Microsoft Azure
Microsoft Security, Compliance, and Identity Fundamentals
SC-900
Popular
Prepare for the SC-900 exam to validate your knowledge in Security, Compliance, and Identity Fundamentals.
150 questions
0 views
Free
Questions 41–50 of 150
A company needs to ensure compliance with data privacy regulations. What Azure tool should they use?
-
A
Azure Policy
-
B
Azure DevTest Labs
-
C
Azure Functions
-
D
Azure Bastion
Explanation
Azure Policy helps maintain compliance, the others do not.
You are configuring Azure Security Center. What happens when you enable security recommendations?
-
A
Violations are automatically fixed.
-
B
You receive alerts on vulnerabilities.
-
C
Compliance reports are generated.
-
D
No immediate action occurs.
Explanation
Enabling security recommendations provides alerts on vulnerabilities, while others are incorrect actions.
Which service provides security for cloud applications?
-
A
Microsoft Sentinel
-
B
Azure DevOps
-
C
Azure Functions
-
D
Azure Kubernetes Service
Explanation
Microsoft Sentinel offers security monitoring; others provide different functionalities.
A company wants to restrict actions on data based on user roles. Which feature should they use?
-
A
Network Security Groups
-
B
Access Control Lists
-
C
Azure Role-Based Access Control
-
D
Encryption at Rest
Explanation
Azure RBAC allows user-specific access based on roles; others don't manage access per user.
What happens when you enable Azure AD Multi-Factor Authentication?
-
A
User passwords must be changed
-
B
Additional verification is needed for access
-
C
All users are locked out immediately
-
D
Authentication becomes instant
Explanation
Multi-Factor Authentication increases security by requiring additional verification; the other options are inaccurate.
Which service is primarily used for monitoring Azure resources and applications?
-
A
Azure Monitor
-
B
Azure Storage
-
C
Azure DevOps
-
D
Azure Functions
Explanation
Azure Monitor provides comprehensive monitoring capabilities; others serve different purposes.
A company needs to securely share sensitive documents with external vendors. What should they use?
-
A
Azure Blob Storage
-
B
Azure Active Directory B2B
-
C
Azure SQL Database
-
D
Azure Functions
Explanation
Azure AD B2B allows secure sharing with external users; the others do not provide this functionality.
What happens when an Azure Resource Group is deleted?
-
A
All resources in it are also deleted
-
B
Only non-virtual resources are kept
-
C
Resources can be restored later
-
D
Resource Group cannot be deleted after 30 days
Explanation
Deleting a Resource Group permanently deletes all contained resources; the others incorrectly describe resource behavior.
Which Azure service is primarily used for managing user identities?
-
A
Azure Active Directory
-
B
Azure SQL Database
-
C
Azure Blob Storage
-
D
Azure Virtual Network
Explanation
Azure Active Directory is designed for identity management; the others serve different functions.
A company needs to ensure compliance with GDPR while using Azure. What should they primarily focus on?
-
A
Database performance tuning
-
B
User data protection policies
-
C
Enhancing application speed
-
D
Increasing storage capacity
Explanation
GDPR mainly requires user data protection, not performance or capacity.