SC-900 Flashcards
(279 cards)
- all azure ad license editions include the same festures.
- you can manage an azure ad tenant by using the azure portal
- your must deploy azure virtual machines to list an azure ad tenant.
- no
- yes
- no
Select the answer that correctly completes the sentence.
1. azure blueprints 2. azure policy 3. the microsoft cloud adoption framework for azure. 4 a resource lock.
Provides best practices from microsoft elployees, partners and customers including tools ane guidance to assist in an azure deployment.
Microsoft cloud adoption framework for azure
Select the answer that correctly completes the sentence.
1. customer lockbox
2. data loss prevention
3. ediscovery
4. a resource lock
Is to identify, hold and export electronic information that might be used in an investigation.
Ediscovery
Select the answer that correctly completes the sentence.
You can manage microsoft intune by using the
1 azure ad admin center
2 m365 compliance center
3 m365 defender portal
4 microsoft endpoint manager admin center
Microsoft endpoint manager admin center
Select the answer that correctly completes the sentence.
Federation is used to establish …… between organizations.
1 mfa
2 a trust relationship
3 user account synchronization
4 a vpn connection
A trust relationship
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- applying system updates increases an organizations secure score in m defender for cloud.
- the secure score in m defender for cloud can evaluate resources across multiple azure subscriptions.
3 enabling mfa increases an organizations secure score in m defender for cloud
1 yes
2 yes
3 yes
Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?
1 microsoft secure score
2 productivity score
3 secure score in azure security center
4 compliance score
4 compliance score
What do you use to provide real-time integration between Azure Sentinel and another security source?
1 azure ad connect
2 a log analytics workspace
3 azure information protection
4 a connector
4 a connector
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for
Standardization (ISO)?
A. the Microsoft Endpoint Manager admin center
B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center
C microsoft service trust portal
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
A. the management of mobile devices
B. the permissions for the user data stored in Azure
C. the creation and management of user accounts
D. the management of the physical hardware
D the management of the physical hardware
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 verify explicitly is one of the guiding principles of zero trust
2 assume breach is one of the guiding principles of zero trust
3 the zero trust security model assumes that a firewall secures the internal network from external threats.
1 yes
2 yes
3 no
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 control is a key privacy principle of microsoft
2 transparency is a key privacy principle of microsoft
3 shared responsibility is a key privacy principle of microsoft
1 yes
2 yes
3 no
Select the answer that correctly completes the sentence.
1 archiving
2 compressing
3 deduplicating
4 encrypting
A file makes the data in the file readable and usable to viewers that have the appropriate key.
Encrypting
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 digitally signing a document requires a private key.
2 verifying the authenticity of a digitally signed document requires the public key of the signer
3 verifying the authenticity of a digitally signed document requires the private key of the signer.
1 yes
2 yes
3 no
Select the answer that correctly completes the sentence.
When users sign in to the azure portal, they are first …….
1assigned permissions
2 authenticated
3 authorized
4 resolved
2 authenticated
Select the answer that correctly completes the sentence.
1 authentication
2 authorization
3 federation
4 single sign-on (sso)
Is the process of identifying wherher a signed-in user can access a specific resource.
2 authorization
Select the answer that correctly completes the sentence.
1 ad ds
2 active directory forest trusts
3 azure ad b2b
4 azure ad b2c
Enables collaboration with business partner from external organizations such as suppliers, partners and vendors. External users appear as guest users in the directory.
3 azure ad b2b
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Plan
B. Manage
C. Adopt
D. Govern
E. Define Strategy
A plan
B define strategy
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 in SaaS applying service packs to applications is the responsibility of the organization.
2 In IaaS managing the physical network is the responsibility of the cloud provider.
3 In all azure cloud deployment types managing the security of information and data is the responsibility of the organization.
1 no
2 yes
3 yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 azure ad connect can be used to implement hybrid identity
2 hybrid identity requires the implementation of two m365 tenants
3 authentication of hybrid identifies requires the synchronization of ad ds and azure ad .
1 yes
2 no
3 yes
Select the answer that correctly completes the sentence.
1 azure application insights
2 azure network watcher
3 log analytics workspaces
4 security baselines for azure
provides benchmark recommendations and guidance for protecting azure services.
4 security baselines for azure
What is an example of encryption at rest?
A. encrypting communications by using a site-to-site VPN
B. encrypting a virtual machine disk
C. accessing a website by using an encrypted HTTPS connection
D. sending an encrypted email
Encrypting a virtual machine disk
Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Define the perimeter by physical locations.
B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.
E. Use the network as the primary security boundary.
B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.
Which service should you use to view your Azure secure score?
1 alerts
2 application insights
3 subscriptions
4 policy
5 azure ad connect health
6 security center ( today microsoft defender for cloud)
7 advisor
8 monitor
6 security center ( microsoft defender for cloud)