Microsoft Azure

Microsoft Security, Compliance, and Identity Fundamentals

SC-900
Popular

Prepare for the SC-900 exam to validate your knowledge in Security, Compliance, and Identity Fundamentals.

150 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 1–10 of 150

Q1

Which service provides a centralized view of security alerts?

  • A Microsoft Defender for Cloud
  • B Azure Virtual Network
  • C Azure Functions
  • D Azure Logic Apps
Explanation Microsoft Defender for Cloud offers integrated security insights, while the others focus on networking, serverless computing, and automation.
Q2

A company needs to ensure compliance with GDPR in Azure. What should they primarily utilize?

  • A Azure Blob Storage
  • B Azure Policy
  • C Azure Activity Log
  • D Azure Resource Manager
Explanation Azure Policy helps enforce compliance rules, whereas the others do not directly assist with compliance management.
Q3

You are configuring access to Azure resources using RBAC. What happens when you assign a role to a user at the resource group level?

  • A User gets access to all resources
  • B User cannot access resources
  • C User can access all resources in group
  • D User only accesses specific resources
Explanation Assigning a role at the resource group level grants access to all resources within that group.
Q4

Which service helps in detecting threats across Azure resources?

  • A Azure Security Center
  • B Azure Active Directory
  • C Azure Functions
  • D Azure Logic Apps
Explanation Azure Security Center provides threat detection; others do not specialize in security monitoring.
Q5

A company needs to store sensitive data securely. Which Azure feature ensures data encryption at rest?

  • A Role-Based Access Control
  • B Encryption in Transit
  • C Azure Disk Encryption
  • D Azure Virtual Network
Explanation Azure Disk Encryption specifically encrypts data at rest; the others do not handle encryption at rest directly.
Q6

What happens when you assign a role to a user in Azure Active Directory?

  • A User gains full control
  • B User can manage subscriptions
  • C User receives specific permissions
  • D User cannot access resources
Explanation Assigning a role gives specific permissions; full control isn't guaranteed, nor is resource access denied by default.
Q7

Which service provides identity protection capabilities?

  • A Azure Active Directory
  • B Azure Storage
  • C Azure Functions
  • D Azure Virtual Machines
Explanation Azure Active Directory offers identity protection features while the others do not focus on identity management.
Q8

A company needs to secure access to its Azure resources based on user roles. What should they implement?

  • A Encryption at rest
  • B Network Security Groups
  • C Role-Based Access Control (RBAC)
  • D Backup and disaster recovery
Explanation Role-Based Access Control (RBAC) allows permissions based on user roles effectively securing resource access.
Q9

What happens when you enable multi-factor authentication (MFA) for a user?

  • A User requires password only
  • B User needs extra verification
  • C User account is locked
  • D User cannot access resources
Explanation Enabling MFA requires users to verify their identity using an additional factor beyond the password.
Q10

Which service is primarily used for Azure identity management?

  • A Azure Active Directory
  • B Azure Blob Storage
  • C Azure Functions
  • D Azure VPN Gateway
Explanation Azure Active Directory is the identity management service; others are used for data storage or networking.