Microsoft Azure

Microsoft Security, Compliance, and Identity Fundamentals

SC-900
Popular

Prepare for the SC-900 exam to validate your knowledge in Security, Compliance, and Identity Fundamentals.

150 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 71–80 of 150

Q71

A company needs to ensure that only approved users can access sensitive data in Azure. What should they implement?

  • A Role-Based Access Control (RBAC)
  • B Azure Blob Storage
  • C Resource Locking
  • D Azure Firewall
Explanation Role-Based Access Control (RBAC) manages permissions; the other options do not directly control user access.
Q72

What happens when you disable Multi-Factor Authentication (MFA) for a user?

  • A User can log in without verification
  • B User's password is reset
  • C User account is deleted
  • D User must always use MFA
Explanation Disabling MFA allows simplified login; the other options are not consequences of disabling MFA.
Q73

Which service within Azure provides automated compliance assessments?

  • A Azure Security Center
  • B Azure Monitor
  • C Azure Active Directory
  • D Azure DevOps
Explanation Azure Security Center offers comprehensive compliance assessments, while the others focus on different aspects.
Q74

A company needs to ensure multi-factor authentication for critical resources. What should they implement?

  • A Conditional Access Policies
  • B Application Insights
  • C Virtual Network
  • D Azure Functions
Explanation Conditional Access Policies enforce multi-factor authentication, unlike the other services.
Q75

You are configuring Azure Key Vault. What happens when a secret is deleted?

  • A It's permanently removed immediately
  • B It's moved to the recovery layer
  • C It becomes inaccessible only
  • D It's locked for 30 days
Explanation Deleted secrets go to the recovery layer for possible restoration, unlike immediate deletion or access restrictions.
Q76

Which service provides identity protection based on user behavior?

  • A Azure Active Directory Identity Protection
  • B Azure Security Center
  • C Azure Information Protection
  • D Azure Key Vault
Explanation Azure Active Directory Identity Protection uses user behavior analytics to detect anomalies, while the other options serve different security purposes.
Q77

A company needs to enforce least privilege access to its Azure resources. What should they implement?

  • A Role-Based Access Control (RBAC)
  • B Network Security Groups (NSGs)
  • C Azure Policy
  • D Key Vault Access Policies
Explanation Role-Based Access Control (RBAC) allows fine-grained access management, unlike the other options which focus on different security aspects.
Q78

What happens when a user logs in with Multi-Factor Authentication (MFA) enabled and their second factor fails?

  • A Login is successful, warning provided
  • B User is denied access
  • C Account is locked for 24 hours
  • D User can reset second factor
Explanation If the second factor fails, the user is denied access to enhance security, contrary to the other misleading options.
Q79

Which service provides identity management in Azure?

  • A Azure Active Directory
  • B Azure Synapse Analytics
  • C Azure Logic Apps
  • D Azure Blob Storage
Explanation Azure Active Directory manages identities, while others are unrelated.
Q80

A company needs to ensure all its Azure resources are monitored for security vulnerabilities. Which Azure service should they use?

  • A Azure Monitor
  • B Azure Security Center
  • C Azure DevOps
  • D Azure Functions
Explanation Azure Security Center specifically monitors security vulnerabilities.