SC-900 Flashcards
- all azure ad license editions include the same festures.
- you can manage an azure ad tenant by using the azure portal
- your must deploy azure virtual machines to list an azure ad tenant.
- no
- yes
- no
Select the answer that correctly completes the sentence.
1. azure blueprints 2. azure policy 3. the microsoft cloud adoption framework for azure. 4 a resource lock.
Provides best practices from microsoft elployees, partners and customers including tools ane guidance to assist in an azure deployment.
Microsoft cloud adoption framework for azure
Select the answer that correctly completes the sentence.
1. customer lockbox
2. data loss prevention
3. ediscovery
4. a resource lock
Is to identify, hold and export electronic information that might be used in an investigation.
Ediscovery
Select the answer that correctly completes the sentence.
You can manage microsoft intune by using the
1 azure ad admin center
2 m365 compliance center
3 m365 defender portal
4 microsoft endpoint manager admin center
Microsoft endpoint manager admin center
Select the answer that correctly completes the sentence.
Federation is used to establish …… between organizations.
1 mfa
2 a trust relationship
3 user account synchronization
4 a vpn connection
A trust relationship
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
- applying system updates increases an organizations secure score in m defender for cloud.
- the secure score in m defender for cloud can evaluate resources across multiple azure subscriptions.
3 enabling mfa increases an organizations secure score in m defender for cloud
1 yes
2 yes
3 yes
Which score measures an organization’s progress in completing actions that help reduce risks associated to data protection and regulatory standards?
1 microsoft secure score
2 productivity score
3 secure score in azure security center
4 compliance score
4 compliance score
What do you use to provide real-time integration between Azure Sentinel and another security source?
1 azure ad connect
2 a log analytics workspace
3 azure information protection
4 a connector
4 a connector
Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for
Standardization (ISO)?
A. the Microsoft Endpoint Manager admin center
B. Azure Cost Management + Billing
C. Microsoft Service Trust Portal
D. the Azure Active Directory admin center
C microsoft service trust portal
In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?
A. the management of mobile devices
B. the permissions for the user data stored in Azure
C. the creation and management of user accounts
D. the management of the physical hardware
D the management of the physical hardware
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 verify explicitly is one of the guiding principles of zero trust
2 assume breach is one of the guiding principles of zero trust
3 the zero trust security model assumes that a firewall secures the internal network from external threats.
1 yes
2 yes
3 no
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 control is a key privacy principle of microsoft
2 transparency is a key privacy principle of microsoft
3 shared responsibility is a key privacy principle of microsoft
1 yes
2 yes
3 no
Select the answer that correctly completes the sentence.
1 archiving
2 compressing
3 deduplicating
4 encrypting
A file makes the data in the file readable and usable to viewers that have the appropriate key.
Encrypting
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 digitally signing a document requires a private key.
2 verifying the authenticity of a digitally signed document requires the public key of the signer
3 verifying the authenticity of a digitally signed document requires the private key of the signer.
1 yes
2 yes
3 no
Select the answer that correctly completes the sentence.
When users sign in to the azure portal, they are first …….
1assigned permissions
2 authenticated
3 authorized
4 resolved
2 authenticated
Select the answer that correctly completes the sentence.
1 authentication
2 authorization
3 federation
4 single sign-on (sso)
Is the process of identifying wherher a signed-in user can access a specific resource.
2 authorization
Select the answer that correctly completes the sentence.
1 ad ds
2 active directory forest trusts
3 azure ad b2b
4 azure ad b2c
Enables collaboration with business partner from external organizations such as suppliers, partners and vendors. External users appear as guest users in the directory.
3 azure ad b2b
In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Plan
B. Manage
C. Adopt
D. Govern
E. Define Strategy
A plan
B define strategy
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 in SaaS applying service packs to applications is the responsibility of the organization.
2 In IaaS managing the physical network is the responsibility of the cloud provider.
3 In all azure cloud deployment types managing the security of information and data is the responsibility of the organization.
1 no
2 yes
3 yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 azure ad connect can be used to implement hybrid identity
2 hybrid identity requires the implementation of two m365 tenants
3 authentication of hybrid identifies requires the synchronization of ad ds and azure ad .
1 yes
2 no
3 yes
Select the answer that correctly completes the sentence.
1 azure application insights
2 azure network watcher
3 log analytics workspaces
4 security baselines for azure
provides benchmark recommendations and guidance for protecting azure services.
4 security baselines for azure
What is an example of encryption at rest?
A. encrypting communications by using a site-to-site VPN
B. encrypting a virtual machine disk
C. accessing a website by using an encrypted HTTPS connection
D. sending an encrypted email
Encrypting a virtual machine disk
Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Define the perimeter by physical locations.
B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.
E. Use the network as the primary security boundary.
B. Use identity as the primary security boundary.
C. Always verify the permissions of a user explicitly.
D. Always assume that the user system can be breached.
Which service should you use to view your Azure secure score?
1 alerts
2 application insights
3 subscriptions
4 policy
5 azure ad connect health
6 security center ( today microsoft defender for cloud)
7 advisor
8 monitor
6 security center ( microsoft defender for cloud)
You are evaluating the compliance score in Compliance Manager.
Match the compliance score action subcategories to the appropriate actions.
To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.
Action subcategories:
Corrective, detective, preventative
…… encrypt data at rest
…… perform a system access audit
…… make configuration changes in response to security incident.
Preventative encrypt data at rest
Detective perform a system access audit
Corrective make configuration changes in response to a security incident
Select the answer that correctly completes the sentence.
Compliance manager can be directly accessed from the …..
1 m365 admin center
2 m365 defender portal
3 m365 compliance center (today microsoft purview)
4 microsoft support portal
3 m365 compliance center ( today microsoft purview)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 enabling mfa increases the microsoft secure score
2 a higher microsoft secure score means a lower identified risk level in the m365 tenant
3 microsoft secure score measures progress in conpleting action based on controls that include key regulations snd standards for data protection and governance
1 yes
2 yes
3 no
What can you use to provide a user with a two-hour window to complete an administrative task in Azure?
A. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
B. Azure Multi-Factor Authentication (MFA)
C. Azure Active Directory (Azure AD) Identity Protection
D. conditional access policies
A azure ad pim
In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?
A. Active Directory Federation Services (AD FS)
B. Microsoft Sentinel
C. Azure AD Connect
D. Azure AD Privileged Identity Management (PIM)
Azure Ad connect
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 you can create custome roles in azure ad
2 global administrator is a role in azure ad
3 an azure ad user can be assigned only one role
1 yes
2 yes
3 no
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 azure ad is deployed to an on-premises environment
2 azure ad is provided as part of a m365 subscription
3 azure ad is an identity and access management service
1 no
2 yes
3 yes
Select the answer that correctly completes the sentence.
With windows hello for business, a user biometric data used for authentication
1 is stored on an external device
2 is stored on a local device only
3 is stored in azure ad
4 is replicated to all the devices designated by the user
2 is stored on a local device only
What is the purpose of Azure Active Directory (Azure AD) Password Protection?
A. to control how often users must change their passwords
B. to identify devices to which users can sign in without using multi-factor authentication (MFA)
C. to encrypt a password by using globally recognized encryption standards
D. to prevent users from using specific words in their passwords
D to prevent users from using specific words in their passwords.
Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?
A. access reviews
B. managed identities
C. conditional access policies
D. Azure AD Identity Protection
A access reviews
1 mfa
2 pass-through authentication
3 password writeback
4 single sign-on
Requires additional verufication such as s verification code sent to a mobile phone.
1 mfa
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 conditional access policies can use the device state as a signal
2 conditional access policies apply befor first-factor authentication is complete
3 conditional access policies can trigger mfa if a user attempts to access a specific application.
1 yes
2 no
3 yes
Select the answer that correctly completes the sentence.
1 microsoft defender for cloud apps
2 microsoft defender for endpoint
3 microsoft defender for identity
4 microsoft defender for office 365
….. is a cloud-based solution that leverages on-premises active directory signals to identify, detect and investigate advanced threats.
3 microsoft defender for identity
Select the answer that correctly completes the sentence.
Microsoft defender for identity can identify advanced threats from……… signals.
1 azure ad
2 azure ad connect
3 on-premises ad ds
3 on premises ad ds
Select the answer that correctly completes the sentence.
Azure ad is ……. Used for authentication and authorization.
1 an extended detection and response (xdr) system
2 an identity provider
3 a management group
4 a security information and event management (SIEM) system
2 an identity provider
Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?
A. conditional access policies
B. Azure AD Identity Protection
C. Azure AD Privileged Identity Management (PIM)
D. authentication method policies
Azure ad privileged identity management (pim)
Which three authentication methods can be used by Azure Multi-Factor Authentication (MFA)? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. text message (SMS)
B. Microsoft Authenticator app
C. email verification
D. phone call
E. security question
A Text message
B Microsoft authenticator app
D Phone call
Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?
A. sensitivity label policies
B. Customer Lockbox
C. information barriers
D. Privileged Access Management (PAM)
C information barriers
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 conditional access policies can be applied to global administrators
2 conditional access policies are evaluated befor a user is authenticated
3 conditional access policies can use a device platform such as android or ios as a signal
1 yes
2 no
3 yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 conditional access policies always enforce the use of mfa
2 conditional access policies can be used to block access to an application based on the location of the user
3 conditional access policies only affect users who have azure ad- joined devices m
1 no
2 yes
3 no
Select the answer that correctly completes the sentence.
Application registered in azure ad are associated automatically to a ……..
1 guest account
2 managed identity
3 service principal
4 user account
3 service principal
Which three authentication methods does Windows Hello for Business support? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. fingerprint
B. facial recognition
C. PIN
D. email verification
E. security question
A fingerprint
B facial recognition
C pin
Select the answer that correctly completes the sentence.
When you enable security defaults in azure ad, ………….. will be enabled for all azure ad users.
1 azure ad identity protection
2 azure ad pim
3 mfa
3 mfa
You have an Azure subscription.
You need to implement approval-based, time-bound role activation.
What should you use?
A. Windows Hello for Business
B. Azure Active Directory (Azure AD) Identity Protection
C. access reviews in Azure Active Directory (Azure AD)
D. Azure Active Directory (Azure AD) Privileged Identity Management (PIM)
D azure ad pim
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 global administrators are exempt from conditional access policies
2 a conditional access policy can add users to azure ad role.
3 conditional access policies can force the use of mfa to access cloud apps
1 nein
2 nein
3 yes
When security defaults are enabled for an Azure Active Directory (Azure AD) tenant, which two requirements are enforced? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. All users must authenticate from a registered device.
B. Administrators must always use Azure Multi-Factor Authentication (MFA).
C. Azure Multi-Factor Authentication (MFA) registration is required for all users.
D. All users must authenticate by using passwordless sign-in.
E. All users must authenticate by using Windows Hello.
B. Administrators must always use Azure Multi-Factor Authentication (MFA).
C. Azure Multi-Factor Authentication (MFA) registration is required for all users.
Which type of identity is created when you register an application with Active Directory (Azure AD)?
A. a user account
B. a user-assigned managed identity
C. a system-assigned managed identity
D. a service principal
D service principal
Which three tasks can be performed by using Azure Active Directory (Azure AD) Identity Protection? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Configure external access for partner organizations.
B. Export risk detection to third-party utilities.
C. Automate the detection and remediation of identity based-risks.
D. Investigate risks that relate to user authentication.
E. Create and automatically assign sensitivity labels to data.
B. Export risk detection to third-party utilities.
C. Automate the detection and remediation of identity based-risks.
D. Investigate risks that relate to user authentication.
Select the answer that correctly completes the sentence.
When using mfa, a password is considered something you …….
1 are
2 have
3 know
4 share
3 know
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 windows hello for business can use the microsoft authenticator app as an authentication method
2 windows hello for business can use a pin code as ab authentication method
3 windows hello for business authentication information syncs across all the devices registered by a user.
1 no
2 yes
3 no
Select the answer that correctly completes the sentence.
An azure resource can use a system-assigned ………. To access azure services.
1 azure ad joined devices
2 managed identity
3 service principal
4 user identity
2 managed identity
Select the answer that correctly completes the sentence.
Your can use ……. In the m365 defender portal to identify devices that are affected by an alert.
1 classifications
2 incidents
3 policies
4 secure score
2 incidents
What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.
NOTE: Each correct selection is worth one point.
A. automated investigation and remediation
B. transport encryption
C. shadow IT detection
D. attack surface reduction
A automated investigation and remediation
D attack surface reduction
Match the Azure networking service to the appropriate description.
To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.
Services:
Azure bastion, azure firewall, nsg
Answer area:
…… provides network address translation (nat) services
…… provides secure and seamless remote desktop connectivity to azure virtual machines
……. Provides traffic filtering that can be applied to specific network interfaces on a virtual network
1 Azure firewall provides network address translation (nat) services
2 azure bastion provides secure and seamless remote desktop connectivity to azure virtual machines.
3 nsg provides traffic filtering that can be applied to specific network interfaces on a virtual network.
Select the answer that correctly completes the sentence.
1 azure advisor
2 azure bastion
3 azure monitor
4 azure sentinel
Is a cloud-native security information and event management (siem) and security orchestration automated response (soar) solution used to provide a single solution for a alert detection threat visibility proactive hunting and threat response.
4 azure sentinel
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 azure defender can detect vulnerabilities and threats for azure storage
2 cloud security posture management (cspm) is available for all azure subscriptions
3 azure security center (defender for cloud) can evaluate the security of workloads deployed to azure or on-premises
1 yes
2 yes
3 yes
You can use …….. in the microsoft 365 security center to view an aggregation of alerts that relate to the same attack.
1 reports
2 hunting
3 attack simulator
4 incidents
4 incidents
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 nsg can deny inbound traffic from the internet
2 nsg can deny outbound traffic to the internet
3 nsg can filter traffic based on IP address, protocol and port
1 yes
2 yes
3 yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 microsoft intune can be used to manage android devices
2 microsoft intune can be used to provision azure subscriptions
3 microsoft intune can be used to manage organization-owned devices and personal devices
1 yes
2 no
3 yes
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 you can create one azure bastion per virtual network
2 azure bastion provides secure user connections by using rdp
3 azure bastion provides a secure connection to an azure virtual machine by using the azure portal
1 yes
2 yes
3 yes
What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?
A. automated remediation
B. automated investigation
C. advanced hunting
D. network protection
D network protection
Select the answer that correctly completes the sentence.
In microsoft sentinel, you can automate common tasks by using……
1 deep investigation tools
2 hunting search and query tools
3 playbooks
4 workbooks
3 playbooks
Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Azure virtual machines
B. Azure Active Directory (Azure AD) users
C. Microsoft Exchange Online inboxes
D. Azure virtual networks
E. Microsoft SharePoint Online sites
A. Azure virtual machines
D. Azure virtual networks
You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?
A. threat modeling
B. identity as the security perimeter
C. defense in depth
D. the shared responsibility model
C defense in depth
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 microsoft defender for endpoint can protect android devices
2 microsoft defender for endpoint can protect azure virtual machines that run windows 10
3 microsoft defender for endpoint can protect microsoft sharepoint online sites and content from viruses.
1 yes
2 yes
3 no
What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?
A. Microsoft Defender for Office 365
B. Microsoft Defender Antivirus
C. Microsoft Defender for Identity
D. Microsoft Defender for Endpoint
A microsoft defender for office 365
Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?
A. integration with the Microsoft 365 compliance center
B. support for threat hunting
C. integration with Microsoft 365 Defender
D. support for Azure Monitor Workbooks
C integration with microsoft 365 defender
What can you use to provide threat detection for Azure SQL Managed Instance?
A. Microsoft Secure Score
B. application security groups
C. Microsoft Defender for Cloud
D. Azure Bastion
C microsoft defender for cloud
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
1 Microsoft secure score in the m365 security center can provide recommendations for microsoft cloud app security
2 from the m365 defender portal, you can view how your microsoft secure score compares to the organizations like yours.
3 microsoft secure score in the microsoft 365 defender portal gives you points if you address the improvement action by using a third-party application or software.
1 yes
2 yes
3 yes
Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?
A. network security groups (NSGs)
B. Azure AD Privileged Identity Management (PIM)
C. conditional access policies
D. resource locks
C conditional access policies
Select the answer that correctly completes the sentence.
1 azure ad pim
2 azure defender
3 azure sentinel
4 microsoft cloud app security (microsoft defender for cloud apps)
….. can use conditional access policies to control sessions in real time.
4 microsoft cloud app security (microsoft defender for cloud apps)
Select the answer that correctly completes the sentence.
Azure DDoS protection standard can be used to protect ….
1 azure ad applications
2 Azure ad users
3 resource groups
4 virtual networks
4 virtual networks
Your company is planning on setting up an Azure AD tenant and an Azure subscription. They are deciding on the right license to use for their Azure AD tenant. Do all of the license offerings have the same set of features?
- Yes
- No
No+
Your company is planning on setting up an Azure AD tenant and an Azure subscription. Do you need to have Azure virtual machines for hosting Azure AD?
- Yes
- NO
- No
Which of the following provides guidance that is designed to help create and implement business and technology strategies for the cloud?
- Azure Policy
- Microsoft Cloud Adoption Framework
- Azure Privileged Identity Management
- Microsoft Defender for Endpoint
- Microsoft Cloud Adoption Framework
Which of the following ensures that Microsoft can’t access your content to do services operations without explicit approval?
- Customer Lockbox
- Data Loss Prevention
- eDiscovery
- Inforamtion barriers
- Customer Lockbox
Which of the following can be used to identify , hold and export content found in mailboxes and sites?
- Customer Lockbox
- Data Loss Prevention
- eDiscovery
- Information barriers
- eDiscovery
Which of the following can be used to manage devices via Microsoft Intune?
- Azure Portal
- Microsoft 365 Security Center
- Microsoft Endpoint Manager admin center
- Microsoft Endpoint Manager admin center
Your company is planning on deploying a number of resources to Azure via the use of their Azure subscription. They want to use Azure Security Center to improve the security posture of their entire environment. Can you use Azure Security Center to evaluate the security of resources across multiple subscriptions?
- Yes
- No
- Yes
Your company is planning on deploying a number of resources to Azure via the use of their Azure subscription. They want to use Azure Security Center to improve the security posture of their entire environment. Would implementing secure management ports for Azure virtual machines in their subscription improve their overall secure score?
- Yes
- No
- Yes
Your company is planning on using the Azure Sentinel service. Which of the following in Azure Sentinel allows to ingest data from external sources?
- Workbooks
- Analytics
- Connectors
- Playbooks
- Connectors
Your company is planning on using the Azure Sentinel service. Which of the following in Azure Sentinel allows to correlate alerts into incidents?
- Workbooks
- Analytics
- Connectors
- Playbooks
- Analytics
Your company is planning on using the Azure Sentinel service. Which of the following in Azure Sentinel allows to automate common tasks?
- Workbooks
- Analytics
- Connectors
- Playbooks
- Playbooks
Your company is planning on using Microsoft Cloud-based services. They want to first check whether Microsoft Cloud services complies with standards such as Service Organization Controls. Which of the following can help provide this information?
- Microsoft Endpoint Manager Admin Center
- Azure Security Center Secure Score
- Microsoft Service Trust Portal
- Microsoft Service Trust Portal
Which of the following is the responsibility of the Azure cloud platform when it comes to the Shared Responsibility model?
- Management of information and data
- Management of Accounts and Identities
- Maintenance of the physical hosts
- Maintenance of the physical hosts
You are reviewing the Zero Trust principles. Is Verify Explicitly a Zero trust principle?
- Yes
- No
- Yes
You are reviewing the Zero Trust principles. Is Assume breach a Zero trust principle?
- Yes
- No
- Yes
You are reviewing Microsoft Privacy principles. Is Control a privacy principal?
1, Yes
2, No
1, Yes
You are reviewing Microsoft Privacy principles. Is Transparency a privacy principal?
- Yes
- No
- Yes
Your company has just setup an Azure AD tenant and an Azure subscription. They want to make use of features that are available with Azure AD with the appropriate licenses. Which of the following can they use for the following requirement?
“Continually create assessments to review the access of Azure AD users to Azure AD groups”
- Azure AD Identity management
- Azure AD Access Reviews
- Azure AD Privilegedd Identity Management
- Azure AD Access Reviews
Your company has just setup an Azure AD tenant and an Azure subscription. They want to make use of features that are available with Azure AD with the appropriate licenses. Which of the following can they use for the following requirement?
“Provide users access to resources only whenever required. Also ensure time-bound access when assigning roles to users”
- Azure AD Identity management
- Azure AD Access Reviews
- Azure AD Privileged Identity Management
- Azure AD Privileged Identity Management
Which of the following is Microsoft Defender for Identity used for?
- Protecting identities in Azure Active Directory
- Protecting identities in on-premises Active Directory
- Protecting identities in M365
- Protecting identities in on-premises Active Directory
Your company is planning on using Azure DDoS Protection. Which of the following does this tool provide protection for?
1, Azure virtual machines
2. Azure virtual networks
3. Azure AD users
- Azure virtual networks
Which of the following is an action that can be carried out by Data Loss Prevention?
- Protecting an Azure virtual machine
- Show a policy tip when a user is trying to share sensitive information
- Encrypt the data that is being stored on an Azure virtual machine
- Show a policy tip when a user is trying to share sensitive information
Which of the following is the process of proving that you say who you say you are?
- Authentication
- Authorization
- Authentication
Which of the following is the process of granting access to a resource?
- Authentication
- Authorization
- Authorization
Which of the following are phases of the Microsoft Cloud Adoption Framework? Choose 3 answers from the options given below
- Define Epics
- Define Strategy
- Plan
- Deploy
- Ready
- Define Strategy
- Plan
- Ready
When it comes to Infrastructure as a service , does Azure take care of the underlying physical network?
- Yes
- No
- Yes
Your company is planning on implementing hybrid identities. Should they use Azure AD Connect for this purpose?
- Yes
- No
- Yes
Your company is planning on implementing hybrid identities. Do they need to setup a Microsoft 365 subscription for this requirement?
- Yes
- No
- No
Your company is planning on implementing Windows Hello for Business. Is Facial recognition one of the authentication methods for Windows Hello for Business?
- Yes
- No
- Yes
Your company is planning on implementing Windows Hello for Business. Does Windows Hello for Business store the biometric data in the local device?
- Yes
- No
- Yes
Your company is planning on using Microsoft Defender for Endpoint. Can you use Microsoft Defender for Endpoint to protect Windows 10-based Azure virtual machines?
- Yes
- No
- Yes
Which of the following provides one central location where you can manage aspects such as Information protection, information governance and data loss prevention?
- Azure Security Center
- Azure Sentinel
- Microsoft 365 compliance center
- Microsoft 365 security center
- Microsoft 365 compliance center
Your company is planning on setting up an Azure AD tenant and an Azure subscription. They want to make use of Azure Active Directory. Which of the following best describes the role of Azure Active Directory?
- Security manager
- An Identity and access management service
- A workflow-based application
- An Identity and access management service
Your company is planning on using Microsoft 365. They have setup a subscription on Microsoft 365. Are you able to use Azure Active Directory in Microsoft 365?
- Yes
- No
- Yes
Which of the following helps to detect and block known weak passwords defined in Azure Active Directory?
- Azure Sentinel
- Azure AD Password Protection
- Azure AD Conditional Access
- Azure AD Password Protection