Search Header Logo

SC900 Practise Assements

Authored by solomonraju D

Professional Development

Professional Development

Used 4+ times

SC900 Practise Assements
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

No

Yes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you use to provide real-time integration between Azure Sentinel and another security source?

Azure AD Connect

a Log Analytics workspace

Azure Information Protection

a connector

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

the Microsoft Endpoint Manager admin center

Azure Cost Management + Billing

Microsoft Service Trust Portal

the Azure Active Directory admin center

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

the management of mobile devices

the permissions for the user data stored in Azure

the creation and management of user accounts

the management of the physical hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of encryption at rest?

encrypting communications by using a site-to-site VPN

encrypting a virtual machine disk

accessing a website by using an encrypted HTTPS connection

sending an encrypted email

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.

Define the perimeter by physical locations.

Use identity as the primary security boundary.

Always verify the permissions of a user explicitly.

Always assume that the user system can be breached.

Use the network as the primary security boundary.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Azure Multi-Factor Authentication (MFA)

Azure Active Directory (Azure AD) Identity Protection

conditional access policies

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development