Microsoft Azure

Microsoft Security, Compliance, and Identity Fundamentals

SC-900
Popular

Prepare for the SC-900 exam to validate your knowledge in Security, Compliance, and Identity Fundamentals.

150 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 141–150 of 150

Q141

You are configuring Azure Security Center notifications. What happens if you don't enable alerts for security recommendations?

  • A Notifications will be sent automatically
  • B No alerts will be generated
  • C Alerts can still be viewed manually
  • D Emails will go to all users
Explanation Without enabling alerts, no security notifications will be generated or sent out.
Q142

Which Azure service is best for managing security alerts?

  • A Microsoft Defender for Cloud
  • B Azure Active Directory
  • C Azure Storage
  • D Network Watcher
Explanation Microsoft Defender for Cloud is designed to manage and aggregate security alerts, while the others serve different purposes.
Q143

A company needs to provide access to users based on their role. Which Azure feature should they implement?

  • A Conditional Access
  • B Role-Based Access Control
  • C Azure Policy
  • D Multi-Factor Authentication
Explanation Role-Based Access Control (RBAC) is specifically designed for access management based on user roles.
Q144

What happens when you enable Azure AD Identity Protection?

  • A Users gain privileged access.
  • B All user passwords reset.
  • C Risk-based conditional access policies are applied.
  • D Reporting on security incidents increases.
Explanation Enabling Azure AD Identity Protection enhances security with risk-based conditional access policies, while the other options are incorrect.
Q145

Which service provides centralized security management in Azure?

  • A Azure Security Center
  • B Azure Monitor
  • C Azure Automation
  • D Azure Advisor
Explanation Azure Security Center centralizes security management, whereas others focus on monitoring or automation.
Q146

A company needs to ensure only specific users access their sensitive data in Azure. Which service should they implement?

  • A Azure Blueprints
  • B Azure Active Directory
  • C Azure DevOps
  • D Azure Traffic Manager
Explanation Azure Active Directory manages user access and permissions, while others serve different purposes.
Q147

What happens when you enable Azure Multi-Factor Authentication (MFA)?

  • A One-time passwords are used
  • B User gets single sign-on
  • C Users aren't prompted for their credentials
  • D Device encryption is enforced
Explanation MFA introduces additional one-time passwords, unlike others which do not specifically relate to authentication processes.
Q148

Which service is used for Azure role-based access control?

  • A Azure Active Directory
  • B Azure Sentinel
  • C Azure Monitor
  • D Azure Firewall
Explanation Azure Active Directory manages role-based access control; the others manage security or monitoring.
Q149

A company needs to monitor compliance for its sensitive data. What should they use?

  • A Azure Compliance Center
  • B Azure Load Balancer
  • C Azure Virtual Network
  • D Azure Policy
Explanation Azure Compliance Center helps specifically with compliance monitoring; the other services have different functions.
Q150

What happens when you enable Azure Data Loss Prevention (DLP) policies?

  • A Data is immediately deleted
  • B Sensitive data is automatically encrypted
  • C Data access is monitored and controlled
  • D All data becomes public
Explanation DLP policies focus on monitoring and controlling access to sensitive data, while the others suggest incorrect outcomes.