Microsoft Azure

Microsoft Security, Compliance, and Identity Fundamentals

SC-900
Popular

Prepare for the SC-900 exam to validate your knowledge in Security, Compliance, and Identity Fundamentals.

150 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 150

Q131

A company needs to implement identity protection for users in Azure Active Directory. What should they use?

  • A Multi-Factor Authentication
  • B Azure Firewall
  • C Azure Site Recovery
  • D Azure Virtual Machines
Explanation Multi-Factor Authentication strengthens user identity protection, whereas the others do not address identity issues.
Q132

What happens when a user is removed from a security group in Azure AD?

  • A They lose all permissions.
  • B They retain their access.
  • C Their access is revoked.
  • D They must reapply for access.
Explanation Removing a user from a security group revokes their permissions tied to that group, unlike the other options.
Q133

Which service is primarily used for identity management in Azure?

  • A Azure Active Directory
  • B Azure Blob Storage
  • C Azure Functions
  • D Azure Virtual Machines
Explanation Azure Active Directory is designed for identity management, while the others serve different purposes.
Q134

A company needs to implement role-based access control (RBAC) in Azure. Which initial step should they take?

  • A Define roles required for access
  • B Create a subscription
  • C Assign licenses to users
  • D Deploy resources in Azure
Explanation Defining roles is essential before implementing RBAC; the other options are not directly related.
Q135

What happens when an Azure Security Center policy is not applied to a resource group?

  • A The resources are non-compliant
  • B The resources are deleted automatically
  • C Monitoring is not invoked
  • D Security alerts are ignored
Explanation Non-application results in non-compliance, but resources remain intact and monitored.
Q136

Which service is primarily used for Azure identity management?

  • A Azure Active Directory
  • B Azure Storage
  • C Azure Virtual Machines
  • D Azure DevOps
Explanation Azure Active Directory manages identities, unlike the others.
Q137

A company needs to regulate access to its data based on user roles; which Azure feature should they use?

  • A Multi-Factor Authentication
  • B Role-Based Access Control
  • C Network Security Groups
  • D Application Insights
Explanation Role-Based Access Control assigns permissions based on roles.
Q138

What happens when a user does not comply with Azure's Conditional Access policies?

  • A Access is granted automatically
  • B User is logged out permanently
  • C Access is denied or restricted
  • D User receives a warning only
Explanation Access is denied or restricted as per policy.
Q139

Which service can help secure Azure resource access using conditional policies?

  • A Azure AD Conditional Access
  • B Azure Policy
  • C Azure Security Center
  • D Azure Monitor
Explanation Azure AD Conditional Access defines access policies, while others do not specifically manage access conditions.
Q140

A company needs to protect sensitive data while in transit. What Azure service would they use?

  • A Azure Information Protection
  • B Azure VPN Gateway
  • C Azure Blob Storage
  • D Azure Active Directory
Explanation Azure VPN Gateway secures data in transit, unlike the other options which focus on data at rest or identity management.