SC-900 Exam - With Discussions
SC-900 Exam - With Discussions
SC-900 Exam - With Discussions
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/get-started/
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/
upvoted 4 times
Question #3 Topic 1
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview
https://docs.microsoft.com/en-us/microsoft-365/compliance/ediscovery?view=o365-worldwide
upvoted 59 times
ref: https://docs.microsoft.com/en-us/microsoft-365/compliance/customer-lockbox-requests?view=o365-worldwide
upvoted 2 times
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed
upvoted 5 times
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
System updates reduces security vulnerabilities, and provide a more stable environment for end users. Not applying updates leaves unpatched
vulnerabilities and results in environments that are susceptible to attacks.
Box 2: Yes -
Box 3: Yes -
If you only use a password to authenticate a user, it leaves an attack vector open. With MFA enabled, your accounts are more secure.
Reference:
https://docs.microsoft.com/en-us/azure/security-center/secure-score-security-controls
Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory
standards?
B. Productivity Score
D. Compliance score
Correct Answer: D
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide https://docs.microsoft.com/en-
us/microsoft-365/compliance/compliance-score-calculation?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide#understanding-your-compliance-score
upvoted 4 times
What do you use to provide real-time integration between Azure Sentinel and another security source?
A. Azure AD Connect
D. a connector
Correct Answer: D
To on-board Azure Sentinel, you first need to connect to your security sources. Azure Sentinel comes with a number of connectors for Microsoft
solutions, including Microsoft 365 Defender solutions, and Microsoft 365 sources, including Office 365, Azure AD, Microsoft Defender for
Identity, and Microsoft Cloud App
Security, etc.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/overview
https://docs.microsoft.com/en-us/azure/sentinel/connect-data-sources
upvoted 9 times
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International
Organization for
Standardization (ISO)?
Correct Answer: C
The Microsoft Service Trust Portal contains details about Microsoft's implementation of controls and processes that protect our cloud services
and the customer data therein.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal?view=o365-worldwide
https://servicetrust.microsoft.com/
upvoted 9 times
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
Correct Answer: D
https://docs.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility
upvoted 11 times
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
Box 2: Yes -
Box 3: No -
The Zero Trust model does not assume that everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies
each request as though it originated from an uncontrolled network.
Reference:
https://docs.microsoft.com/en-us/security/zero-trust/
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://privacy.microsoft.com/en-US/
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
A certificate is required that provides a private and a public key.
Box 2: Yes -
The public key is used to validate the private key that is associated with a digital signature.
Box 3: Yes -
The private key, or rather the password to the private key, validates the identity of the signer.
Reference:
https://support.microsoft.com/en-us/office/obtain-a-digital-certificate-and-create-a-digital-signature-e3d9d813-3305-4164-a820-2e063d86e512
https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/fin-ops/organization-administration/electronic-signature-overview
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/app-service/overview-authentication-authorization
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b
"Azure Active Directory (Azure AD) business-to-business (B2B) collaboration is a feature within External Identities that lets you invite guest users to
collaborate with your organization. With B2B collaboration, you can securely share your company's applications and services with guest users from
any other organization, while maintaining control over your own corporate data."
upvoted 6 times
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a
complete solution.
NOTE: Each correct selection is worth one point.
A. Plan
B. Manage
C. Adopt
D. Govern
E. Define Strategy
Correct Answer: AE
Reference:
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/cloud-services-security-baseline
"Security baselines for Azure help you strengthen security through improved tooling, tracking, and security features. They also provide you a
consistent experience when securing your environment."
upvoted 3 times
Question #22 Topic 1
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
Correct Answer: D
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-policy-common
Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused
access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
upvoted 2 times
In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory
(Azure AD)?
B. Azure Sentinel
C. Azure AD Connect
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-azure-ad-connect
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/plan-connect-topologies
upvoted 4 times
Question #25 Topic 1
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
Azure AD supports custom roles.
Box 2: Yes -
Global Administrator has access to all administrative features in Azure Active Directory.
Box 3: No -
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/roles/concept-understand-roles https://docs.microsoft.com/en-us/azure/active-
directory/roles/permissions-reference
1. https://docs.microsoft.com/en-us/azure/active-directory/roles/custom-create
2,3 https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
upvoted 10 times
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: No -
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.
Box 2: Yes -
Microsoft 365 uses Azure Active Directory (Azure AD). Azure Active Directory (Azure AD) is included with your Microsoft 365 subscription.
Box 3: Yes -
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-identity?view=o365-worldwide
So I go with:
False
True
True
upvoted 6 times
Ref: https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-identity?view=o365-
worldwide#:~:text=Microsoft%20365%20uses%20Azure%20Active,and%20authentication%20for%20Microsoft%20365.
upvoted 2 times
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise
upvoted 3 times
Question #28 Topic 1
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
B. to identify devices to which users can sign in without using multi-factor authentication (MFA)
Correct Answer: D
Azure AD Password Protection detects and blocks known weak passwords and their variants, and can also block additional weak terms that are
specific to your organization.
With Azure AD Password Protection, default global banned password lists are automatically applied to all users in an Azure AD tenant. To
support your own business and security needs, you can define entries in a custom banned password list.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad-on-premises
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad
upvoted 9 times
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require
membership in a group?
A. access reviews
B. managed identities
Correct Answer: A
Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise
applications, and role assignments.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview
upvoted 17 times
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to
enter a code on their cellphone or to provide a fingerprint scan.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks
https://docs.microsoft.com/en-us/azure/active-directory/authentication/tutorial-enable-azure-mfa
upvoted 7 times
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
Box 2: No -
Conditional Access policies are enforced after first-factor authentication is completed.
Box 3: Yes -
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-policies
upvoted 10 times
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/defender-for-identity/what-is
https://docs.microsoft.com/en-us/defender-for-identity/what-is
upvoted 9 times
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect,
and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Reference:
https://docs.microsoft.com/en-us/defender-for-identity/what-is
https://docs.microsoft.com/en-us/defender-for-identity/what-is
upvoted 6 times
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Azure Active Directory (Azure AD) is a cloud-based user identity and authentication service.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/enterprise/about-microsoft-365-identity?view=o365-worldwide
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-whatis
upvoted 6 times
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
Correct Answer: C
Azure AD Privileged Identity Management (PIM) provides just-in-time privileged access to Azure AD and Azure resources
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
C. email verification
D. phone call
E. security question
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your
organization?
B. Customer Lockbox
C. information batteries
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-barriers
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
Conditional access policies can be applied to all users
Box 2: No -
Conditional access policies are applied after first-factor authentication is completed.
Box 3: Yes -
Users with devices of specific platforms or marked with a specific state can be used when enforcing Conditional Access policies.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
When you register an application through the Azure portal, an application object and service principal are automatically created in your home
directory or tenant.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal
Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. fingerprint
B. facial recognition
C. PIN
D. email verification
E. security question
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/concept-fundamentals-security-defaults
Security defaults make it easier to help protect your organization from these attacks with preconfigured security settings:
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security
https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad
upvoted 4 times
Question #44 Topic 1
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview
Since Azure Resources is not listed as part of the option, VIRTUAL NETWORK is the correct answer
https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview
upvoted 19 times
What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?
A. Attack simulator
B. Reports
C. Hunting
D. Incidents
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/reports-and-insights-in-security-and-compliance?view=o365-
worldwide
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview?view=o365-worldwide
What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.
NOTE: Each correct selection is worth one point.
B. transport encryption
C. shadow IT detection
Correct Answer: AD
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide#microsoft-
defender-for-endpoint
upvoted 14 times
Question #48 Topic 1
DRAG DROP -
Match the Azure networking service to the appropriate description.
To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than
once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
Correct Answer:
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated
response (SOAR) solution.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/overview
https://docs.microsoft.com/en-us/azure/sentinel/overview
upvoted 7 times
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
Azure Defender provides security alerts and advanced threat protection for virtual machines, SQL databases, containers, web applications, your
network, your storage, and more
Box 2: Yes -
Cloud security posture management (CSPM) is available for free to all Azure users.
Box 3: Yes -
Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and
provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not - as well as on premises.
Reference:
https://docs.microsoft.com/en-us/azure/security-center/azure-defender https://docs.microsoft.com/en-us/azure/security-center/defender-for-
storage-introduction https://docs.microsoft.com/en-us/azure/security-center/security-center-introduction
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/threat-analytics?view=o365-worldwide
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network. A network
security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure
resources. For each rule, you can specify source and destination, port, and protocol.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune https://docs.microsoft.com/en-
us/mem/intune/fundamentals/what-is-device-management
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview https://docs.microsoft.com/en-us/azure/bastion/tutorial-create-host-portal
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
A. automated remediation
B. automated investigation
C. advanced hunting
D. network protection
Correct Answer: D
Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction capability.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/overview
"Automate your common tasks and simplify security orchestration with playbooks that integrate with Azure services and your existing tools."
upvoted 2 times
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Correct Answer: DE
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
A. threat modeling
C. defense in depth
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Y
Y
N
upvoted 4 times
Question #60 Topic 1
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/office365/servicedescriptions/office-365-advanced-threat-protection-service-description
Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/eval-overview?view=o365-worldwide
The Microsoft 365 Defender connector for Azure Sentinel (preview) sends all Microsoft 365 Defender incidents and alerts information to Azure
Sentinel and keeps the incidents synchronized.
Once you add the connector, Microsoft 365 Defender incidents—which include all associated alerts, entities, and relevant information received
from Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Cloud App Security—are
streamed to Azure Sentinel as security information and event management (SIEM) data, providing you with context to perform triage and incident
response with Azure Sentinel.
Once in Azure Sentinel, incidents remain bi-directionally synchronized with Microsoft 365 Defender, allowing you to take advantage of the benefits
of both the Microsoft 365 Defender portal and Azure Sentinel in the Azure portal for incident investigation and response.
https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender-integration-with-azure-sentinel?view=o365-worldwide
upvoted 6 times
Question #62 Topic 1
What can you use to provide threat detection for Azure SQL Managed Instance?
C. Azure Defender
D. Azure Bastion
Correct Answer: C
https://docs.microsoft.com/en-us/azure/security-center/azure-defender
upvoted 7 times
Question #63 Topic 1
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score?view=o365-worldwide
upvoted 4 times
Question #64 Topic 1
Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?
D. resource locks
Correct Answer: C
Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete
solution.
NOTE: Each correct selection is worth one point.
A. Display policy tips to users who are about to violate your organizationג€™s policies.
Correct Answer: AC
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365-worldwide#how-compliance-manager-
continuously- assesses-controls
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
You can use sensitivity labels to provide protection settings that include encryption of emails and documents to prevent unauthorized people
from accessing this data.
Box 2: Yes -
You can use sensitivity labels to mark the content when you use Office apps, by adding watermarks, headers, or footers to documents that have
the label applied.
Box 3: Yes -
You can use sensitivity labels to mark the content when you use Office apps, by adding headers, or footers to email that have the label applied.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
Mark the content when you use Office apps, by adding watermarks, headers, or footers to email or documents that have the label applied.
Watermarks can be applied to documents but not email. Example header and watermark:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
upvoted 3 times
Mark the content when you use Office apps, by adding watermarks, headers, or footers to email or documents that have the label applied.
Watermarks can be applied to documents but not email. Example header and watermark:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
upvoted 6 times
Mark the content when you use Office apps, by adding watermarks, headers, or footers to email or documents that have the label applied.
Watermarks can be applied to documents but not email. Example header and watermark:
upvoted 1 times
The email itself will NOT get a watermark. So depending on how you read the question, either answer could be acceptable. Given the point of the
test and the fact that under the circumstances a document could be attached, so a security label could be applied, I would say there is a better
argument for a YES answer on the test.
upvoted 4 times
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
upvoted 2 times
"Mark the content when you use Office apps, by adding watermarks, headers, or footers to email or documents that have the label applied.
Watermarks can be applied to documents but not email."
upvoted 2 times
Provide protection settings that include encryption and content markings. For example, apply a "Confidential" label to a document or email, and
that label encrypts the content and applies a "Confidential" watermark. Content markings include headers and footers as well as watermarks, and
encryption can also restrict what actions authorized people can take on the content."
upvoted 1 times
You can apply sensitivity labels to your files and emails to keep them compliant with your organization's information protection policies.
https://support.microsoft.com/en-us/office/apply-sensitivity-labels-to-your-files-and-email-in-office-2f96e7cd-d5a4-403b-8bd7-4cc636bae0f9
upvoted 3 times
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?
A. Content Search
B. sensitivity labels
C. retention policies
D. eDiscovery
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: No -
Compliance Manager tracks Microsoft managed controls, customer-managed controls, and shared controls.
Box 2: Yes -
Box 3: Yes -
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/governance/policy/overview
What is a use case for implementing information barrier policies in Microsoft 365?
C. to restrict Microsoft Exchange Online email between certain groups within an organization
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-barriers-policies?view=o365-worldwide
Double-click the user and go to the Mailbox features page. Under Mobile Devices, click Disable Exchange ActiveSync and Disable OWA for Devices,
and answer Yes to both when prompted.
Under Email Connectivity, click Disable and answer Yes when prompted.
upvoted 1 times
To learn more about the user experience with information barriers, see information barriers in Microsoft Teams.
upvoted 1 times
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
A. Azure Defender
B. Azure Blueprints
C. Azure Sentinel
D. Azure Policy
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/azure/governance/blueprints/overview
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: Yes -
The MailItemsAccessed event is a mailbox auditing action and is triggered when mail data is accessed by mail protocols and mail clients.
Box 2: No -
Basic Audit retains audit records for 90 days.
Advanced Audit retains all Exchange, SharePoint, and Azure Active Directory audit records for one year. This is accomplished by a default audit
log retention policy that retains any audit record that contains the value of Exchange, SharePoint, or AzureActiveDirectory for the Workload
property (which indicates the service in which the activity occurred) for one year.
Box 3: yes -
Advanced Audit in Microsoft 365 provides high-bandwidth access to the Office 365 Management Activity API.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/advanced-audit?view=o365-worldwide https://docs.microsoft.com/en-
us/microsoft-365/compliance/auditing-solutions-overview?view=o365-worldwide#licensing-requirements https://docs.microsoft.com/en-
us/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/ microsoft-365-
security-compliance-licensing-guidance#advanced-audit
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: No -
Box 2: Yes -
Leaked Credentials indicates that the user's valid credentials have been leaked.
Box 3: Yes -
Multi-Factor Authentication can be required based on conditions, one of which is user risk.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection https://docs.microsoft.com/en-
us/azure/active-directory/identity-protection/concept-identity-protection-risks https://docs.microsoft.com/en-us/azure/active-
directory/authentication/tutorial-risk-based-sspr-mfa
"These risk detections can trigger actions such as requiring users to provide multifactor authentication, reset their password, or block access until
an administrator takes action."
https://docs.microsoft.com/en-us/learn/modules/describe-identity-protection-governance-capabilities/5-describe-azure?ns-enrollment-
type=LearningPath&ns-enrollment-id=learn.wwl.describe-capabilities-of-microsoft-identity-access-management-solutions
upvoted 7 times
Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a
specific key word?
A. Audit
B. Compliance Manager
C. Content Search
D. Alerts
Correct Answer: C
The Content Search tool in the Security & Compliance Center can be used to quickly find email in Exchange mailboxes, documents in SharePoint
sites and
OneDrive locations, and instant messaging conversations in Skype for Business.
The first step is to starting using the Content Search tool to choose content locations to search and configure a keyword query to search for
specific items.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-for-content?view=o365-worldwide
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide
Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated
credit card numbers?
A. retention policies
D. information barriers
Correct Answer: B
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview
In a Core eDiscovery workflow, what should you do before you can search for content?
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-core-ediscovery?view=o365-worldwide
Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?
B. Compliance Manager
D. Microsoft Support
Correct Answer: A
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal?view=o365-worldwide
What can you protect by using the information protection solution in the Microsoft 365 compliance center?
Correct Answer: D
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
Correct Answer: C
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Box 1: No -
Advanced Audit helps organizations to conduct forensic and compliance investigations by increasing audit log retention.
Box 2: No -
Box 3: Yes -
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/advanced-audit?view=o365-worldwide
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources?tabs=json
upvoted 5 times
HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-sensitivity-labels?view=o365-worldwide