Microsoft SC-900 Exam Questions
Microsoft Security, Compliance, and Identity Fundamentals (Page 8 )

Updated On: 24-Feb-2026

What can be created in Active Directory Domain Services (AD DS)?

  1. line-of-business (LOB) applications that require modern authentication
  2. computer accounts
  3. software as a service (SaaS) applications that require modern authentication
  4. mobile devices

Answer(s): B

Explanation:

What is computer account in Active Directory?
A computer account represents your desktop or laptop computer to the Active Directory.


Reference:

https://commons.lbl.gov/display/itfaq/Active+Directory



HOTSPOT (Drag and Drop is not supported)
Select the answer that correctly completes the sentence.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Authentication
What is the difference between authentication and authorization in Azure?
In simple terms, authentication is the process of verifying who a user is, while authorization is the process of verifying what they have access to.


Reference:

https://auth0.com/docs/get-started/identity-fundamentals/authentication-and-authorization



HOTSPOT (Drag and Drop is not supported)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Box 1: Yes
Authorization is the security process that determines a user or service's level of access.
Box 2: Yes
Authentication (AuthN) is a process that verifies that someone or something is who they say they are. Box 3: No


Reference:

https://www.onelogin.com/learn/authentication-vs-authorization



HOTSPOT (Drag and Drop is not supported)
Select the answer that correctly completes the sentence.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Box: federation
Using your company credentials to access a partner company's resources require a      solution between the two companies.
Manage B2B collaboration with other organizations
B2B collaboration is enabled by default, but comprehensive admin settings let you control your inbound and outbound B2B collaboration with external partners and organizations.
*-> Cross-tenant access settings. For B2B collaboration with other Microsoft Entra organizations, use cross- tenant access settings to control which users can authenticate with which resources. Manage inbound and outbound B2B collaboration, and scope access to specific users, groups, and applications. Set a default configuration that applies to all external organizations, and then create individual, organization-specific settings as needed. Using cross-tenant access settings, you can also trust multifactor (MFA) and device claims (compliant claims and Microsoft Entra hybrid joined claims) from other Microsoft Entra organizations.
* External collaboration settings.
These settings are used to manage two different aspects of B2B collaboration. Cross-tenant access settings control whether users can authenticate with external Microsoft Entra tenants. They apply to both inbound and outbound B2B collaboration. By contrast, external collaboration settings control which users in your organization are allowed to send B2B collaboration invitations to guests from any organization.


Reference:

https://learn.microsoft.com/en-us/entra/external-id/what-is-b2b



HOTSPOT (Drag and Drop is not supported)
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Box 1: Yes
Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. If the public key is used for encryption, then the related private key is used for decryption. If the private key is used for encryption, then the related public key is used for decryption.
Box 2: No
Symmetric encryption uses the same key to perform both encryption and decryption functions. Symmetric encryption uses a shared private key while asymmetric encryption uses a public/private key pair. Another difference between asymmetric and symmetric encryption is the length of the keys.
Box 3: No
Hashing is on-way.
Decryption of a "hash" is impossible.


Reference:

https://www.techtarget.com/searchsecurity/definition/asymmetric-cryptography https://www.techtarget.com/searchsecurity/definition/asymmetric-cryptography






Post your Comments and Discuss Microsoft SC-900 exam dumps with other Community members:

Join the SC-900 Discussion