Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Exam Free

SC-900 Practice Exam Free

Table of Contents

Toggle
  • SC-900 Practice Exam Free – 50 Questions to Simulate the Real Exam
  • Free Access Full SC-900 Practice Exam Free

SC-900 Practice Exam Free – 50 Questions to Simulate the Real Exam

Are you getting ready for the SC-900 certification? Take your preparation to the next level with our SC-900 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.

Using a SC-900 practice exam free is one of the best ways to:

  • Experience the format and difficulty of the real exam
  • Identify your strengths and focus on weak areas
  • Improve your test-taking speed and accuracy

Below, you will find 50 realistic SC-900 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.

Question 1

HOTSPOT -
Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/azure/security-center/secure-score-access-and-track

Question 2

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. text message (SMS)

B. Microsoft Authenticator app

C. email verification

D. phone call

E. security question

 


Suggested Answer: ABD

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods

Question 3

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: No –
Microsoft Sentinel data connectors are available for non-Microsoft services like Amazon Web Services.
Box 2: Yes –
Once you have connected your data sources to Microsoft Sentinel, you can visualize and monitor the data using the Microsoft Sentinel adoption of Azure Monitor
Workbooks, which provides versatility in creating custom dashboards. While the Workbooks are displayed differently in Microsoft Sentinel, it may be useful for you to see how to create interactive reports with Azure Monitor Workbooks. Microsoft Sentinel allows you to create custom workbooks across your data, and also comes with built-in workbook templates to allow you to quickly gain insights across your data as soon as you connect a data source.
Box 3: Yes –
To help security analysts look proactively for new anomalies that weren’t detected by your security apps or even by your scheduled analytics rules, Microsoft
Sentinel’s built-in hunting queries guide you into asking the right questions to find issues in the data you already have on your network.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference
https://docs.microsoft.com/en-us/azure/sentinel/monitor-your-data
https://docs.microsoft.com/en-us/azure/sentinel/hunting

Question 4

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 5

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 6

Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Azure virtual machines

B. Azure Active Directory (Azure AD) users

C. Microsoft Exchange Online inboxes

D. Azure virtual networks

E. Microsoft SharePoint Online sites

 


Suggested Answer: DE

 

Question 7

Which Microsoft Purview solution can be used to identify data leakage?

A. insider risk management

B. Compliance Manager

C. communication compliance

D. eDiscovery

 


Suggested Answer: A

 

Question 8

Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?

A. Adoption Score

B. Microsoft Secure Score

C. Secure score in Microsoft Defender for Cloud

D. Compliance score

 


Suggested Answer: D

 

Question 9

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 10

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 11

What do you use to provide real-time integration between Azure Sentinel and another security source?

A. Azure AD Connect

B. a Log Analytics workspace

C. Azure Information Protection

D. a connector

 


Suggested Answer: D

To on-board Azure Sentinel, you first need to connect to your security sources. Azure Sentinel comes with a number of connectors for Microsoft solutions, including Microsoft 365 Defender solutions, and Microsoft 365 sources, including Office 365, Azure AD, Microsoft Defender for Identity, and Microsoft Cloud App
Security, etc.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/overview

Question 12

Which Microsoft Defender for Cloud metric displays the overall security health of an Azure subscription?

A. secure score

B. resource health

C. completed controls

D. the status of recommendations

 


Suggested Answer: A

 

Question 13

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 14

What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?

A. automated remediation

B. automated investigation

C. advanced hunting

D. network protection

 


Suggested Answer: D

Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction capability.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide

Question 15

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 16

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Plan

B. Manage

C. Adopt

D. Govern

E. Define Strategy

 


Suggested Answer: AE

Reference:
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/overview

Question 17

Which type of identity is created when you register an application with Active Directory (Azure AD)?

A. a user account

B. a user-assigned managed identity

C. a system-assigned managed identity

D. a service principal

 


Suggested Answer: D

When you register an application through the Azure portal, an application object and service principal are automatically created in your home directory or tenant.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal

Question 18

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 19

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: No –
Box 2: Yes –
Leaked Credentials indicates that the user’s valid credentials have been leaked.
Box 3: Yes –
Multi-Factor Authentication can be required based on conditions, one of which is user risk.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks
https://docs.microsoft.com/en-us/azure/active-directory/authentication/tutorial-risk-based-sspr-mfa

Question 20

Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?

A. Microsoft Secure Score

B. Productivity Score

C. Secure score in Azure Security Center

D. Compliance score

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365-worldwide

Question 21

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 22

What can you specify in Microsoft 365 sensitivity labels?

A. how long files must be preserved

B. when to archive an email message

C. which watermark to add to files

D. where to store files

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide

Question 23

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-sensitivity-labels?view=o365-worldwide

Question 24

What is Azure Key Vault used for?

A. to deploy a cloud-based network security service that protects Azure virtual network resources

B. to protect cloud-based applications from cyber threats and vulnerabilities

C. to safeguard cryptographic keys and other secrets used by cloud apps and services

D. to provide secure and seamless RDP/SSH connectivity to Azure virtual machines via TLS from the Azure portal

 


Suggested Answer: C

 

Question 25

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Federation is a collection of domains that have established trust.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed

Question 26

Which compliance feature should you use to identify documents that are employee resumes?

A. pre-trained classifiers

B. Activity explorer

C. eDiscovery

D. Content explorer

 


Suggested Answer: A

 

Question 27

What can you use to provide threat detection for Azure SQL Managed Instance?

A. Microsoft Secure Score

B. application security groups

C. Microsoft Defender for Cloud

D. Azure Bastion

 


Suggested Answer: C

 

Question 28

You need to create a data loss prevention (DLP) policy.
What should you use?

A. the Microsoft 365 Compliance center

B. the Microsoft Endpoint Manager admin center

C. the Microsoft 365 admin center

D. the Microsoft 365 Defender portal

 


Suggested Answer: C

 

Question 29

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview

Question 30

DRAG DROP
-
You need to identify which cloud service models place the most responsibility on the customer in a shared responsibility model.
In which order should you list the service models from the most customer responsibility to the least? To answer, move all models from the list of models to the answer area and arrange them in the correct order.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 31

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 32

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 33

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Display policy tips to users who are about to violate your organization’s policies.

B. Enable disk encryption on endpoints.

C. Protect documents in Microsoft OneDrive that contain sensitive information.

D. Apply security baselines to devices.

 


Suggested Answer: AC

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

Question 34

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

When you register an application through the Azure portal, an application object and service principal are automatically created in your home directory or tenant.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal

Question 35

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

A. Windows 10 and newer only

B. Windows 10 and newer and Android only

C. Windows 10 and newer and macOS only

D. Windows 10 and newer, Android, and macOS

 


Suggested Answer: C

 

Question 36

DRAG DROP -
Match the Microsoft Defender for Office 365 feature to the correct description.
To answer, drag the appropriate feature from the column on the left to its description on the right. Each feature may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 37

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 38

You have an Azure subscription.
You need to implement approval-based, time-bound role activation.
What should you use?

A. access reviews in Azure AD

B. Azure AD Privileged Identity Management (PIM)

C. Azure AD Identity Protection

D. Conditional access in Azure AD

 


Suggested Answer: B

 

Question 39

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 40

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 41

You plan to move resources to the cloud.
You are evaluating the use of Infrastructure as a service (IaaS), Platform as a service (PaaS), and Software as a service (SaaS) cloud models.
You plan to manage only the data, user accounts, and user devices for a cloud-based app.
Which cloud model will you use?

A. SaaS

B. PaaS

C. IaaS

 


Suggested Answer: A

 

Question 42

Which portal contains the solution catalog?

A. Microsoft Purview compliance portal

B. Microsoft 365 Defender portal

C. Microsoft 365 admin center

D. Microsoft 365 Apps admin center

 


Suggested Answer: A

 

Question 43

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 44

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

A. Content Search

B. sensitivity labels

C. retention policies

D. eDiscovery

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide

Question 45

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 46

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 47

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

A. the management of mobile devices

B. the permissions for the user data stored in Azure

C. the creation and management of user accounts

D. the management of the physical hardware

 


Suggested Answer: D

 

Question 48

In a Core eDiscovery workflow, what should you do before you can search for content?

A. Create an eDiscovery hold.

B. Run Express Analysis.

C. Configure attorney-client privilege detection.

D. Export and download results.

 


Suggested Answer: A

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-core-ediscovery?view=o365-worldwide

Question 49

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

A. network security groups (NSGs)

B. Azure AD Privileged Identity Management (PIM)

C. conditional access policies

D. resource locks

 


Suggested Answer: C

 

Question 50

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?

A. conditional access policies

B. Azure AD Identity Protection

C. Azure AD Privileged Identity Management (PIM)

D. authentication method policies

 


Suggested Answer: C

Azure AD Privileged Identity Management (PIM) provides just-in-time privileged access to Azure AD and Azure resources
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure

Free Access Full SC-900 Practice Exam Free

Looking for additional practice? Click here to access a full set of SC-900 practice exam free questions and continue building your skills across all exam domains.

Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!

Good luck with your SC-900 certification journey!

Share18Tweet11
Previous Post

SC-400 Practice Exam Free

Next Post

SCS-C01 Practice Exam Free

Next Post

SCS-C01 Practice Exam Free

SCS-C02 Practice Exam Free

SK0-005 Practice Exam Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.