SC-900

SC-900

12th Grade

63 Qs

quiz-placeholder

Similar activities

Micrisoft excel

Micrisoft excel

9th - 12th Grade

60 Qs

CSS Diagnostic - Test

CSS Diagnostic - Test

12th Grade

60 Qs

Computer Systems Quiz

Computer Systems Quiz

9th - 12th Grade

60 Qs

Microsoft Defender for Office 365 and Purview Quiz

Microsoft Defender for Office 365 and Purview Quiz

12th Grade

60 Qs

Latihan Soal Microsoft Word

Latihan Soal Microsoft Word

KG - 12th Grade

68 Qs

CBT

CBT

11th - 12th Grade

60 Qs

The Big Digital IT & General Knowledge Quiz

The Big Digital IT & General Knowledge Quiz

9th Grade - University

59 Qs

CSS3 1st Quarterly Assessment SY23-24

CSS3 1st Quarterly Assessment SY23-24

12th Grade

60 Qs

SC-900

SC-900

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Michael Nefzger

Used 8+ times

FREE Resource

63 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has deployed Microsoft 365 applications to all employees. Considering the shared responsibility model, who is responsible for the accounts and identities relating to these employees?

The Organization

Microsoft, the Saas provider

There's shared responsibility between an organization

Answer explanation

In the shared responsibility model, the customer organization always has responsibility for their data, including information and data relating to employees, devices, and accounts and identities.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following measures might an organization implement as part of the defense in-depth security methodology?

Locating all its servers in a single physical location

Multifactor authentication for all users

Ensuring there's no segmentation of your corporate network

Answer explanation

Multifactor authentication is an example of defense in-depth at the identity and access layer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?

Hashing

Encryption in transit

Encryption at rest

Answer explanation

Encryption at rest could be part of a security strategy to protect stored employee data.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes the concept of data sovereignty?

There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.

Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed.

Trust no one, verify everything.

Answer explanation

Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What are the six foundational pillars?

Identities

and

Devices

Applications

and

Data

Infrastructure

and

Networks

Saas

and

Paas

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What is the zero trust guiding principles?

Verify explicitly

Least privileged access

Assume breach

Do not verify

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the two top-level types of encryption?

Symmetric encryption

uses the same key to encrypt and decrypt the data.

Asymmetric encryption

uses a public key and private key.

Either key can encrypt data, but a single key can not be used to decrypt encrypted data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?