SC900 Jee Utrecht 2 Flashcards
A company is planning on hosting resources in the Azure cloud. If the company is planning on using Infrastructure as a service in Azure, would the cloud provider be responsible for managing the physical hosts?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 79). Kindle Edition.
A. Yes
Explanation:
When deploying resources in an Infrastructure as a Service model, the cloud provider is responsible for the physical hosts. Here aspects such as the physical servers and the physical security of the data center will be managed by the cloud provider.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 79). Kindle Edition.
A company is planning on hosting resources in Azure cloud. If the company is planning on hosting their data and applications in the cloud, are they responsible for the protection of the underlying data?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 80). Kindle Edition.
A. Yes
Explanation:
There is a clear model when it comes to the responsibility of the customer and the cloud provider. The customer is responsible for the protection of the data and the applications on the cloud. You can refer to the link on the Shared Responsibility Model. This gives the delineation of the responsibilities of the customer and the cloud provider.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 80). Kindle Edition.
A company is planning on hosting resources in Azure cloud. If the company is planning on using the Software as a service model would the company need to manage the underlying applications?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 81). Kindle Edition.
B. No
Explanation:
When using a Software as a service model, the cloud provide will manage the following The hardware and the software Will provide the appropriate service agreement Ensure availability and security of the application and the data
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 81). Kindle Edition.
Your company is planning on using Azure AD Identity Protection. Does Azure AD Identity Protection generate sign-in risks after the user is authenticated?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 82). Kindle Edition.
B. No
Explanation:
The entire purpose of Azure AD Identity protection is to detect risks during the sign-in process. So the risk detection is done during the authentication process and not after the authentication process.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 82). Kindle Edition.
Your company has requirements to manage user risk and sign-in risk for users that are authenticating with Azure AD. Based on the risk level, access will either be blocked or granted. Users may also need to provide Multi-Factor Authentication or reset their password based on the perceived risk. What feature can be used to meet these requirements?
A. Azure AD Role-Based Access Control
B. Azure Privileged Identity Management
C. Azure AD Identity Protection
D. Azure AD Security Defaults
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 83). Kindle Edition.
C. Azure AD Identity Protection
Explanation:
Answer A is incorrectas Role-Based Access Control is used to grant permissions to users or groups for Azure Resources, Microsoft 365 resources, SaaS applications, and custom cloud or on-premise applications. Answer B is incorrectas Privileged Identity Management is used to manage access to critical resources in your Azure subscriptions. It could not be used to assess user risk or sign-in risk. Answer C is Correctas Azure AD Identity Protection provides you the ability to detect user risk and sign-in risk and then make appropriate decisions based on that risk as to whether or not access should be granted. Answer D is incorrectas Azure AD Security Defaults provide an easy way to implement some of the most common and recommended security settings. It could not be used to assess user risk or sign-in risk.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (pp. 83-84). Kindle Edition.
Your company is planning on making use of conditional access policies within Azure. You need to ensure that only users with a Windows device can access a specific application. Can conditional access policies be used to accomplish this requirement?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 85). Kindle Edition.
A. Yes
Explanation:
Conditional Access is used to control the authentication process and it can assess various signals including the device a user is attempting to access the application.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 85). Kindle Edition.
Your company is planning on making use of conditional access. Can you use conditional access to enable multi-factor authentication for users that sign-in from certain locations?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 86). Kindle Edition.
A. Yes
Explanation:
Yes, you can use conditional access to enable multi-factor authentication for users that sign-in from certain locations A screenshot of the place where this can be done is given below. In the policy you have to go to the Locations and then configure the location accordingly.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 86). Kindle Edition.
Your company is planning on making use of conditional access. Can you use conditional access to enable multi-factor authentication for users that sign-in via certain cloud-based applications?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 88). Kindle Edition.
A. Yes
Explanation:
Yes, you can use conditional access to enable multi-factor authentication for users that sign-in via certain cloud-based applications A screenshot of the place where this can be done is given below. In the Policy you have to go to Cloud apps or actions and then select the applications accordingly.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 88). Kindle Edition.
Your company wants to start hosting resources on Azure. When using Azure cloud, would the company be responsible for maintaining the underlying physical hosts?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 90). Kindle Edition.
B. No
Explanation:
The responsibility of managing the underlying physical hosts would lie with Azure. Azure would manage all aspects when it comes the underlying physical infrastructure.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 90). Kindle Edition.
Your company wants to start hosting resources on Azure. When using Azure cloud, would the company be responsible for maintaining the underlying identities that would be assigned access to Azure resources?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 91). Kindle Edition.
A. Yes
Explanation:
Here the maintenance of the underlying identities in Azure would lie with the customer. Azure provides an option of Azure Active Directory for storing the identities, but the final responsibility of managing the identities lies with the customer.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 91). Kindle Edition.
Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure. Which of the following could be used for the following requirement? “Grant access to users for managing various aspects of the Azure AD tenant”
A. Azure AD Identity Management
B. Azure Conditional Access
C. Azure AD Roles
D. Azure AD Connect
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 92). Kindle Edition.
C. Azure AD Roles
Explanation:
You can assign various roles in Azure AD for users to manage various aspects of Azure Active Directory Option A is incorrectsince this is used to protect identities in Azure Option B is incorrectsince this is used to provide Conditional access to Azure Option D is incorrectsince this is used to sync identities from the on-premises Active Directory on Azure AD
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 92). Kindle Edition.
Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure. Which of the following could be used for the following requirement? “Be able to sync users from the on-premises Active Directory onto Azure AD”
A. Azure AD Identity Management
B. Azure Conditional Access
C. Azure AD Roles
D. Azure AD Connect
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 93). Kindle Edition.
D. Azure AD Connect
Explanation:
Azure AD Connect is used to synchronize identities from the on-premises Active Directory onto Azure Active Directory. There are different methods available for user identity synchronization. Option A is incorrectsince this is used to protect identities in Azure Option B is incorrectsince this is used to provide Conditional access to Azure Option C is incorrectsince this is used to assign permissions to users for manage various aspects in Azure Active Directory
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 93). Kindle Edition.
Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure. Which of the following could be used for the following requirement? “Enforce Multi-Factor authentication based on the location of the user and what application the user is trying to access ”
A. Azure AD Identity Management
B. Azure Conditional Access
C. Azure AD Roles
D. Azure AD Connect
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 95). Kindle Edition.
B. Azure Conditional Access
Explanation:
Yes, you can use conditional access to enable multi-factor authentication for users that sign-in via certain cloud-based applications and also based on the location.
Option A is incorrectsince this is used to protect identities in Azure Option C is incorrectsince this is used to assign permissions to users for manage various aspects in Azure Active Directory Option D is incorrectsince this is used to sync identities from the on-premises Active Directory on Azure AD
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 96). Kindle Edition.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 95). Kindle Edition.
Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure. Which of the following could be used for the following requirement? “Enforce Multi-Factor authentication based on the sign-in risk”
A. Azure AD Identity Protection
B. Azure Conditional Access
C. Azure AD Roles
D. Azure AD Connect
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 98). Kindle Edition.
A. Azure AD Identity Protection
Explanation:
In Azure AD Identity Protection, you can configure the Sign-in risk policy to allow access and enforce the use of Multi-Factor Authentication. Option B is incorrectsince this is used to provide Conditional access to Azure Option C is incorrectsince this is used to assign permissions to users for manage various aspects in Azure Active Directory Option D is incorrectsince this is used to sync identities from the on-premises Active Directory on Azure AD
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (pp. 98-99). Kindle Edition.
You have a set of resources in Azure. Can you add multiple delete locks for a resource in Azure?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 100). Kindle Edition.
A. Yes
Explanation:
You have a set of resources in Azure. Can you add a delete lock to a resource that already has a read-only lock?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 101). Kindle Edition.
A. Yes
Explanation:
You have a set of resources in Azure. Are resource locks inherited by resources when a lock is present at the resource group level?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 102). Kindle Edition.
A. Yes
Explanation:
Yes. In the below screenshot, a Delete lock is placed at the resource group level. And here is has been inherited by the resources in the resource group.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 102). Kindle Edition.
Which of the following is a scalable, cloud-native, security information event management and security orchestration automated response solution?
A. Azure Sentinel
B. Azure Security Center
C. Azure Active Directory
D. Azure AD Identity Protection
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 103). Kindle Edition.
A. Azure Sentinel
Explanation:
You can use Azure Sentinel as a scalable, cloud-native, security information event management and security orchestration automated response solution. Azure Sentinel has the capability to ingest data from a variety of sources and performance threat monitoring on that data. Option B is incorrectbecause Azure Security Center can give various security metrics and recommendations for your environment, but it can’t provide a complete orchestration and response-based solution Option C is incorrectbecause this is your identity-based solution in Azure Option D is incorrectbecause this is used to protect your identities in Azure
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 103). Kindle Edition.
Your company is currently looking at using the Azure Policy service. Can the Azure Policy service be used to check the compliance of existing resources?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 105). Kindle Edition.
A. Yes
Explanation:
The entire idea of the Azure Policy service is to check whether the existing resource conform to the various policy definitions. In the Azure Policy dashboard, you can check for the compliance and non-compliance of your resources.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 105). Kindle Edition.
Your company is currently looking at using the Azure Policy service. Can the Azure Policy service be used to remediate issues that get detected via its compliance checks?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 107). Kindle Edition.
A. Yes
Explanation:
Some of the policies in Azure Policy has a Remediation section. This can be used to remediate issues if the resources are found to be not complaint with the policy.
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 107). Kindle Edition.
Your company is planning on making use of Azure Blueprints. Can Azure Blueprints be used to deploy resources groups to subscriptions?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 109). Kindle Edition.
A. Yes
Explanation:
When you create an Azure Blueprint , you can create multiple artifacts as part of the Blueprint. One of them is the creation of resource groups. A screenshot of this is given below
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 109). Kindle Edition.
Your company is planning on making use of Azure Blueprints. Can Azure Blueprints be used to create role assignments for an Azure subscription?
A. Yes
B. No
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 110). Kindle Edition.
A. Yes
Explanation:
When you create an Azure Blueprint , you can create multiple artifacts as part of the Blueprint. One of them is role assignments. A screenshot of this is given below
Utrecht, Jee. SC-900 Practice Questions: Microsoft Security, Compliance, and Identity Fundamentals: 110 Practice Questions with Answers and Explanations (p. 110). Kindle Edition.