Microsoft SCI fundamentals assessment 1 Flashcards

1
Q

Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?

A

Compliance score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you use to provide real-time integration between Azure Sentinel and another security source?

A

A connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Microsoft portal information about how Microsoft cloud services comply with regulatory standards, such as International Organization for Standardization (ISO)?

A

Microsoft Service Trust Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

A

The management of the physical hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

A

Conditional access policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?

A

Azure AD Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

A

to prevent users from using specific words in their passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?

A

Access reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?

A

Azure AD Privileged Identity Management (PIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities

A

reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two capabilities of Microsoft Defender for Endpoint?

A

-automated investigation and remediation
-attack surface reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft Sharepoint online site that contain a specific key word?

A

Content search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365?

A

-Display policy tips to users who are about to violate your organization’s policies
-Protect documents in Microsoft OneDrive that contains sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

A

sensitivity labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a use case for implementing information barrier policies in Microsoft 365?

A

to restrict Microsoft Exchange Online email between certain groups within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

A

Azure Blueprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Yes or No
All Azure Active Directory (Azure AD) license editions include the same features.

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal.

yes or no

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Select Yes if the following statement is true. Otherwise select No:

You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant.

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____________ provides best practices from Microsoft employees, partners, and customers, including tools and guidance to assist in an Azure deployment.

A

The Microsoft Cloud Adoption Framework for Azure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

______ is used to identify, hold, and export electronic information that might be used in an investigation.

A

eDiscovery

22
Q

You can manage Microsoft Intune by using the _________________.

A

Microsoft Endpoint Manager admin center.

23
Q

Federation is used to establish _______ between organizations.

A

a trust relationship

24
Q

Select Yes if the following statement is true. Otherwise, select No:

Applying system updates increases an organization’s secure score in Azure Security Center.

A

yes

25
Q

Select Yes if the following statement is true. Otherwise, select No:

The secure score in Azure Security Center can evaluate resources across multiple Azure subscriptions.

A

yes

26
Q

Select Yes if the following statement is true. Otherwise, select No:

Enabling multi-factor authentication (MFA) increases an organization’s secure score in Azure Security Center.

A

yes

27
Q

Select Yes if the following statement is true. Otherwise, select No:

Verify explicitly is one of the guiding principles of Zero Trust.

A

yes

28
Q

Select Yes if the following statement is true. Otherwise, select No:

Assume breach is one of the guiding principles of Zero Trust.

A

yes

29
Q

Select Yes if the following statement is true. Otherwise, select No:

The Zero Trust security model assumes that a firewall secures the internal network from external threats.

A

no

30
Q

Select Yes if the following statement is true. Otherwise, select No:

Control is a key privacy principle of Microsoft.

A

yes

31
Q

Select Yes if the following statement is true. Otherwise, select No:

Transparency is a key privacy principle of Microsoft.

A

yes

32
Q

Yes if the following statement is true. Otherwise, select No:

Shared responsibility is a key privacy principle of Microsoft.

A

no

33
Q

_____ a file makes the data in the file readable and usable to viewers that have the appropriate key.

A

Encrypting

34
Q

Yes if the following statement is true. Otherwise, select No:

You can create custom roles in Azure Active Directory (Azure AD).

A

yes

35
Q

Yes if the following statement is true. Otherwise, select No:

Global administrator is a role in Azure Active Directory (Azure AD).

A

yes

36
Q

Yes if the following statement is true. Otherwise, select No:

An Azure Active Directory (Azure AD) use can be assigned only one role.

A

no

37
Q

Yes if the following statement is true. Otherwise, select No:

Azure Active Directory (Azure AD) is deployed to an on-premises environment

A

no

38
Q

Yes if the following statement is true. Otherwise, select No:

Azure Active Directory (Azure AD) is provided as part of a Microsoft 365 subscription.

A

yes

39
Q

Yes if the following statement is true. Otherwise, select No:

Azure Active Directory (Azure AD) is an identity and access management service.

A

yes

40
Q

With Windows Hello for Business, a user’s biometric data used for authentication __________.

A

is stored on a local device only.

41
Q

________ requires additional verification, such as a verification code sent to a mobile phone.

A

Multi-factor authentication (MFA)

42
Q

Yes if the following statement is true. Otherwise, select No:

Conditional access policies can use the device state as a signal.

A

yes

43
Q

Yes if the following statement is true. Otherwise, select No:

Conditional access policies apply before first-factor authentication is complete.

A

no

44
Q

Yes if the following statement is true. Otherwise, select No:

Conditional access policies can trigger multi-factor authentication (MFA) if a user attempts to access a specific application.

A

yes

45
Q

_____ is a cloud-based solution that leverages on-premises Active Directory signals to identify, detect, and investigate advanced threats.

A

Microsoft Defender for Identity

46
Q

Microsoft Defender for Identity can identify advanced threats from __________ signals.

A

on-premises Active Directory Domain Services (AD DS)

47
Q

Azure Active Directory (Azure AD) is ________________ used for authentication and authorization.

A

an identity provider

48
Q

_________________ can use conditional access policies to control sessions in real time.

A

Microsoft Cloud App Security

49
Q

Azure DDoS Protection Standard can be used to protect ____________.

A

virtual networks

50
Q

You can use ______ in the Microsoft 365 security center to identify devices that are affected by an alert.

A

incidents