SC900 Jee Utrecht 1 Flashcards
Your company is planning on using Azure Cloud services. They are looking at the different security aspects when it comes to Microsoft privacy. Is Control a key Microsoft privacy principal?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 2). Kindle Edition.
A. Yes
Explanation:
Below are the key privacy principals as addressed by Microsoft Control Transparency Security Strong legal protections No content-based targeting Benefits to you When it comes to control, this gives control to the customer when it comes to privacy
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 2). Kindle Edition.
Domain:Describe the concepts of security, compliance, and identity Your company is planning on using Azure Cloud services. They are looking at the different security aspects when it comes to Microsoft privacy. Is Transparency a key Microsoft privacy principal?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 3). Kindle Edition.
A. Yes
Explanation:
Below are the key privacy principals as addressed by Microsoft Control Transparency Security Strong legal protections No content-based targeting Benefits to you When it comes to Transparency, Microsoft tells us that they are transparent when it comes to data collection.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 3). Kindle Edition.
Describe the concepts of security, compliance, and identity Your company is planning on using Azure Cloud services. They are looking at the different security aspects when it comes to Microsoft privacy. Is the Shared Responsibility Model a key Microsoft privacy principal?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 4). Kindle Edition.
B. No
Explanation:
Shared Responsibility is not a key Microsoft Privacy principal Below are the key privacy principals as addressed by Microsoft Control Transparency Security Strong legal protections No content-based targeting Benefits to you
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 4). Kindle Edition.
Domain:Describe the concepts of security, compliance, and identity Your company is planning on using Azure Cloud services. They are looking at the concept of the Zero Trust principle. Is Verify explicitly a Zero Trust principle?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 5). Kindle Edition.
A. Yes
Explanation:
Yes . Here you have to ensure that not everyone is provided access to a system. Here you should always authenticate and authorize users. The principles when it comes to Zero trust are Verify explicitly Use least privileged access Assume breach
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 5). Kindle Edition.
Domain:Describe the concepts of security, compliance, and identity Your company is planning on using Azure Cloud services. They are looking at the concept of the Zero Trust principle. Is assume breach a Zero Trust principle?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 6). Kindle Edition.
A. Yes
Explanation:
Yes . here you need to ensure that you implement the required network controls , have threat detection in place to reduce breaches into your system The principles when it comes to Zero trust are Verify explicitly Use least privileged access Assume breach
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 6). Kindle Edition.
Domain:Describe the concepts of security, compliance, and identity Your company is planning on using Azure Cloud services. Which of the following can be used to ensure that data can be read only by authorized users?
A. Encryption
B. Deduplication
C. Archiving
D. Compression
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 7). Kindle Edition.
A. Encryption
Explanation:
You can ensure data is encrypted. Then only authorized users would have the encryption key. The encryption key can then be used to decrypt and read the data. Option B is incorrectsince this is normally used to eliminate duplicate copies of repeating data Option C is incorrectsince this is normally used to store data that is not used that frequently Option D is incorrectsince this is normally used to reduce the storage size of data
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 7). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Which of the following is the process of checking if a signed-in user has access to a particular resource in Azure?
A. Authentication
B. Authorization
C. Conditional Access
D. Resource locks
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 8). Kindle Edition.
B. Authorization
Explanation:
After a user has signed in, the user is checked to see if they have access to resources. If a user tries to access a resource, it would be checked on whether they first have the right to access the resource. This process is known as authorization. Option A is incorrectsince this is used to check if a person is really who they say they are Option Cis incorrectsince this is used to provide a conditional way to authenticate to Azure Option Dis incorrectsince this is used to lock resources in Azure
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 8). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions A company is planning on using Azure Active Directory. Which of the following is used to describe the exact term for Azure Active Directory?
A. Federation server
B. Identity Provider
C. Proxy server
D. Firewall
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 9). Kindle Edition.
B. Identity Provider
Explanation:
Azure Active Directory is Microsoft’s identity provider. This is used for storage of identities and for access management. Both Azure and Microsoft Office 365 can use Azure Active Directory for identity and access management All of the other options are incorrect since Azure Active Directory is used for identity and access management.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 9). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions A company wants to make use of Windows Hello for business when it comes to authentication. Which of the following are the authentication techniques available for Windows Hello for business? Choose 3 answers from the options given below
A. PIN
B. Facial Recognition
C. Email message
D. Password
E. Fingerprint recognition
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 10). Kindle Edition.
A. PIN
B. Facial Recognition
E. Fingerprint recognition
Explanation:
The entire purpose of Windows Hello for business is to ensure passwords are not used in the authentication process. Here uses can use other techniques for authentication via the usage of PIN’s and biometric recognition. Options C and D are incorrectsince Windows Hello for Business tries to ensure that secure measures are used for the authentication process.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 10). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Your company is planning on using Azure Active Directory for the storage of identities. They want to make use of the self-service password reset feature. Which of the following authentication methods are available for self-service password reset? Choose 3 answers from the options given below
A. Email
B. A passport identification number
C. A picture message
D. Mobile app notification
E. Mobile app code
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 11). Kindle Edition.
A. Email
D. Mobile app notification
E. Mobile app code
Explanation:
Below are the authentication methods available for self-service password reset Mobile app notification Mobile app code Email Mobile phone Office phone Security questions Since the authentication methods are clearly mentioned, all other options are incorrect
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 11). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Your company is planning on using Azure Active Directory. They already have user identities stored in their on-premises Active Directory. They want to sync the user identities from their on-premises Active Directory onto Azure Active Directory. Which of the following could be used for this purpose?
A. Azure Blueprints
B. Azure AD Connect
C. Azure Identity Protection
D. Azure Privileged Identity Management
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 13). Kindle Edition.
B. Azure AD Connect
Explanation:
Azure AD Connect is used to synchronize identities from the on-premises Active Directory onto Azure Active Directory. There are different methods available for user identity synchronization. Option A is incorrectsince this is used to define a repeatable set of Azure resources Option C is incorrectsince this is used for securing identities in Azure AD Option D is incorrectsince this is used for providing just-in-time access to resources in Azure AD
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 13). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Your company is planning on making use of Azure Active Directory. Do all versions of Azure Active Directory provide the same set of features?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 15). Kindle Edition.
B. No
Explanation:
There are different pricing models available for Azure Active Directory. The most basic version is the Free model. Here there is a limitation in terms of features. For example, you will not get features such as A service level agreement Self-service password reset for cloud users Group access management
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 15). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Your company is planning on making use of Azure Active Directory. Does the company need to create a virtual machine in Azure for hosting Active Directory?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 16). Kindle Edition.
B. No
Explanation:
Azure Active Directory is a completely managed service. Here the underlying infrastructure is managed by Azure. You don’t need to create any virtual machines for hosting Active Directory.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 16). Kindle Edition.
Domain:Describe the capabilities of Microsoft security solutions Your company is planning on making use of Network Security Groups. Can you make use of network security groups to deny all inbound traffic from the Internet?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 17). Kindle Edition.
A. Yes
Explanation:
By default, there is a rule in the Network security group that blocks all network traffic except for that within the Azure virtual network. This rule will block all traffic from the Internet. For more information on Azure network security groups , please refer to the below URL
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 17). Kindle Edition.
Your company is planning on making use of Network Security Groups. Can you make use of network security groups to deny all outbound traffic to the Internet?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 18). Kindle Edition.
A. Yes
Explanation:
In the network security group, you can create a rule that would deny all outbound traffic to the Internet. An example is shown below For more information on Azure network security groups , please refer to the below URL
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 18). Kindle Edition.
Domain:Describe the capabilities of Microsoft security solutions Your company is planning on making use of Network Security Groups. Can you make use of network security groups to filter traffic based on the IP address, protocol and port number?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 19). Kindle Edition.
A. Yes
Explanation:
For a network security group rule, you can create a rule that is based on the IP address, the protocol and the port number. An example screenshot is given below which shows the IP address, the protocol and the port number.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 19). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Which of the following can be used to provide just-in-time access to resources?
A. Azure AD Identity Protection
B. Azure AD Privileged Identity Management
C. Azure Multi-Factor Authentication
D. Azure Blueprints
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 22). Kindle Edition.
B. Azure AD Privileged Identity Management
Explanation:
Azure AD Privileged Identity Management can be used to provide just-in-time access to your resources. In Azure AD Privileged Identity Management, you can add assignments to resources to users in Azure. An example screenshot is given below Option A is incorrectsince this is used for securing identities in Azure AD Option C is incorrectsince this is used as an extra level of authentication during the entire authentication process Option D is incorrectsince this is used to define a repeatable set of Azure resources
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (pp. 22-23). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Your company is planning on using Azure AD Identity Protection. Can you use Azure AD Identity protection to provide access to resources in Azure?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 24). Kindle Edition.
B. No
Explanation:
Azure AD Identity protection is used to identify risks based on the user sign-in process. It is not used to provide access to resources in Azure.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 24). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Your company is planning on using Azure AD Identity Protection. Can you use Azure AD Identity protection to enforce multi-factor authentication for users based on a sign-risk policy?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 25). Kindle Edition.
A. Yes
Explanation:
In Azure AD Identity Protection, you can configure the Sign-in risk policy to allow access and enforce the use of Multi-Factor Authentication.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 25). Kindle Edition.
Domain:Describe the capabilities of Microsoft identity and access management solutions Your company is planning on using Azure AD Identity Protection. Does Azure AD Identity protection categorize events into Low, Medium and High?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 26). Kindle Edition.
A. Yes
Explanation:
When you configure a risk policy in Azure AD Identity Protection, you can decide on the category of risks. This is because all of the identified risks are categorized into High, Medium or Low risks.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 26). Kindle Edition.
Which of the following can be used to provide a secure score for the resources defined as part of your Azure account?
A. Azure Security Center
B. Azure key Vaults
C. Azure Sentinel
D. Azure Information Protection
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 28). Kindle Edition.
A. Azure Security Center
Explanation:
You can accomplish this with the help of Azure Security Center If you go to Azure Security Center, in the Overview you can see the secure score. Since this is clearly shown in Azure Security Center, all other options are incorrect
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (pp. 28-29). Kindle Edition.
You have to decide on the right service to use based on the requirement. Which of the following would you use for the below requirement? “Provide Network address translation”
A. Azure Bastion
B. Azure Firewall
C. Network Security Groups
D. Azure DDoS Protection
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 30). Kindle Edition.
B. Azure Firewall
Explanation:
The Azure Firewall service has the facility to translate traffic via its public IP address to private IP addresses to virtual networks Option A is incorrectsince this provides a service to RDP/SSH into your Azure virtual machines Option C is incorrectsince this is used to filter the traffic to your Azure virtual machines Option D is incorrectsince this is used to protect your Azure resources against large scale attacks from the Internet
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 30). Kindle Edition.