Show
Microsoft SC-900 Microsoft Security, Compliance, and Identity Fundamentals Exam Practice TestQuestion 1What can you specify in Microsoft 365 sensitivity labels? Ahow long files must be preserved Bwhen to archive an email message Cwhich watermark to add to
files Dwhere to store files Question 2What can you protect by using the information protection solution in the Microsoft 365 compliance center? Acomputers from zero-day exploits Busers from phishing attempts Cfiles from malware and
viruses Dsensitive data from being exposed to unauthorized users Question 3Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security? AMicrosoft Service Trust Portal BCompliance Manager CMicrosoft
365 compliance center DMicrosoft Support Question 4In a Core eDiscovery workflow, what should you do before you can search for content? ACreate an eDiscovery hold. BRun Express Analysis. CConfigure attorney-client privilege detection. DExport and download results. Question 5Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers? Aretention policies Bdata loss prevention (DLP) policies Cconditional
access policies Dinformation barriers Question 6Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources? Anetwork security groups (NSGs) BAzure AD Privileged Identity Management (PIM) Cconditional
access policies Dresource locks Question 7What can you use to provide threat detection for Azure SQL Managed Instance? AMicrosoft Secure Score Bapplication security groups CAzure Defender DAzure
Bastion HOTSPOT - Answer : Reference: HOTSPOT - Answer : Explanation: HOTSPOT - Answer :
Reference: HOTSPOT - Answer : Reference: What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
Answer : D Explanation: HOTSPOT - Answer : Reference: Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Answer : C Reference: HOTSPOT - Answer : What can you use to scan
email attachments and forward the attachments to recipients only if the attachments are free from malware?
Answer : A
Reference: Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?
Answer : C Reference: What can you use to provide threat detection
for Azure SQL Managed Instance?
HOTSPOT - Answer : Which Azure Active Directory (Azure AD) feature can
you use to restrict Microsoft Intune-managed devices from accessing corporate resources?
HOTSPOT - Answer :
Reference: Which Microsoft 365 feature can you use to restrict?Microsoft Purview Information Barriers (IB) is a compliance solution that allows you to restrict two-way communication and collaboration between groups and users in Microsoft Teams, SharePoint, and OneDrive.
What can you protect by using the information protection solution in Microsoft 365 Compliance Center?Block potential malware: You can protect your environment from malware by blocking the upload of potentially malicious files. Any file that is uploaded or downloaded can be scanned against Microsoft threat intelligence and blocked instantaneously.
Which compliance feature should you use to identify documents that are employee resumes?Answer: B Explanation: Microsoft Purview Compliance Manager is a feature in the Microsoft Purview compliance portal that helps you manage your organization's compliance requirements with greater ease and convenience.
Which two tasks can you implement by using data loss prevention policies in Microsoft 365?With a DLP policy, you can identify, monitor, and automatically protect sensitive items across: Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive. Office applications such as Word, Excel, and PowerPoint.
|