Microsoft Azure
Microsoft Security, Compliance, and Identity Fundamentals
SC-900
Popular
Prepare for the SC-900 exam to validate your knowledge in Security, Compliance, and Identity Fundamentals.
150 questions
0 views
Free
Questions 131–140 of 150
A company needs to implement identity protection for users in Azure Active Directory. What should they use?
-
A
Multi-Factor Authentication
-
B
Azure Firewall
-
C
Azure Site Recovery
-
D
Azure Virtual Machines
Explanation
Multi-Factor Authentication strengthens user identity protection, whereas the others do not address identity issues.
What happens when a user is removed from a security group in Azure AD?
-
A
They lose all permissions.
-
B
They retain their access.
-
C
Their access is revoked.
-
D
They must reapply for access.
Explanation
Removing a user from a security group revokes their permissions tied to that group, unlike the other options.
Which service is primarily used for identity management in Azure?
-
A
Azure Active Directory
-
B
Azure Blob Storage
-
C
Azure Functions
-
D
Azure Virtual Machines
Explanation
Azure Active Directory is designed for identity management, while the others serve different purposes.
A company needs to implement role-based access control (RBAC) in Azure. Which initial step should they take?
-
A
Define roles required for access
-
B
Create a subscription
-
C
Assign licenses to users
-
D
Deploy resources in Azure
Explanation
Defining roles is essential before implementing RBAC; the other options are not directly related.
What happens when an Azure Security Center policy is not applied to a resource group?
-
A
The resources are non-compliant
-
B
The resources are deleted automatically
-
C
Monitoring is not invoked
-
D
Security alerts are ignored
Explanation
Non-application results in non-compliance, but resources remain intact and monitored.
Which service is primarily used for Azure identity management?
-
A
Azure Active Directory
-
B
Azure Storage
-
C
Azure Virtual Machines
-
D
Azure DevOps
Explanation
Azure Active Directory manages identities, unlike the others.
A company needs to regulate access to its data based on user roles; which Azure feature should they use?
-
A
Multi-Factor Authentication
-
B
Role-Based Access Control
-
C
Network Security Groups
-
D
Application Insights
Explanation
Role-Based Access Control assigns permissions based on roles.
What happens when a user does not comply with Azure's Conditional Access policies?
-
A
Access is granted automatically
-
B
User is logged out permanently
-
C
Access is denied or restricted
-
D
User receives a warning only
Explanation
Access is denied or restricted as per policy.
Which service can help secure Azure resource access using conditional policies?
-
A
Azure AD Conditional Access
-
B
Azure Policy
-
C
Azure Security Center
-
D
Azure Monitor
Explanation
Azure AD Conditional Access defines access policies, while others do not specifically manage access conditions.
A company needs to protect sensitive data while in transit. What Azure service would they use?
-
A
Azure Information Protection
-
B
Azure VPN Gateway
-
C
Azure Blob Storage
-
D
Azure Active Directory
Explanation
Azure VPN Gateway secures data in transit, unlike the other options which focus on data at rest or identity management.