SC900 Kindle IP Specialist Flashcards
(246 cards)
A company wants to make use of Windows Hello for business when it comes to authentication. Which of the following are the authentication methods available for Windows Hello for business?
A. PIN
B. Facial Recognition
C. Email message
D. Password
E. Fingerprint recognition
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 15). Kindle Edition.
A. PIN
B. Facial Recognition
E. Fingerprint recognition
Explanation:
The entire purpose of Windows Hello for Business is to ensure passwords are not used in the authentication process. Here, users can use other techniques for authentication via the use of PINs and bio metric recognitions
Your company has just set up an Azure subscription. They have the following requirements. “Be capable of executing a set of resources, resource groups, and role assignments to a set of subscriptions.” Which of the following can be applied to meet the requirement?
A. Apply lock to an Azure Policy
B. Apply lock to an Azure Blueprints
C. Apply lock to an Azure AD Identity Protection
D. Apply lock to an Azure Resource Group
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (pp. 15-16). Kindle Edition.
D. Apply lock to an Azure Resource Group
Explanation:
Here, you can define a lock on an Azure resource group. This would ensure that no one accidentally deletes resources in a resource group
You are considering the use of sensitivity labels in Microsoft 365. Can sensitivity labels be used to encode the lists in documents?
A. Yes
B. B. No
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 16). Kindle Edition.
A. Yes
Explanation:
When you use a Confidential label on a document, the label will encode the content in the document
You are planning on making use of the Azure Bastion service. Can you use the Azure Bastion service to limit traffic from the Internet onto an Azure virtual machine?
A. Yes
B. No
- You are looking at the capabilities of Azure Active Directory. Can you use Azure Active Directory to achieve device registrations in Azure Active Directory? A. Yes B. No
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 16). Kindle Edition.
B. No
Explanation:
You cannot use the Azure Bastion service to limit traffic into a Virtual machine. For this, you will want to use network security groups
Your company is planning on using Azure Cloud Services. Which of the following can be used to ensure that data can be read only by authorized users?
A. Encryption
B. Deduplication
C. Archiving
D. Compression
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 16). Kindle Edition.
A. Encryption
Explanation:
You can ensure data is encrypted. The encryption key can then be sued to decode and read out the data
Your company is planning on using Azure Active Directory to store identities. They need to make use of the self-service password reset feature. Which of the following authentication methods are accessible for self-service password reset?
A. Email
B. A passport Identification Number
C. A picture Message
D. Mobile App Notification
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 17). Kindle Edition.
Which of the following is a management and security orchestration automated response solution?
A. Azure Sentinel
B. Microsoft Defender for Cloud
C. Azure Active Directory
D. Azure AD Identity Protection
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 17). Kindle Edition.
A. Azure Sentinel
Explanation:
Azure Sentinel has the potential to consume data from a variety of sources and perform threat monitoring on that data
Which of the following offers advanced and intelligent protection of Azure and hybrid resources and workloads?
A. Azure Defender
B. Azure Policies
C. Azure Blueprints
D. Azure Active Directory
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 17). Kindle Edition.
A. Azure Defender
Explanation:
With Azure Defender, you can allow intelligent protection of your resources specified in Azure and your on premises infrastructure
Which of the following is available for the Azure Application Gateway service that helps to protect web applications from common exploits and vulnerabilities?
A. Azure Firewall
B. Azure Web Application Firewall
C. Azure Policy
D. Azure Identity Protection
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (pp. 17-18). Kindle Edition.
B. Azure Web Application Firewall
Explanation:
The Azure WAF can be used along with the Azure Application Gateway resource to defend web applications from common activities and vulnerabilities
You are evaluating the different services available in Azure when regarding security. Which of the following can be achieved using the Azure Privileged Identity Managed service?
A. Filter traffic to Azure virtual machines
B. Allow Multi-Factor Authentication for users
C. Offer just-in-time access to resource roles
D. Determine the security posture of resources
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 18). Kindle Edition.
C. Offer just-in-time access to resource roles
Explanation:
With Azure Privileged Identity Management, you can offer just in time access to Azure AD roles and resource roles
And the right to use can be allowed or rejected accordingly
You are evaluating the different discovery tools available in Microsoft 365. You want to be capable of quickly getting the email in your own Exchange mailboxes. Which of the following would you use for this need?
A. Core eDiscovery
B. Advanced eDiscovery
C. Sensitivity Labels
D. Content Search
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 18). Kindle Edition.
D. Content Search
Explanation:
The Content Search tool can be used to quickly find the email in Exchange mailboxes, documents in SharePoint sites, and OneDrive locations
You are evaluating the different discovery tools available in Microsoft 365. You want basic capabilities for exploring and exporting content in Microsoft 365. Which of the following would you use for this need?
A. Core eDiscovery
B. Privileged Access Management
C. Sensitivity Labels
D. Content Search
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 18). Kindle Edition.
D. Content Search
Explanation:
The Content search tool can be used to quickly find the email in Exchange mailboxes, documents in SharePoint sites and OneDrive locations
Which two types of resources can be protected by using Azure Firewall?
A. Azure Virtual Machines
B. Azure Active Directory (Azure AD) Users
C. Microsoft Exchange Online Inboxes
D. Azure Virtual Networks
E. Microsoft SharePoint Online Sites
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (pp. 18-19). Kindle Edition.
A. Azure Virtual Machines
D. Azure Virtual Networks
Explanation:
When it is formed, the services and Virtual Machines within the Azure network connect securely with each other
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure. Which security methodology does this represent?
A. Threat Modeling
B. Identity as the Security Perimeter
C. Defense in Depth
D. The Shared Responsibility Model
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 19). Kindle Edition.
C. Defense in Depth
Explanation:
The Objective of defense in depth is to protect information and prevent it from being stolen by those who are not authorized to access it
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
A. Microsoft Defender for Office 365
B. Microsoft Defender Antivirus
C. Microsoft Defender for Identity
D. Microsoft Defender for Endpoint
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 19). Kindle Edition.
- Which feature provides the Extended Detection and Response (XDR) capability of Azure Sentinel?
A. Combination with the Dynamic 365
B. Support for Threat Hunting
C. Integration with Microsoft 365 Defender
D. Support for Azure Monitor Workbooks
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 19). Kindle Edition.
What should you use in the Microsoft 365 Defender portal to view security trends and track the protection status of identities? A. Attack simulator B. Reports C. Hunting D. Incidents
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 19). Kindle Edition.
You have a Microsoft 365 E3 subscription. You plan to audit user activity by using the integrated audit log and Basic Audit. For how long will the audit records be maintained?
A. 15 days
B. 30 days
C. 90 days
D. 180 days
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (pp. 19-20). Kindle Edition.
C. 90 days
Explanation:
In the Basic Audit, audit records are maintained and searchable for the last 90 days. To recover an audit log for a longer period, you should adopt Advanced Auditing
To which type of resource can Azure Bastion provide secure access?
A. Azure Files
B. Azure SQL Managed Instances
C. Azure Virtual Machines
D. Azure App Service
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 20). Kindle Edition.
C. Azure Virtual Machines
Explanation:
Azure Bastion offers secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS
What is an example of encryption at rest?
A. Encoding communications by using a site-to-site VPN
B. Encrypting a virtual machine disk
C. Logging into a website by using an encrypted HTTPS connection
D. Sending an encrypted email
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 20). Kindle Edition.
B. Encrypting a virtual machine disk
Explanation:
Encryption at Rest is a common security requirement. Organizations have the choice of allowing Azure to completely manage Encryption at Rest
- Which three statements accurately describe the guiding principles of Zero Trust?
A. Define the perimeter by physical locations
B. Use identity as the main security boundary
C. Validate the permissions of a user explicitly
D. Assume that the user system can be violated E. Use the network as the primary security boundary
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 20). Kindle Edition.
B. Use identity as the main security boundary
C. Validate the permissions of a user explicitly
D. Assume that the user system can be violated E. Use the network as the primary security boundary
Explanation:
A Zero Trust approach must extend throughout the complete digital estate and serve as an integrated security philosophy and end to end strategy
This is done by applying Zero Trust controls and technologies
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
A. Azure AD PIM
B. Azure MFA
C. Azure AD Identity Protection
D. Conditional Access Policies
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (pp. 20-21). Kindle Edition.
D. Conditional Access Policies
Explanation:
Conditional Access templates are created to offer a convenient method to deploy new policies associated with Microsoft recommendations
Which score measures an organization’s progress in completing actions that help reduce risks associated with data protection and regulatory standards?
A. Microsoft Secure Score
B. Productivity Score
C. Secure score in Azure Defender
D. Compliance Score
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 21). Kindle Edition.
D. Compliance Score
Explanation:
The Compliance Manage dashboard shows your overall compliance score. This score determines your progress in completing recommended recovery actions within controls
What do you use to provide real-time integration between Azure Sentinel and another security source? A. Azure AD Connect B. A Log Analytics Workspace C. Azure Information Protection D. A Connector
Specialist, IP. SC-900: Microsoft Security, Compliance, and Identity Fundamentals: +250 Exam Practice Questions with Detail Explanations and Reference Links : Second Edition - 2023 (p. 21). Kindle Edition.