Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

SC-900 Microsoft Security Compliance and Identity Fundamentals Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Microsoft SC-900 Microsoft Security Compliance and Identity Fundamentals certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 205 questions

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Match the Azure networking service to the appropriate description.

To answer, drag the appropriate service from the column on the left to its description on the right. Each service may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Which two tasks can you implement by using data loss prevention (DLP) policies in Microsoft 365? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Display policy tips to users who are about to violate your organization’s policies.

B.

Enable disk encryption on endpoints.

C.

Protect documents in Microsoft OneDrive that contain sensitive information.

D.

Apply security baselines to devices.

Select the answer that correctly completes the sentence.

What is a use case for implementing information barrier policies in Microsoft 365?

A.

to restrict unauthenticated access to Microsoft 365

B.

to restrict Microsoft Teams chats between certain groups within an organization

C.

to restrict Microsoft Exchange Online email between certain groups within an organization

D.

to restrict data sharing to external email recipients

In a Core eDiscovery workflow, what should you do before you can search for content?

A.

Create an eDiscovery hold.

B.

Run Express Analysis.

C.

Configure attorney-client privilege detection.

D.

Export and download results.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Match the Microsoft 365 insider risk management workflow step to the appropriate task.

To answer, drag the appropriate step from the column on the left to its task on the right. Each step may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Select the answer that correctly completes the sentence.

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

A.

the Microsoft Endpoint Manager admin center

B.

Azure Cost Management + Billing

C.

Microsoft Service Trust Portal

D.

the Azure Active Directory admin center

Which Microsoft Purview solution can be used to identify data leakage?

A.

insider risk management

B.

Compliance Manager

C.

communication compliance

D.

eDiscovery

Select the answer that correctly completes the sentence.

No: 164 HOTSPOT

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

What is an assessment in Compliance Manager?

A.

A grouping of controls from a specific regulation, standard or policy.

B.

Recommended guidance to help organizations align with their corporate standards.

C.

A dictionary of words that are not allowed in company documents.

D.

A policy initiative that includes multiple policies.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Select the answer that correctly completes the sentence.

For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

ESTION NO: 101

Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

a network interface

B.

an Azure App Service web app

C.

a virtual network

D.

a virtual network subnet

E.

a resource group

Select the answer that correctly completes the sentence.

Which pillar of identity relates to tracking the resources accessed by a user?

A.

auditing

B.

authorization

C.

authentication

D.

administration

Page: 1 / 4
Total 205 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved