1. All Azure A.D. license editions include the same features. (Y/N): No
2. You can manage an Azure A.D. tenant by using the Azure portal. (Y/N): Yes
3. You must deploy Azure vm to host an Azure AD tenant (Y/N): No
4. provides best practices from Microsoft employees, partners, and
customers, including tools and guidance to assist in an Azure deployment.
Azure Blueprints
Azure Policy
The Microsoft Cloud Adoption Framework for Azure
A resource lock: The Microsoft Cloud Adoption Framework for Azure
5. is used to identify, hold, and export electronic information that
might be used in an investigation.
Customer lockbox
Data loss prevention (DLP)
eDiscovery
A resource lock: eDiscovery
6. You can manage Microsoft Intune by using the .
Azure AD admin center
Microsoft 365 compliance center
Microsoft 365 Defender portal
Microsoft endpoint manager admin center: Microsoft Endpoint Manager admin
center
7. Federation is used to establish between organizations.
multi-factor authentication (MFA)
a trust relationship
user account synchronization
a VPN connection: a trust relationship
8. Applying system updates increases an organization's secure score in Mi-
crosoft Defender for Cloud (Y/N): Yes
9. The secure score in Microsoft Defender for Cloud can evaluate resources
across multiple Azure subscriptions (Y/N): Yes
10. Enabling MFA increases an organization's secure score in Microsoft De-
fender for Cloud (Y/N): Yes
11. Which score measures an organization's progress in completing actions
that help reduce risks associated to data protection and regulatory stan-
dards?: Compliance score
12. What do you use to provide real-time integration between Azure Sentinel
and another security source?: a connector
, SC-900 Questions With Correct Answers
13. Which Microsoft portal provides information about how Microsoft cloud
services comply with regulatory standard, such as International Organization
for Standardization (ISO)?: Microsoft Service Trust Portal
14. In the shared responsibility model for an Azure deployment, what is
Microsoft solely responsible for managing?: the management of the physical
hardware
15. Verify explicitly is one of the guiding principles of Zero Trust. (Y/N)
Assume breach is one of the guiding principles of Zero Trust. (Y/N)
The Zero Trust security model assumes that a firewall secures the internal
network from external threats. (Y/N): Yes
Yes
No
16. Control is a key privacy principle of Microsoft
(Y/N)
Transparency is a key privacy principle of Microsoft
(Y/N)
Shared responsibility is a key privacy principle of Microsoft
(Y/N): Yes
Yes
No
17. a file makes the data in the file readable and usable to viewers
that have the appropriate key.: Encrypting
18. Digitally signing a document requires a private key. (Y/N)
Verifying the authenticity of a digitally signed document requires the public
key of the signer. (Y/N)
Verifying the authenticity of a digitally signed document requires the private
key of the signer. (Y/N): Yes
Yes
No
19. When users sign in to the Azure portal, they are first : authenticated
20. is the process of identifying whether a signed-in user can
access a specific resource.: authorization
21. enables collaboration with business partners from external organizations
such as suppliers, partners, and vendors. external users appear as guest
users in the directory
AD DS (Active Directory Domain Services)
AD forest trusts
Azure AD business-to-business (B2B)