Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

SC-900 Practice Questions Free

Table of Contents

Toggle
  • SC-900 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full SC-900 Practice Questions Free

SC-900 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the SC-900 certification exam? Kickstart your success with our SC-900 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with SC-900 practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free SC-900 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Sign in to Compliance Manager –
1. Go to the Microsoft Purview compliance portal and sign in with your Microsoft 365 global administrator account.
2. Select Compliance Manager on the left navigation pane. You’ll arrive at your Compliance Manager dashboard.
The direct link to access Compliance Manager is https://compliance.microsoft.com/compliancemanager
Note: Microsoft 365 compliance is now called Microsoft Purview and the solutions within the compliance area have been rebranded.
Reference:https://compliance.microsoft.com/compliancemanager

Note: Microsoft 365 compliance is now called Microsoft Purview and the solutions within the compliance area have been rebranded.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager-setup

Question 2

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 3

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 4

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 5

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 6

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

When you register an application through the Azure portal, an application object and service principal are automatically created in your home directory or tenant.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal

Question 7

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 8

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Managed identities provide an identity for applications to use when connecting to resources that support Azure Active Directory (Azure AD) authentication.
Here are some of the benefits of using managed identities:
You don’t need to manage credentials. Credentials aren’t even accessible to you.
You can use managed identities to authenticate to any resource that supports Azure AD authentication, including your own applications.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview

Question 9

What are three uses of Microsoft Cloud App Security? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. to discover and control the use of shadow IT

B. to provide secure connections to Azure virtual machines

C. to protect sensitive information hosted anywhere in the cloud

D. to provide pass-through authentication to on-premises applications

E. to prevent data leaks to noncompliant apps and limit access to regulated data

 


Suggested Answer: ACE

Reference:
https://docs.microsoft.com/en-us/defender-cloud-apps/what-is-defender-for-cloud-apps

Question 10

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 11

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 12

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
Box 2: Yes –
Box 3: No –
The Zero Trust model does not assume that everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network.
Reference:
https://docs.microsoft.com/en-us/security/zero-trust/

Question 13

Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?

A. Microsoft Secure Score

B. Productivity Score

C. Secure score in Azure Security Center

D. Compliance score

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation?view=o365-worldwide

Question 14

DRAG DROP
-
Match the Microsoft Purview Insider Risk Management workflow step to the appropriate task.
To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 15

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 16

What is a characteristic of a sensitivity label in Microsoft 365?

A. encrypted

B. restricted to predefined categories

C. persistent

 


Suggested Answer: C

 

Question 17

You have an Azure subscription that contains multiple resources.
You need to assess compliance and enforce standards for the existing resources.
What should you use?

A. Azure Blueprints

B. the Anomaly Detector service

C. Microsoft Sentinel

D. Azure Policy

 


Suggested Answer: D

 

Question 18

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 19

What should you use to ensure that the members of an Azure Active Directory group use multi-factor authentication (MFA) when they sign in?

A. Azure role-based access control (Azure RBAC)

B. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

C. Azure Active Directory (Azure AD) Identity Protection

D. a conditional access policy

 


Suggested Answer: D

 

Question 20

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 21

Which two cards are available in the Microsoft 365 Defender portal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Devices at risk

B. Compliance Score

C. Service Health

D. User Management

E. Users at risk

 


Suggested Answer: AE

A: The Devices at risk card includes a View details button. Selecting that button takes us to the Device inventory page, as shown in the following image
Reference Image
E: The Microsoft 365 Defender portal cards fall into these categories:
Identities- Monitor the identities in your organization and keep track of suspicious or risky behaviors. Here you can find the Users at risk card.
Data – Help track user activity that could lead to unauthorized data disclosure.
Devices – Get up-to-date information on alerts, breach activity, and other threats on your devices.
Apps – Gain insight into how cloud apps are being used in your organization.
Incorrect:
Not C: The Service Health card can be reached from the Microsoft 365 admin center.
Reference: alt=”Reference Image” />
E: The Microsoft 365 Defender portal cards fall into these categories:
Identities- Monitor the identities in your organization and keep track of suspicious or risky behaviors. Here you can find the Users at risk card.
Data – Help track user activity that could lead to unauthorized data disclosure.
Devices – Get up-to-date information on alerts, breach activity, and other threats on your devices.
Apps – Gain insight into how cloud apps are being used in your organization.
Incorrect:
Not C: The Service Health card can be reached from the Microsoft 365 admin center.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-business/mdb-respond-mitigate-threats

Question 22

What is the maximum number of resources that Azure DDoS Protection Standard can protect without additional costs?

A. 50

B. 100

C. 500

D. 1000

 


Suggested Answer: B

 

Question 23

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 24

What is Azure Key Vault used for?

A. to deploy a cloud-based network security service that protects Azure virtual network resources

B. to protect cloud-based applications from cyber threats and vulnerabilities

C. to safeguard cryptographic keys and other secrets used by cloud apps and services

D. to provide secure and seamless RDP/SSH connectivity to Azure virtual machines via TLS from the Azure portal

 


Suggested Answer: C

 

Question 25

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

A. retention policies

B. data loss prevention (DLP) policies

C. conditional access policies

D. information barriers

 


Suggested Answer: B

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

Question 26

Microsoft 365 Endpoint data loss prevention (Endpoint DLP) can be used on which operating systems?

A. Windows 10 and newer only

B. Windows 10 and newer and Android only

C. Windows 10 and newer and iOS only

D. Windows 10 and newer, Android, and iOS

 


Suggested Answer: A

 

Question 27

You need to ensure repeatability when creating new resources in an Azure subscription.
What should you use?

A. Microsoft Sentinel

B. Azure Policy

C. Azure Batch

D. Azure Blueprints

 


Suggested Answer: D

 

Question 28

DRAG DROP -
Match the Microsoft 365 insider risk management workflow step to the appropriate task.
To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/insider-risk-management?view=o365-worldwide

Question 29

DRAG DROP
-
Match the types of compliance score actions to the appropriate tasks.
To answer, drag the appropriate action type from the column on the left to its task on the right. Each type may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 30

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: No –
Microsoft Sentinel data connectors are available for non-Microsoft services like Amazon Web Services.
Box 2: Yes –
Once you have connected your data sources to Microsoft Sentinel, you can visualize and monitor the data using the Microsoft Sentinel adoption of Azure Monitor
Workbooks, which provides versatility in creating custom dashboards. While the Workbooks are displayed differently in Microsoft Sentinel, it may be useful for you to see how to create interactive reports with Azure Monitor Workbooks. Microsoft Sentinel allows you to create custom workbooks across your data, and also comes with built-in workbook templates to allow you to quickly gain insights across your data as soon as you connect a data source.
Box 3: Yes –
To help security analysts look proactively for new anomalies that weren’t detected by your security apps or even by your scheduled analytics rules, Microsoft
Sentinel’s built-in hunting queries guide you into asking the right questions to find issues in the data you already have on your network.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference
https://docs.microsoft.com/en-us/azure/sentinel/monitor-your-data
https://docs.microsoft.com/en-us/azure/sentinel/hunting

Question 31

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Yes –
Conditional access policies can be applied to all users
Box 2: No –
Conditional access policies are applied after first-factor authentication is completed.
Box 3: Yes –
Users with devices of specific platforms or marked with a specific state can be used when enforcing Conditional Access policies.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/overview

Question 32

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?

A. Audit

B. Compliance Manager

C. Content Search

D. Alerts

 


Suggested Answer: C

The Content Search tool in the Security & Compliance Center can be used to quickly find email in Exchange mailboxes, documents in SharePoint sites and
OneDrive locations, and instant messaging conversations in Skype for Business.
The first step is to starting using the Content Search tool to choose content locations to search and configure a keyword query to search for specific items.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/search-for-content?view=o365-worldwide

Question 33

You have an Azure subscription that contains a Log Analytics workspace.
You need to onboard Microsoft Sentinel.
What should you do first?

A. Create a hunting query.

B. Correlate alerts into incidents.

C. Connect to your data sources.

D. Create a custom detection rule.

 


Suggested Answer: C

 

Question 34

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

A. the Microsoft 365 admin center

B. Azure Cost Management + Billing

C. Microsoft Service Trust Portal

D. the Microsoft Purview compliance portal

 


Suggested Answer: C

 

Question 35

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.
Reference:
https://docs.microsoft.com/en-us/defender-for-identity/what-is

Question 36

What can you use to protect against malicious links sent in email messages, chat messages, and channels?

A. Microsoft Defender for Cloud Apps

B. Microsoft Defender for Office 365

C. Microsoft Defender for Endpoint

D. Microsoft Defender for Identity

 


Suggested Answer: B

 

Question 37

Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. text message (SMS)

B. Microsoft Authenticator app

C. email verification

D. phone call

E. security question

 


Suggested Answer: ABD

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-methods

Question 38

HOTSPOT
-
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 39

What should you use in the Microsoft 365 Defender portal to view security trends and track the protection status of identities?

A. Reports

B. Incidents

C. Hunting

D. Secure score

 


Suggested Answer: A

 

Question 40

Which three forms of verification can be used with Azure AD Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct answer is worth one point.

A. security questions

B. the Microsoft Authenticator app

C. SMS messages

D. a smart card

E. Windows Hello for Business

 


Suggested Answer: BCE

 

Question 41

DRAG DROP -
Match the Azure networking service to the appropriate description.
To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Box 1: Azure Firewall –
Azure Firewall provide Source Network Address Translation and Destination Network Address Translation.
Box 2: Azure Bastion –
Azure Bastion provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS.
Box 3: Network security group (NSG)
You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network.
Reference:
https://docs.microsoft.com/en-us/azure/networking/fundamentals/networking-overview
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview
https://docs.microsoft.com/en-us/azure/firewall/features
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview

Question 42

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 43

When a user authenticates by using passwordless sign-in, what should the user select in the Microsoft Authenticator app?

A. an answer to a security question

B. a number

C. an alphanumeric key

D. a passphrase

 


Suggested Answer: B

 

Question 44

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

B. Azure Multi-Factor Authentication (MFA)

C. Azure Active Directory (Azure AD) Identity Protection

D. conditional access policies

 


Suggested Answer: D

Reference:
https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-policy-common

Question 45

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/threat-analytics?view=o365-worldwide

Question 46

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?

A. threat modeling

B. identity as the security perimeter

C. defense in depth

D. the shared responsibility model

 


Suggested Answer: C

Reference:
https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth

Question 47

HOTSPOT
-
Select the answer that correctly completes the sentence.
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 48

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.microsoft.com/en-us/cloud-app-security/what-is-cloud-app-security

Question 49

You need to create a data loss prevention (DLP) policy.
What should you use?

A. the Microsoft 365 Compliance center

B. the Microsoft Endpoint Manager admin center

C. the Microsoft 365 admin center

D. the Microsoft 365 Defender portal

 


Suggested Answer: C

 

Question 50

HOTSPOT -
Select the answer that correctly completes the sentence.
Hot Area:
 Image

 


Suggested Answer:
Correct Answer Image

Biometrics templates are stored locally on a device.
Reference:
https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-overview

Free Access Full SC-900 Practice Questions Free

Want more hands-on practice? Click here to access the full bank of SC-900 practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your SC-900 certification journey!

Share18Tweet11
Previous Post

SC-300 Practice Questions Free

Next Post

SCS-C01 Practice Questions Free

Next Post

SCS-C01 Practice Questions Free

SCS-C02 Practice Questions Free

SK0-005 Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.