer: C Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: You need to understand all the different ways to apply retention settings to your content to answer this question. There are only three ways to do so: 1a – You (admin) create a retention label and publish it to specific locations (SharePoint documents, Office 365 groups, etc.) with label policies. The user/team selects the appropriate retention settings for their content. 1b - You create a retention label and auto-apply the label to content containing sensitive information or specific words. Users will see the label applied to their content if there is a match. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions 2 – You create a retention policy for content in specific locations. No retention label is used. Unlike retention labels which apply retention settings at a document level, retention policies assign settings at a site level or a container level. All the documents within the site/container will inherit the settings. It is essential to realize that data like Driver’s license number and credit card information are sensitive. And only if you use an auto-labeling policy can you apply them to content with sensitive data. The option Create and auto-apply a retention label is the correct answer. Reference Link: https://docs.microsoft.com/en-us/microsoft-365/compliance/apply-retention-labels-automatically?view=o365- worldwide#configuring-conditions-forauto-apply-retention-labels Options Create a retention policy that labels sensitive info and Create a retention policy that labels specific words are incorrect because retention policies don’t give you the ability to target content with sensitive information/particular keywords. You can only target Where/Whom the settings are applied to and not the content. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Option Create and publish a retention label to Microsoft 365 locations is incorrect, too, for the same reason. You can only target Who/Where and not What. If you need to see all the built-in sensitive info types, go to the Data classification tab. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-information-protection-governance-capabilities- microsoft-365/6-describe-retention-policesretention-labels https://docs.microsoft.com/en-us/microsoft-365/compliance/retention?view=o365-worldwide#retention-policies-and-retention- labels QUESTION: 3 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions HOTSPOT - For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer : Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 4 You have workloads hosted in Windows & Linux VMs on Azure, AWS, and on-premises environments.Which of the following services helps you to scan for vulnerabilities against external threats? Option A : Azure Security Center Option B : Microsoft 365 Defender Option C : Microsoft Cloud App Security Option D : Azure Defender Correct Answer: D Explanation/Reference: Azure Defender, a part of Azure Security Center, is a Cloud Workload Protection Platform (CWPP). It includes vulnerability scanning for your VMs in Azure. Quick Preview: Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-security-management-capabilities-of-azure/5- describe-benefit-use-casesdefender#vulnerability-assessment In addition to Azure VMs, it also scans for vulnerabilities in VMs in the non-Azure clouds (AWS, GCP) and on-premises environments with the help of Azure Arc. Reference Links: https://docs.microsoft.com/en-us/azure/security-center/azure-defender#hybrid-cloud-protection For example, to scan for vulnerabilities in AWS EC2 instances, first, connect your AWS account to Azure Security Center. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Once Azure Security Center discovers the EC2 instances in the connected AWS accounts, and onboards them to Azure Arc, deploy the vulnerability assessment solution. Finally, within Azure Defender, you can scan for vulnerabilities in Azure, AWS, GCP, and on-premises VMs. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Option Azure Defender is the correct answer. All other options are incorrect. Azure Security Center strengthens the security posture (by recommending security hardening tasks, enforcing security policies) of your resources. Although it could be a correct answer (since Azure Defender is part of Azure Security Center), Azure Defender is the best answer as it is more specific. Reference Link: https://docs.microsoft.com/en-us/azure/security-center/security-center-introduction#strengthen-security-posture Microsoft Cloud App Security is a Cloud Access Security Broker (CASB) solution that sits between your on-premises & cloud infrastructure. It monitors all the traffic from end users (who access the resources from their personal devices in untrusted networks) to enforce security & organizational policies. Reference Link: https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security#what-is-a-casb Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Microsoft 365 Defender protects your identities, email, endpoints, and apps against attacks. Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-threat-protection-with-microsoft-365-defender/2- describe-services QUESTION: 5 Your organization uses Skype to communicate with suppliers. Who is responsible for DNS configuration? Option A : Microsoft Option B : Individual users Option C : Supplier organization Option D : Your IT team Correct Answer: A Explanation/Reference: A few things to know: 1.Skype is a SaaS product. 2. DNS, along with VNet, Load balancing, and gateways are network controls. Quick preview: Reference Link: Shared responsibility for Cloud Computing (on page 10) 3. For a SaaS product, Cloud Solutions Provider (Microsoft) manages the network controls (per the shared responsibility model). Along with Skype, other Microsoft 365 products, Dynamics CRM Online are also SaaS products. Reference link: https://docs.microsoft.com/en-us/learn/modules/describe-security-concepts-methodologies/3-describe-shared- responsibility-model So, 'Microsoft' is the correct answer. QUESTION: 6 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions completes the sentence. Answer : Explanation/Reference: QUESTION: 7 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Select the answer that correctly completes the sentence. Answer : Explanation/Reference: Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 8 Select the answer that correctly completes the sentence. Answer : Explanation/Reference: Federation is a collection of domains that have established trust. Reference: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fe d QUESTION: 9 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Some of your organization's employees receive targeted phishing emails that contain links/attachments.Which of the following solutions can safeguard your organization against such threats? Option A : Microsoft Defender for Office 365 Option B : Exchange Online Advanced Threat Protection Option C : Office 365 Advanced Threat Protection Option D : Microsoft Defender for Outlook Correct Answer: A Explanation/Reference: Microsoft 365 Defender is a suite of four products that protect your organization against sophisticated cyberattacks. They are: ·Microsoft Defender for Identity identifies compromised identities, protects user identities, and investigates user activities. · Microsoft Defender for Office 365 protects your organizations against threats posed by emails, collaboration tools like Teams, SharePoint, & all other Microsoft Office products. ·Microsoft Defender for Endpoint protects your organization’s endpoints. ·Microsoft Cloud App Security helps you to discover how your users are consuming the SaaS apps. The question talks about threats arising from email (phishing), so Microsoft Defender for Office 365 is the correct choice. Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-threat-protection-with-microsoft-365-defender/4-describe-defen der- office Office 365 Advanced Threat Protection was the former name for Microsoft Defender for Office 365. The name is no longer in use, and they both are the same products. 'Microsoft Defender for Outlook' and 'Exchange Online Advanced Threat Protection' aren't valid product names. They are incorrect answers. QUESTION: 10 Microsoft Azure Sentinel is a scalable, cloud-native SIEM/SOAR solution. What do the acronyms stand for? Option A : Security Incident Event Management (SIEM), Security Orchestration Autonomous Response (SOAR) Option B : Security Information Event Management (SIEM), Security Orchestration Autonomous Response (SOAR) Option C : Security Information Event Management (SIEM), Security Orchestration Automated Response (SOAR) Option D : Security Incident Event Management (SIEM), Security Orchestration Automated Response (SOAR) Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Correct Answer: C Explanation/Reference: SIEM (Security Information Event Management) is a centralized collection point for all the log entries generated by your infrastructure, resources, devices, firewall, and endpoints. It then correlates these logs to generate alerts and notifies the administrator. SOAR (Security Orchestration Automated Response) takes these alerts and automates your threat response (with playbooks). So, SOAR decreases the incident response time. In a nutshell, SIEM raises an alert if it detects a malicious activity. SOAR deals with the alerts (including false positives) and prepares an automated response. Reference Link: https://docs.microsoft.com/en-us/azure/sentinel/overview Note: On Microsoft Learn, SIEM is mentioned as Security Incident and Event Management, although a quick Google search would reveal that 'I' is Information, rather than Incident. QUESTION: 11 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Select the answer that correctly completes the sentence. Answer : Explanation/Reference: Correct Answer: Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. Reference: https://docs.microsoft.com/en-us/azure/sentinel/overview QUESTION: 12 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions HOTSPOT - For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer : Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 13 How Azure AD Password Protection helps in maintaining password hygiene? Option A : By preventing some words from appearing in passwords Option B : By defining how Azure AD encrypts the passwords Option C : By setting password expiration policies Option D : By locking user accounts after unsuccessful attempts Correct Answer: A Explanation/Reference: Azure AD Password Protection prevents users from setting known weak passwords (globally banned password lists) and their variations. In addition to that, you can define words specific to your organization (custom list) that users may use in their passwords. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Option By preventing some words from appearing in passwords is the correct choice. All the other options are incorrect. Reference Link: https://docs.microsoft.com/en-us/learn/modules/explore-authentication-capabilities/6-describe-password- protection-management QUESTION: 14 Select the answer that correctly completes the sentence. Answer : Explanation/Reference: Reference: https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security QUESTION: 15 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model? Option A : applications Option B : network controls Option C : operating systems Option D : accounts and identities Correct Answer: D QUESTION: 16 Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point. Option A : fingerprint Option B : facial recognition Option C : PIN Option D : email verification Option E : security question Correct Answer: A,B,C Explanation/Reference: https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication QUESTION: 17 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Select the answer that correctly completes the sentence. Answer : Explanation/Reference: Correct Answer: Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Reference: https://docs.microsoft.com/en-us/defender-for-identity/what-is QUESTION: 18 Which of the following determines the level of access within an application? Option A : Authorization Option B : Authentication Option C : Auditing Option D : Administration Correct Answer: A Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: All four options are the fundamental pillars of identity. Authentication is verifying who the user says they are? The system challenges legitimate credentials before providing access. Azure AD technologies that implement Authentication are MFA, Windows Hello, etc. It doesn’t control access to specific parts of an app. Authentication is an incorrect choice. Azure AD handles the authorization of access to secured resources through Role-based access control (RBAC). With RBAC, you can assign permissions to a user/group. These permissions define what they can/cannot do (they determine the level of access). In the below image, the Reader role has permissions only to read Azure AD Metrics definition. He cannot create/update/delete Metrics Definition Authorization is the correct choice. Although both Administration & Auditing are two of the four pillars of identity, they do not determine access. Both are incorrect choices. Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-identity-principles-concepts/3-define-identity-primary- security-perimeter QUESTION: 19 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions What is the purpose of authentication in security? Option A : To encrypt data in transit Option B : To verify the identity of a user or device Option C : To detect and respond to security threats Option D : To monitor access to resources Correct Answer: B Explanation/Reference: Authentication is the process of verifying the identity of a user or device, typically through the use of usernames, passwords, or other forms of credentials. The purpose of authentication is to ensure that only authorized users or devices are able to access protected resources, such as applications, data, or systems. "To encrypt data in transit", is incorrect because the purpose of encryption is to protect the confidentiality of data in transit or at rest, while authentication focuses on verifying identity. "To monitor access to resources", is also incorrect because while monitoring access to resources is important for security, the primary purpose of authentication is to verify identity. " To detect and respond to security threats", is also incorrect because while detecting and responding to security threats is important for security, the primary purpose of authentication is to verify identity and prevent unauthorized access. QUESTION: 20 Read the following two statements about authentication methods for hybrid identity and select whether they are TRUE/FALSE. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Option A : (i) - TRUE, (ii) - FALSE Option B : (i) - TRUE, (ii) - TRUE Option C : (i) - FALSE, (ii) - FALSE Option D : (i) - FALSE, (ii) - TRUE Correct Answer: C Explanation/Reference: The first statement is FALSE. Password validation for pass-through authentication (PTA) happens in the on-premises Active Directory, not in the cloud. When a hybrid user signs in to a cloud app with Azure AD, the credentials are passed through for verification in the on- premises directory. In steps 7 & 8 (below image), password verification happens against Active Directory. Source: Microsoft documentation - How Pass-through authentication works Reference Link: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta-how-it-works The second Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions statement is FALSE too. As you can see from the above image, Pass-through authentication, not password hash synchronization, uses agents (steps 5, 6, 7 & 8) in the on-premises servers to validate the passwords. Option (i) - FALSE, (ii) – FALSE is the correct answer. Reference Link: https://docs.microsoft.com/en-us/learn/modules/explore-basic-services-identity-types/6-describe-concept-of- hybrid-identities QUESTION: 21 What are some of the enhanced security features provided by Microsoft Defender for Cloud? Option A : Automated threat response, vulnerability management, and compliance reporting. Option B : Protection against distributed denial of service (DDoS) attacks, web application attacks, and botnets. Option C : Secure authentication and authorization, multi-factor authentication, and single sign-on. Option D : Advanced threat analytics, behavioral analysis, and machine learning. Correct Answer: D Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: Microsoft Defender for Cloud provides advanced threat analytics, behavioral analysis, and machine learning to detect and respond to advanced threats in real-time. It uses artificial intelligence (AI) and machine learning to analyze vast amounts of data and identify anomalous behavior that may indicate a potential threat. It can detect and respond to attacks across multi- cloud and hybrid cloud environments. Automated threat response, vulnerability management, and compliance reporting are features provided by Azure Security Center. It provides continuous assessment and monitoring of your cloud environment to ensure compliance with security policies. Protection against distributed denial of service (DDoS) attacks, web application attacks, and botnets are features provided by Azure DDoS Protection Standard and Azure Firewall. Azure DDoS Protection Standard provides protection against DDoS attacks on Azure resources, including virtual networks, public IP addresses, and application gateways. Azure Firewall provides inbound protection for non-HTTP/S protocols and network segmentation for Azure Virtual Network resources. Secure authentication and authorization, multi-factor authentication, and single sign-on are features provided by Azure Active Directory. It is a cloud-based identity and access management (IAM) service that provides secure authentication and authorization for users and applications. QUESTION: 22 In which resource scope are Azure Blueprints created? Option A : Virtual network Option B : Subscription Option C : Management group Option D : Resource group Correct Answer: C Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: Azure Blueprints are created at the management group level. Management groups are containers for managing access, policies, and compliance across multiple Azure subscriptions. By creating Azure Blueprints at the management group level, organizations can define a repeatable set of Azure resources that meets their compliance and security requirements, ensuring consistency across their environment. A resource group is a logical container for resources deployed within an Azure subscription, but Azure Blueprints are not created at the resource group level. Azure Blueprints are created at a higher level, specifically the management group, to enable centralized governance across multiple subscriptions. Although an Azure Blueprint can be assigned to a subscription, the Blueprint itself is created at the management group level, which allows for centralized governance and consistency across multiple subscriptions. A virtual network is an isolated, private network within Azure, providing secure communication between Azure resources. Azure Blueprints are not created at the virtual network level, as their primary purpose is to provide a centralized, repeatable way of deploying resources that meet organizational compliance and security requirements, not to manage network connectivity. QUESTION: 23 With Cloud Discovery, an admin can discover all the cloud apps your employees use in your organization.What information is required by Cloud Discovery to do so? Option A : Web traffic logs Option B : Trace events Option C : Metric logs Option D : Audit logs Correct Answer: A Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: To find all the apps used by your users, Cloud Discovery analyzes information in the traffic logs from firewalls/proxies through which they access the internet. Then the apps are ranked based on more than 80 risk factors to provide visibility into shadow IT. Refer to the image in the link to understand them better. Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-threat-protection-with-microsoft-365-defender/6-describe-micros oft- cloud-app-security#microsoft-cloud-app-security-architecture QUESTION: 24 In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing? Option A : the management of mobile devices Option B : the permissions for the user data stored in Azure Option C : the creation and management of user accounts Option D : the management of the physical hardware Correct Answer: D QUESTION: 25 What is a use case for implementing information barrier policies in Microsoft 365? Option A : to restrict unauthenticated access to Microsoft 365 Option B : to restrict Microsoft Teams chats between certain groups within an organization Option C : to restrict Microsoft Exchange Online email between certain groups within an organization Option D : to restrict data sharing to external email recipients Correct Answer: B Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: Information barriers are supported in Microsoft Teams, SharePoint Online, and OneDrive for Business. A compliance administrator or information barriers administrator can define policies to allow or prevent communications between groups of users in Microsoft Teams. Information barrier policies can be used for situations like these: QUESTION: 26 You need to ensure repeatability when creating new resources in an Azure subscription. What should you use? Option A : Microsoft Sentinel Option B : Azure Policy Option C : Azure Batch Option D : Azure Blueprints Correct Answer: D QUESTION: 27 Select the answer that correctly completes the sentence. Answer : Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview QUESTION: 28 CIA is a way to think about security trade-offs. What does the initialism CIA stand for? Option A : Confidentiality, Integrity, Availability Option B : Credentials, Integrity, Availability Option C : Credentials, Integrity, Accessibility Option D : Confidentiality, Integrity, Accessibility Correct Answer: A Explanation/Reference: Confidentiality, Integrity, Availability, or CIA, are principles that help define a security posture. The below link is an awesome way to understand the CIA concept. https://dev.to/azure/cia-confidentiality-integrity-and-availability-3ki3 Simply put, Maria has a pacemaker. You observe the following: ·The pacemaker is available when she needs to check her reading ·The data from the pacemaker is accurate. Integrity. ·The pacemaker data has to be kept confidential. You want to keep your disease private. Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-security-concepts-methodologies/4-describe-defense- depth#confidentiality-integrity-availability-cia QUESTION: 29 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions What is the Microsoft Purview compliance portal? Option A : A tool that helps organizations automate the process of data classification and labeling Option B : A portal that allows organizations to conduct penetration testing and vulnerability scanning against their IT infrastructure Option C : A portal that provides legal and regulatory resources to help organizations understand compliance requirements Option D : A tool that enables organizations to assess and manage their compliance posture across different cloud services and on-premises data repositories Correct Answer: D Explanation/Reference: The Microsoft Purview compliance portal is a centralized compliance management tool that helps organizations identify and manage data privacy risks across disparate data sources, on-premises and in the cloud. It enables organizations to assess and manage their compliance posture across different cloud services and on-premises data repositories, including Microsoft Azure and Microsoft 365. The Purview compliance portal also provides organizations with a unified view of their data assets and provides tools for data discovery, classification, and labeling. This helps organizations meet the requirements of various data privacy regulations, such as GDPR and CCPA, which mandate a thorough understanding of personal data and its processing. The Purview compliance portal provides tools for compliance management, rather than resources for legal and regulatory compliance. The Purview compliance portal does not allow organizations to conduct penetration testing and vulnerability scanning against their IT infrastructure. While Purview can automate the process of discovering, classifying and labeling data, it is specifically designed to manage compliance posture across different cloud services and on-premises data repositories. The Microsoft Purview compliance portal is an essential tool for organizations working with sensitive data or those subject to regulatory compliance requirements. It helps manage compliance efficiently, ensuring all data is properly identified, classified, and controlled. To learn more about Microsoft Purview and its compliance features, please visit: https://learn.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide QUESTION: 30 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Some Microsoft 365 accounts (with Enterprise E3 subscription) in your organization are compromised. You need to understand if the attacker has accessed any sensitiveinformation in the user’s email box.Is it possible? Option A : Yes Option B : No Correct Answer: B Explanation/Reference: If an attacker gains access to email messages, a MailItemsAccessed event is triggered. So, inspecting this event will help us understand if sensitive information in the user’s email box is accessed. But access to the MailItemsAccessed event is provided by Advanced Audit, which is available only for organizations that have purchased Office 365/Microsoft 365 E5/G5 subscriptions. So no, you cannot know if the attacker has accessed the user’s email box with an Enterprise E3 subscription. Quick Preview: Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-audit-capabilities-microsoft-365/3-describe-purpose- value-advanced-auditing#access-tocrucial-events-for-investigations https://docs.microsoft.com/en-us/microsoft-365/compliance/advanced-audit QUESTION: 31 Which feature provides the extended detection and response (XDR) capability of Azure Sentinel? Option A : integration with the Microsoft 365 compliance center Option B : support for threat hunting Option C : integration with Microsoft 365 Defender Option D : support for Azure Monitor Workbooks Correct Answer: C Explanation/Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/eval-overview?view=o365-worldwide Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 32 Which of the following labels would you use to mark content as a record? Option A : Sensitivity labels Option B : AIP labels Option C : Retention labels Option D : Record labels Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Correct Answer: C Explanation/Reference: You can use retention labels to: ·Create a standard label (under the Information governance section) · Create a label that marks content as records or regulatory records (under the records management section). See the below images: Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Retention labels are used to mark content as records. Option Retention labels is the correct answer. Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-information-protection-governance-capabilities- microsoft-365/7-describe-records-management Option Record labels is incorrect as there is nothing like one in the Microsoft 365 Compliance center. Option Sensitivity labels is incorrect because they protect sensitive content as they move within/outside the organization. They don’t help in records management. Reference Link: https://docs.microsoft.com/en-us/learn/modules/describe-information-protection-governance-capabilities- microsoft-365/4-describe-sensitivity-labelspolicies Option AIP (Azure Information Protection) labels is incorrect, as they are similar to sensitivity labels (they protect data in Azure and on-premises environment) in Azure. With the announcement of the Unified labeling experience, you manage the AIP labels in Office 365 Security & compliance center. Reference Link: https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection QUESTION: 33 Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions You create and apply a retention policy in Compliance Manager to:· Protect your organization against risk in the event of litigation.· To increase your compliance posture.This improvement action exists in 3 control groups and is worth 27 points. After successful implementation, you receive 81 points.Is it possible? Option A : No Option B : Yes Correct Answer: A Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: This question has several layers, so let’s uncover them. In Compliance Manager, there are two types of actions: ·Technical actions (You implement them by interacting with technology. For example, configuring a setting in Microsoft 365) ·Non-technical actions (You do not interact with technology for its implementation) The first challenge is recognizing that creating and applying a retention policy is a technical action. In the below image, we apply a retention policy to Exchange, SharePoint sites, OneDrive, and Microsoft 365 groups (This action interacts with technology, so it’s a technical action). If you implement this technical action once, it will update the implementation status in every group. Since you perform this action just once, you will receive 27 points and not 81 points. The correct answer is No. Whereas, for non-technical actions (either documentation or operational), since you implement the action separately in each group, you receive points for every implementation. If we paraphrase the question for a non-technical action, the correct answer would be Yes (81 points). Below are some of the examples of technical actions: ·Use IRM to protect online documents and storage (Azure Information Protection) ·Require mobile devices to use encryption (Exchange Online Protection) · Create mail flow rules to encrypt messages (Azure Information Protection) Below are some of the examples of non-technical actions: ·Provide data breach training ·Record disclosures of PII to third parties Reference Link: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365- Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions worldwide#action-types-and-points Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 34 Which type of identity is created when you register an application with Active Directory (Azure AD)? Option A : a user account Option B : a user-assigned managed identity Option C : a system-assigned managed identity Option D : a service principal Correct Answer: D Explanation/Reference: When you register an application through the Azure portal, an application object and service principal are automatically created in your home directory or tenant. https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal QUESTION: 35 You have an Azure subscription.You need to implement approval-based, time-bound role activation.What should you use? Option A : Windows Hello for Business Option B : Azure Active Directory (Azure AD) Identity Protection Option C : access reviews in Azure Active Directory (Azure AD) Option D : Azure Active Directory (Azure AD) Privileged Identity Management (PIM) Correct Answer: D Explanation/Reference: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure QUESTION: 36 Select the answer that correctly completes the sentence. Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: QUESTION: 37 Which of the following statements are TRUE concerning sensitivity labels and retention labels? Option A : Sensitivity labels are published to locations such as SharePoint & OneDrive; retention labels are published to users/groups. Option B : Retention labels are published to locations such as SharePoint & OneDrive; sensitivity labels are published to users/groups. Option C : Both sensitivity labels and retention labels are published to locations such as SharePoint & OneDrive. Option D : Both sensitivity labels and retention labels are published to users or groups. Correct Answer: B Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions Explanation/Reference: Sensitivity labels/retention labels define protection/retention settings respectively. To put them in use, you publish them via sensitivity/retention label policies. But the sensitivity and retention label policies work differently altogether. You publish sensitivity labels to users and groups. Whereas, you publish retention labels to different locations in Microsoft 365 like OneDrive, SharePoint, Microsoft 365 groups, Exchange, etc. Note: You create and publish retention labels in the Information governance section. Option Retention labels are published to locations such as SharePoint & OneDrive, sensitivity labels are published to users/groups is the correct answer. Reference Link: https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide#what- label-policies-can-do Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 38 For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point. Answer : Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 39 Select the answer that correctly completes the sentence. Answer : Explanation/Reference: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365-worldwide#ho w- compliance-manager-continuously- assesses-controls Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions
Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions QUESTION: 40 HOTSPOT - Select the answer that correctly completes the sentence. Answer : QUESTION: 41 Which Microsoft Purview solution can be used to identify data leakage? Option A : insider risk management Option B : Compliance Manager Option C : communication compliance Option D : eDiscovery Download All Questions: https://www.microsoftdumps.us/SC-900-exam-questions