Microsoft Azure

Microsoft Security, Compliance, and Identity Fundamentals

SC-900
Popular

Prepare for the SC-900 exam to validate your knowledge in Security, Compliance, and Identity Fundamentals.

150 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 31–40 of 150

Q31

Which service is primarily used for identity governance in Azure?

  • A Azure Active Directory
  • B Azure Firewall
  • C Azure Key Vault
  • D Azure Storage
Explanation Azure Active Directory provides identity governance, while the others serve different purposes.
Q32

A company needs to ensure data integrity in their Azure storage. What should they configure?

  • A Data at rest encryption
  • B Soft delete
  • C Hash-based message authentication
  • D Access control policies
Explanation Hash-based message authentication provides integrity; other options focus on security or access.
Q33

What happens when a user accesses Azure resources through a private endpoint?

  • A Traffic routes through public internet
  • B Traffic passes through a VM
  • C Traffic is isolated in the virtual network
  • D Traffic is encrypted in transit
Explanation Private endpoints enable isolated routing; others incorrectly describe routing methods.
Q34

Which Azure service is primarily used for setting governance policies across resources?

  • A Azure Policy
  • B Azure Functions
  • C Azure Logic Apps
  • D Azure Cosmos DB
Explanation Azure Policy enables resource governance by enforcing compliance and managing policies across Azure resources, while the other options serve different functions.
Q35

A company needs to send alerts based on intrusion detection events. Which Azure service should they implement?

  • A Azure Sentinel
  • B Azure DevOps
  • C Azure Logic Apps
  • D Azure Traffic Manager
Explanation Azure Sentinel is a security information and event management service that excels in monitoring and alerting on security incidents; the others do not target security operations.
Q36

You are configuring Azure Role-Based Access Control (RBAC). What happens when you assign a role at the management group level?

  • A Applies to all child subscriptions
  • B Applies only to the management group
  • C Overrides existing role assignments
  • D Only applies to specific resource groups
Explanation Assigning a role at the management group level propagates access down to all child subscriptions, while the other options misinterpret RBAC scope implications.
Q37

Which Azure service provides unified security management?

  • A Azure Security Center
  • B Azure DevOps
  • C Azure Monitor
  • D Azure Resource Manager
Explanation Azure Security Center provides unified security management and advanced threat protection.
Q38

A company needs to manage access to various Azure resources based on user roles. Which solution should they implement?

  • A Network Security Groups
  • B Azure Active Directory
  • C Virtual Private Network
  • D Blob Storage Access Policies
Explanation Azure Active Directory facilitates role-based access management.
Q39

What happens when enabling Azure Multi-Factor Authentication (MFA) for a user?

  • A User can access Azure without password.
  • B User must verify identity via second method.
  • C User access is denied immediately.
  • D User must change their password.
Explanation MFA requires a second verification method to enhance security.
Q40

Which service is designed to manage identities in Azure?

  • A Azure Active Directory
  • B Azure DevOps
  • C Azure Blob Storage
  • D Azure Monitor
Explanation Azure Active Directory manages identities, unlike the others.