DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Master the Microsoft SC-900 Exam with Realistic Practice Tests

Preparing for the Microsoft SC-900 exam with SPOTO's resources provides numerous advantages for individuals aiming to gain expertise in Microsoft Security, Compliance, and Identity Fundamentals. SPOTO's exam questions and answers are meticulously crafted to cover the essential aspects of security, compliance, and identity across cloud-based and related Microsoft services, ensuring comprehensive preparation. The test questions offered by SPOTO simulate the format and difficulty level of the actual exam, enabling candidates to familiarize themselves with the exam structure and enhance their confidence.Furthermore, SPOTO's study materials delve into key concepts and practical scenarios relevant to Microsoft Security, Compliance, and Identity Fundamentals, equipping candidates with the knowledge and skills needed to excel in this domain. By leveraging SPOTO's exam preparation resources, candidates can enhance their chances of passing the SC-900 exam successfully and establish a strong foundation in Microsoft Security, Compliance, and Identity Fundamentals.
Take other online exams

Question #1
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #2
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.Which security methodology does this represent?
A. threat modeling
B. identity as the security perimeter
C. defense in depth
D. the shared responsibility model
View answer
Correct Answer: C
Question #3
Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE. Each correct selection is worth one point.
A. network interface
B. n Azure App Service web app
C. virtual network
D. virtual network subnet
E. resource group
View answer
Correct Answer: AD
Question #4
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #5
Which type of identity is created when you register an application with Active Directory (Azure AD)?
A. user account
B. user-assigned managed identity
C. system-assigned managed identity
D. service principal
View answer
Correct Answer: D
Question #6
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #7
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
A. onditional access policies
B. zure AD Identity Protection
C. zure AD Privileged Identity Management (PIM)
D. uthentication method policies
View answer
Correct Answer: C
Question #8
What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.NOTE. Each correct selection is worth one point.
A. o discover and control the use of shadow IT
B. o provide secure connections to Azure virtual machines
C. o protect sensitive information hosted anywhere in the cloud
D. o provide pass-through authentication to on-premises applications
E. o prevent data leaks to noncompliant apps and limit access to regulated data
View answer
Correct Answer: ACE
Question #9
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.
A. Azure virtual machines
B. Azure Active Directory (Azure AD) users
C. Microsoft Exchange Online inboxes
D. Azure virtual networks
E. Microsoft SharePoint Online sites
View answer
Correct Answer: DE
Question #10
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #11
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #12
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #13
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #14
What is an example of encryption at rest?
A. ncrypting communications by using a site-to-site VPN
B. ncrypting a virtual machine disk
C. ccessing a website by using an encrypted HTTPS connection
D. ending an encrypted email
View answer
Correct Answer: B
Question #15
When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. user account
B. user-assigned managed identity
C. system-assigned managed identity
D. service principal
View answer
Correct Answer: BC
Question #16
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
A. icrosoft Defender for Office 365
B. icrosoft Defender Antivirus
C. icrosoft Defender for Identity
D. icrosoft Defender for Endpoint
View answer
Correct Answer: A
Question #17
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #18
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #19
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: AE
Question #20
You have a Microsoft 365 E3 subscription.You plan to audit user activity by using the unified audit log and Basic Audit. For how long will the audit records be retained?
A. 5 days
B. 0 days
C. 0 days
D. 80 days
View answer
Correct Answer: C
Question #21
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #22
What can you use to provide threat detection for Azure SQL Managed Instance?
A. icrosoft Secure Score
B. pplication security groups
C. zure Defender
D. zure Bastion
View answer
Correct Answer: C
Question #23
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #24
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #25
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.Hot Area:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #26
To which type of resource can Azure Bastion provide secure access?
A. zure Files
B. zure SQL Managed Instances
C. zure virtual machines
D. zure App Service
View answer
Correct Answer: C
Question #27
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.Hot Area:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #28
Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. o restrict unauthenticated access to Microsoft 365
B. o restrict Microsoft Teams chats between certain groups within an organization
C. o restrict Microsoft Exchange Online email between certain groups within an organization
D. o restrict data sharing to external email recipients
View answer
Correct Answer: AB
Question #29
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #30
What is a use case for implementing information barrier policies in Microsoft 365?
A. icrosoft Defender for Cloud
B. zure Blueprints
C. icrosoft Sentinel
D. zure Policy
View answer
Correct Answer: B
Question #31
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
A. Microsoft Defender for Office 365
B. Microsoft Defender Antivirus
C. Microsoft Defender for Identity
D. Microsoft Defender for Endpoint
View answer
Correct Answer: A
Question #32
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?
A. he Microsoft Endpoint Manager admin center
B. zure Cost Management + Billing
C. icrosoft Service Trust Portal
D. he Azure Active Directory admin center
View answer
Correct Answer: C
Question #33
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.Hot Area:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #34
What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?
A. pplications
B. etwork controls
C. perating systems
D. ccounts and identities
View answer
Correct Answer: D
Question #35
Which type of alert can you manage from the Microsoft 365 Defender portal?
A. icrosoft Defender for Storage
B. icrosoft Defender for SQL
C. icrosoft Defender for Endpoint
D. icrosoft Defender for IoT
View answer
Correct Answer: C
Question #36
DRAG DROP (Drag and Drop is not supported)You are evaluating the compliance score in Microsoft Purview Compliance Manager.Match the compliance score action subcategories to the appropriate actions.To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.Note: Each correct match is worth one point.Select and Place:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #37
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #38
Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: BCD
Question #39
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #40
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #41
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
A. utomated remediation
B. utomated investigation
C. dvanced hunting
D. etwork protection
View answer
Correct Answer: D
Question #42
What can you use to provide threat detection for Azure SQL Managed Instance?
A. Microsoft Secure Score
B. application security groups
C. Microsoft Defender for Cloud
D. Azure Bastion
View answer
Correct Answer: C
Question #43
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #44
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #45
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.Hot Area:
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #46
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #47
HOTSPOT (Drag and Drop is not supported)For each of the following statements, select Yes if the statement is true. Otherwise, select No.Note: Each correct selection is worth one point.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #48
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #49
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?
A. udit
B. ompliance Manager
C. ontent Search
D. lerts
View answer
Correct Answer: C
Question #50
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #51
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.Note: Each correct selection is worth one point.
A. hreat modeling
B. dentity as the security perimeter
C. efense in depth
D. he shared responsibility model
View answer
Correct Answer: AD
Question #52
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
A. automated remediation
B. automated investigation
C. advanced hunting
D. network protection
View answer
Correct Answer: D
Question #53
HOTSPOT (Drag and Drop is not supported)Select the answer that correctly completes the sentence.Hot Area:
A. ee Explanation section for answer
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: