Free Microsoft SC-900 Exam Questions (page: 7)

What is an example of encryption at rest?

  1. encrypting communications by using a site-to-site VPN
  2. encrypting a virtual machine disk
  3. accessing a website by using an encrypted HTTPS connection
  4. sending an encrypted email

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest



Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  1. Define the perimeter by physical locations.
  2. Use identity as the primary security boundary.
  3. Always verify the permissions of a user explicitly.
  4. Always assume that the user system can be breached.
  5. Use the network as the primary security boundary.

Answer(s): B,C,D


Reference:

https://docs.microsoft.com/en-us/security/zero-trust/



HOTSPOT (Drag and Drop is not supported)
Which service should you use to view your Azure secure score? To answer, select the appropriate service in the answer area.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Reference:

https://docs.microsoft.com/en-us/azure/security-center/secure-score-access-and-track



DRAG DROP (Drag and Drop is not supported)
You are evaluating the compliance score in Microsoft Purview Compliance Manager. Match the compliance score action subcategories to the appropriate actions.
To answer, drag the appropriate action subcategory from the column on the left to its action on the right. Each action subcategory may be used once, more than once, or not at all.
NOTE: Each correct match is worth one point.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Box 1: Preventative
Preventative actions address specific risks. For example, protecting information at rest using encryption is a preventative action against attacks and breaches. Separation of duties is a preventative action to manage conflict of interest and guard against fraud.
Box 2: Detective
Detective actions actively monitor systems to identify irregular conditions or behaviors that represent risk, or that can be used to detect intrusions or breaches. Examples include system access auditing and privileged administrative actions. Regulatory compliance audits are a type of detective action used to find process issues.
Box 3: Corrective
Corrective actions try to keep the adverse effects of a security incident to a minimum, take corrective action to reduce the immediate effect, and reverse the damage if possible. Privacy incident response is a corrective action to limit damage and restore systems to an operational state after a breach.


Reference:

https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-calculation



Viewing page 7 of 58



Post your Comments and Discuss Microsoft SC-900 exam prep with other Community members:

SC-900 Exam Discussions & Posts