{"id":81324,"date":"2022-03-03T22:22:17","date_gmt":"2022-03-04T03:52:17","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=81324"},"modified":"2022-10-30T22:50:09","modified_gmt":"2022-10-31T04:20:09","slug":"sc-900-exam-questions","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/","title":{"rendered":"SC-900 exam questions: Microsoft Security, Compliance, and Identity Fundamentals"},"content":{"rendered":"<p>Are you looking for <a href=\"https:\/\/www.whizlabs.com\/microsoft-security-compliance-identity-fundamentals-sc-900-certification\/\">SC-900 exam questions<\/a> ? &#8211; This blog post has free questions and answers on SC-900 certification exam which acts as a preparation guide for your real exam. <span style=\"font-weight: 400;\">The <\/span><b>SC-900 exam<\/b><span style=\"font-weight: 400;\"> is intended for the ones looking forward to learning and attesting their knowledge on the fundamentals of Compliance, Security and Identity, across Cloud-based and relevant Microsoft services.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Who_this_exam_is_intended_for\" >Who this exam is intended for?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Exam_Domain_for_SC-900_exam\" >Exam Domain for SC-900 exam:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_concepts_of_security_compliance_and_identity\" >Domain :\u00a0 Describe the concepts of security, compliance, and identity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_concepts_of_security_compliance_and_identity-2\" >Domain : Describe the concepts of security, compliance, and identity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions\" >Domain : Describe the capabilities of Microsoft identity and access management solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-2\" >Domain : Describe the capabilities of Microsoft identity and access management solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-3\" >Domain : Describe the capabilities of Microsoft identity and access management solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-4\" >Domain : Describe the capabilities of Microsoft identity and access management solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-2\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-3\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-4\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions\" >Domain : Describe the capabilities of Microsoft compliance solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-2\" >Domain : Describe the capabilities of Microsoft compliance solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-3\" >Domain : Describe the capabilities of Microsoft compliance solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-5\" >Domain : Describe the capabilities of Microsoft identity and access management solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-4\" >Domain : Describe the capabilities of Microsoft compliance solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-5\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-5\" >Domain : Describe the capabilities of Microsoft compliance solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-6\" >Domain : Describe the capabilities of Microsoft compliance solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-6\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-7\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-6\" >Domain : Describe the capabilities of Microsoft identity and access management solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-8\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_security_solutions-9\" >Domain : Describe the capabilities of Microsoft security solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-7\" >Domain : Describe the capabilities of Microsoft identity and access management solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.whizlabs.com\/blog\/sc-900-exam-questions\/#Summary\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Who_this_exam_is_intended_for\"><\/span>Who this exam is intended for?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It enwraps students, new and experienced IT Professionals, Business Stakeholders, or anyone trying their hand in the field of <\/span><b>Microsoft Security, Identity and Compliance solutions<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h6><em>Prerequisites<\/em><\/h6>\n<p><span style=\"font-weight: 400;\">Candidates appearing for the SC-900 certification are presumed to be familiar with the concepts of Microsoft 365 and Azure. They should have an understanding of how Microsoft Security, Identity, and Compliance solutions span across the solution zones to give an overall end-to-end solution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This certification tests you for your understanding of Microsoft Identity and Access Management solutions, Microsoft\u2019s security solutions and compliance solutions capabilities, and the concepts of security, identity, and compliance.<\/span><\/p>\n<p>By undergoing these questions, You will be able to understand the certification requirements and the concepts covered in the exam. Microsoft certifications seem hard at first look, but with the right training and resources, are easy to crack. Let&#8217;s start learning!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Exam_Domain_for_SC-900_exam\"><\/span>Exam Domain for SC-900 exam:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Here comes the SC-900 exam on Microsoft Security, Compliance, and Identity Fundamentals skillsets overview as follows:<\/p>\n<ul class=\"margin-xs\">\n<li class=\"font-size-sm\">Describing the concepts of security, compliance, and identity (10\u201415%)<\/li>\n<li class=\"font-size-sm\">Describing the capabilities of Microsoft identity and access management solutions (25-30%)<\/li>\n<li class=\"font-size-sm\">Describing the capabilities of Microsoft Security solutions (25\u201430%)<\/li>\n<li class=\"font-size-sm\">Describing the capabilities of Microsoft compliance solutions (25-30%)<\/li>\n<\/ul>\n<p><span style=\"font-family: 'Open Sans', arial, sans-serif; font-size: 22px;\">Domain : Describe the concepts of security, compliance, and identity<\/span><\/p>\n<h4><em><span style=\"font-weight: 400;\">Q1 : Your company is planning on using Azure Cloud services. They are looking at the different security aspects when it comes to Microsoft privacy. Is Transparency a key Microsoft privacy principal?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A.<\/strong> Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B.<\/strong> No<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Below are the key privacy principals as addressed by Microsoft<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Control<\/span><br \/>\n<span style=\"font-weight: 400;\">Transparency<\/span><br \/>\n<span style=\"font-weight: 400;\">Security<\/span><br \/>\n<span style=\"font-weight: 400;\">Strong legal protections<\/span><br \/>\n<span style=\"font-weight: 400;\">No content-based targeting<\/span><br \/>\n<span style=\"font-weight: 400;\">Benefits to you<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to Transparency, Microsoft tells us that they are transparent when it comes to data collection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Microsoft Privacy control , please refer to the below URL: <\/span><a href=\"https:\/\/privacy.microsoft.com\/en-US\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/privacy.microsoft.com\/en-US\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_concepts_of_security_compliance_and_identity\"><\/span><span style=\"font-weight: 400;\">Domain :\u00a0 Describe the concepts of security, compliance, and identity<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q2 : Your company is planning on using Azure Cloud services. They are looking at the concept of the Zero Trust principle. Is Verify explicitly a Zero Trust principle?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer : A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Yes. Here you have to ensure that not everyone is provided access to a system. Here you should always authenticate and authorize users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The principles when it comes to Zero trust are<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Verify explicitly<\/span><br \/>\n<span style=\"font-weight: 400;\">Use least privileged access<\/span><br \/>\n<span style=\"font-weight: 400;\">Assume breach<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Zero Trust Principle , please refer to the below URL: <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_concepts_of_security_compliance_and_identity-2\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the concepts of security, compliance, and identity<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q3 : Your company is planning on using Azure Cloud services. Which of the following can be used to ensure that data can be read only by authorized users?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Encryption<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Deduplication<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Archiving<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Compression<\/span><\/p>\n<p><b>Correct Answer : A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">You can ensure data is encrypted. Then only authorized users would have the encryption key. The encryption key can then be used to decrypt and read the data.<\/span><\/p>\n<p><b>Option B is incorrect <\/b><span style=\"font-weight: 400;\">since this is normally used to eliminate duplicate copies of repeating data<\/span><br \/>\n<b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">since this is normally used to store data that is not used that frequently<\/span><br \/>\n<b>Option D is incorrect <\/b><span style=\"font-weight: 400;\">since this is normally used to reduce the storage size of data<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on encryption in Microsoft Cloud , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/office-365-encryption-in-the-microsoft-cloud-overview?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/office-365-encryption-in-the-microsoft-cloud-overview?view=o365-worldwide<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft identity and access management solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q4 : A company is planning on using Azure Active Directory. Which of the following is used to describe the exact term for Azure Active Directory?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Federation server<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Identity Provider<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Proxy server<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Firewall<\/span><\/p>\n<p><b>Correct Answer : B<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure Active Directory is Microsoft\u2019s identity provider. This is used for storage of identities and for access management. Both Azure and Microsoft Office 365 can use Azure Active Directory for identity and access management<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of the other options are incorrect since Azure Active Directory is used for identity and access management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure Active Directory , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/active-directory-whatis\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/active-directory-whatis<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-2\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft identity and access management solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q5\u200b : Your company is planning on using Azure Active Directory for the storage of identities. They want to make use of the self-service password reset feature. Which of the following authentication methods are available for self-service password reset? Choose 3 answers from the options given below<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Email<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>A passport identification number<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>A picture message<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Mobile app notification<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Mobile app code<\/span><\/p>\n<p><b>Correct Answers: A, D and E<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Below are the authentication methods available for self-service password reset<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mobile app notification<\/span><br \/>\n<span style=\"font-weight: 400;\">Mobile app code<\/span><br \/>\n<span style=\"font-weight: 400;\">Email<\/span><br \/>\n<span style=\"font-weight: 400;\">Mobile phone<\/span><br \/>\n<span style=\"font-weight: 400;\">Office phone<\/span><br \/>\n<span style=\"font-weight: 400;\">Security questions<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since the authentication methods are clearly mentioned, all other options are incorrect<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on self-service password reset , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-sspr-howitworks\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-sspr-howitworks<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-3\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft identity and access management solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q6 : Your company is planning on making use of Azure Active Directory. Do all versions of Azure Active Directory provide the same set of features?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer : B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><b> <\/b><span style=\"font-weight: 400;\">There are different pricing models available for Azure Active Directory. The most basic version is the Free model. Here there is a limitation in terms of features. For example, you will not get features such as<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A service level agreement<\/span><br \/>\n<span style=\"font-weight: 400;\">Self-service password reset for cloud users<\/span><br \/>\n<span style=\"font-weight: 400;\">Group access management<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure AD Pricing , please refer to the below URL: <\/span><a href=\"https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/active-directory\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/active-directory\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q7 : Your company is planning on making use of Network Security Groups. Can you make use of network security groups to filter traffic based on the IP address, protocol and port number?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer : A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">For a network security group rule, you can create a rule that is based on the IP address, the protocol and the port number. An example screenshot is given below which shows the IP address, the protocol and the port number.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81334 size-full\" title=\"Microsoft 365 sc-900 adding inbound security rule\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-7.png\" alt=\"Microsoft 365 sc-900 adding inbound security rule\" width=\"729\" height=\"874\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-7.png 729w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-7-250x300.png 250w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-7-350x420.png 350w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-7-640x767.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-7-681x816.png 681w\" sizes=\"(max-width: 729px) 100vw, 729px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure network security groups , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/network-security-groups-overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/network-security-groups-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-4\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft identity and access management solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q8\u200b :Your company is planning on using Azure AD Identity Protection. Can you use Azure AD Identity protection to provide access to resources in Azure?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer : B<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure AD Identity protection is used to identify risks based on the user sign-in process. It is not used to provide access to resources in Azure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure AD Identity Protection , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/identity-protection\/overview-identity-protection\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/identity-protection\/overview-identity-protection<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-2\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q9\u200b : You have to decide on the right service to use based on the requirement. Which of the following would you use for the below requirement?<\/span><\/em><\/h4>\n<h4><em><b>\u201cProvide Network address translation\u201d<\/b><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Bastion<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Firewall<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Network Security Groups<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure DDoS Protection<\/span><\/p>\n<p><b>Correct Answer : B<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Azure Firewall service has the facility to translate traffic via its public IP address to private IP addresses to virtual networks<\/span><\/p>\n<p><b>Option A is incorrect <\/b><span style=\"font-weight: 400;\">since this provides a service to RDP\/SSH into your Azure virtual machines<\/span><br \/>\n<b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">since this is used to filter the traffic to your Azure virtual machine<\/span><br \/>\n<b>Option D is incorrect <\/b><span style=\"font-weight: 400;\">since this is used to protect your Azure resources against large scale attacks from the Internet<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure Firewall feature , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/features#inbound-dnat-support\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/features#inbound-dnat-support<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-3\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q10 : You have to decide on the right service to use based on the requirement. Which of the following would you use for the below requirement?<\/span><\/em><\/h4>\n<h4><em><b>\u201cProvide a secure way to RDP\/SSH into Azure virtual machines\u201d<\/b><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Bastion<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Firewall<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Network Security Groups<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure DDoS Protection<\/span><\/p>\n<p><b>Correct Answer : A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Azure Bastion service is a managed service that allows you to connect to an Azure virtual machine via the browser and the Azure portal.<\/span><\/p>\n<p><b>Option B is incorrect <\/b><span style=\"font-weight: 400;\">since this is a managed firewall service<\/span><br \/>\n<b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">since this is used to filter the traffic to your Azure virtual machines<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> since this is used to protect your Azure resources against large scale attacks from the Internet<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure Bastion service , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/bastion\/bastion-overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/bastion\/bastion-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-4\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q11 : You company is planning on using the Microsoft Defender for Endpoint service. Can you use Microsoft Defender for Endpoint to protect Windows 10 machines?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer : A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Yes, Windows 10 devices are also supported for Microsoft Defender for Endpoint service<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the on-boarding devices for Microsoft Defender for endpoint, please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/onboard-configure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/onboard-configure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft compliance solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q12\u200b : Your company has just set up an Azure subscription. They have the following requirements<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">\u201cBe able to deploy a set of resources, resource groups, role assignments to a set of subscriptions.\u201d<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">\u201cBe able to ensure no one can delete resources defined in a resource group named whizlabs-staging\u201d<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">\u201cEnsure that all Windows Servers defined as Azure virtual machines should have the Microsoft IaaS Antimalware extension installed\u201d<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">Which of the following can be used for the following requirement?<\/span><\/em><\/h4>\n<h4><em><b>\u201cBe able to deploy a set of resources, resource groups, role assignments to a set of subscriptions.\u201d<\/b><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Policy<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Blueprints<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Azure AD Identity Protection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure Resource locks<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">You can use Azure Blueprints to deploy a set of artifacts. The artifacts can be resources as ARM templates, resource groups and role assignments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Below is a screenshot of the artifacts that can be deployed via Azure Blueprints<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81336 size-full\" title=\"Create blueprint and add artifact in Microsoft 365 sc-900\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-12.png\" alt=\"Create blueprint and add artifact in Microsoft 365 sc-900\" width=\"1426\" height=\"375\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-12.png 1426w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-12-300x79.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-12-1024x269.png 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-12-768x202.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-12-640x168.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-12-681x179.png 681w\" sizes=\"(max-width: 1426px) 100vw, 1426px\" \/><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\"> since this is used as a governance for your resources defined as part of your Azure account<\/span><br \/>\n<b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">since this is used to protect your identities in Azure AD<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> since this is used to prevent the accidental deletion and modification of resources in Azure<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure Blueprints, please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-2\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft compliance solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q13 : You are considering the use of sensitivity labels in Microsoft 365. Do sensitivity labels add a header and footer to the underlying Office 365 document for which the label is applied?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">When you apply a sensitivity label to a document, it will also add a header and footer to the document.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Sensitivity labels for Microsoft 365, please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels?view=o365-worldwide<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-3\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft compliance solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q14\u200b : Your company is looking at the different options available when it comes to security solutions for Microsoft 365. Below are the key requirements<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">Search for email in Exchange mailboxes, documents in Sharepoint sites and OneDrive locations<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">Restrict communication and collaboration between two groups to avoid a conflict of interest in the organization<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">Provide access to a Microsoft support engineer to a user\u2019s Exchange Online data<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">Provide just-in-time access to users in Microsoft Office 365 Exchange Online<\/span><\/em><\/h4>\n<h4><em><span style=\"font-weight: 400;\">Which of the following can be used for the following requirement?<\/span><\/em><\/h4>\n<h4><em><b>\u201cProvide access to a Microsoft support engineer to a user\u2019s Exchange Online data\u201d<\/b><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Information Barriers<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Content Search Tool<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Customer Lockbox<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Privileged Access Management<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Sometimes Microsoft Engineers need access to user\u2019s data to diagnose an issue. This can be done with the help of the Customer Lockbox feature.<\/span><\/p>\n<p><b>Option A is incorrect <\/b><span style=\"font-weight: 400;\">because this is used to restrict communication and collaboration between two groups to avoid a conflict of interest in the organization<\/span><br \/>\n<b>Option B is incorrect <\/b><span style=\"font-weight: 400;\">because this is used to search for content in Exchange mailboxes, documents in SharePoint sites and OneDrive locations<\/span><br \/>\n<b>Option D is incorrect <\/b><span style=\"font-weight: 400;\">because this is used to give just-in-time access to services in Microsoft 365<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Customer Lockbox, please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/customer-lockbox-requests?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/customer-lockbox-requests?view=o365-worldwide<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-5\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft identity and access management solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q15 : Your company wants to start making use of Azure. They are looking at different security aspects when it comes to using Azure. Which of the following could be used for the following requirement?<\/span><\/em><\/h4>\n<h4><em><b>\u201cBe able to sync users from the on-premises Active Directory onto Azure AD\u201d<\/b><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure AD Identity Management<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Conditional Access<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Azure AD Roles<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure AD Connect<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure AD Connect is used to synchronize identities from the on-premises Active Directory onto Azure Active Directory. There are different methods available for user identity synchronization.<\/span><\/p>\n<p><b>Option A is incorrect <\/b><span style=\"font-weight: 400;\">since this is used to protect identities in Azure<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\"> since this is used to provide Conditional access to Azure<\/span><br \/>\n<b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">since this is used to assign permissions to users for manage various aspects in Azure Active Directory<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on roles in Azure Active Directory Connect , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/hybrid\/whatis-azure-ad-connect\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/hybrid\/whatis-azure-ad-connect<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-4\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft compliance solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q16 : You have a set of resources in Azure. Can you add a delete lock to a resource that already has a read-only lock?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Yes, this is possible. Below is a screenshot of both types of locks assigned to a resource<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81337 size-full\" title=\"Network Security group in Microsoft 365 sc-900\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-16.png\" alt=\"Network Security group in Microsoft 365 sc-900\" width=\"1344\" height=\"330\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-16.png 1344w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-16-300x74.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-16-1024x251.png 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-16-768x189.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-16-640x157.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-16-681x167.png 681w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure resource locks , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-resource-manager\/management\/lock-resources\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/azure-resource-manager\/management\/lock-resources<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-5\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q17 : Which of the following is a scalable, cloud-native, security information event management and security orchestration automated response solution?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Sentinel<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Security Center<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Azure Active Directory<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure AD Identity Protection<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">You can use Azure Sentinel as a scalable, cloud-native, security information event management and security orchestration automated response solution. Azure Sentinel has the capability to ingest data from a variety of sources and performance threat monitoring on that data.<\/span><\/p>\n<p><b>Option B is incorrect <\/b><span style=\"font-weight: 400;\">because Azure Security Center can give various security metrics and recommendations for your environment, but it can\u2019t provide a complete orchestration and response-based solution<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\"> because this is your identity-based solution in Azure<\/span><br \/>\n<b>Option D is incorrect <\/b><span style=\"font-weight: 400;\">because this is used to protect your identities in Azure<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure Sentinel , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-5\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft compliance solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q18\u200b : Your company is currently looking at using the Azure Policy service. Can the Azure Policy service be used to remediate issues that get detected via its compliance checks?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Some of the policies in Azure Policy has a Remediation section. This can be used to remediate issues if the resources are found to be not complaint with the policy.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81338 size-full\" title=\"Microsoft IaaS Antimalware extension\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18.png\" alt=\"Microsoft IaaS Antimalware extension\" width=\"1078\" height=\"810\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18.png 1078w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-300x225.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-1024x769.png 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-768x577.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-559x420.png 559w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-80x60.png 80w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-100x75.png 100w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-180x135.png 180w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-238x178.png 238w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-640x481.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-18-681x512.png 681w\" sizes=\"(max-width: 1078px) 100vw, 1078px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure Policy service , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/policy\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/policy\/overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_compliance_solutions-6\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft compliance solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q19 : Your company is planning on making use of Azure Blueprints. Can Azure Blueprints be used to create role assignments for an Azure subscription?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">When you create an Azure Blueprint , you can create multiple artifacts as part of the Blueprint. One of them is role assignments. A screenshot of this is given below<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-81339\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19.png\" alt=\"\" width=\"1340\" height=\"500\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19.png 1340w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19-300x112.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19-1024x382.png 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19-768x287.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19-1126x420.png 1126w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19-640x239.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-19-681x254.png 681w\" sizes=\"(max-width: 1340px) 100vw, 1340px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure Blueprints , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-6\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q20 : Which of the following provides advanced and intelligent protection of Azure and hybrid resources and workloads?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Defender<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Policies<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Azure Blueprints<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure Active Directory<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">With Azure Defender , you can enable intelligent protection of your resources that are defined in Azure and also in your on-premises infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is an additional security feature that comes as part of Azure Security Center as shown below<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81340 size-full\" title=\"security center of azure defender\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20.png\" alt=\"security center of azure defender\" width=\"903\" height=\"707\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20.png 903w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20-300x235.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20-768x601.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20-536x420.png 536w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20-640x501.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20-681x533.png 681w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-20-511x400.png 511w\" sizes=\"(max-width: 903px) 100vw, 903px\" \/><\/p>\n<p><b>Option B is incorrect <\/b><span style=\"font-weight: 400;\">since this is used for governance of resources in your Azure account<\/span><br \/>\n<b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">since this is used for the deployment of various artifacts to your Azure account<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> since this is used as an Identity store<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure Defender , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/azure-defender\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/azure-defender<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-7\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q21 : Which of the following is available for the Azure Application Gateway service that helps to protect web applications from common exploits and vulnerabilities?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Firewall<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Azure Web Application Firewall<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Azure Policy<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure Identity Protection<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Azure Web Application Firewall can be used along with the Azure Application Gateway resource to protect web applications from common exploits and vulnerabilities. It can help to protect against attacks such as SQL injection attacks or cross-site scripting attacks.<\/span><\/p>\n<p><b>Option A is incorrect <\/b><span style=\"font-weight: 400;\">since this is managed firewall service for the resources that are part of your Azure virtual network<\/span><br \/>\n<b>Option C is incorrect <\/b><span style=\"font-weight: 400;\">since this is used for governance of your Azure resources<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\"> since this is used to protect your Azure AD identities<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure Web Application Firewall , please refer to the below URL:<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/web-application-firewall\/ag\/ag-overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\"> https:\/\/docs.microsoft.com\/en-us\/azure\/web-application-firewall\/ag\/ag-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-6\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft identity and access management solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q22 : Your company is planning on making use of Azure Active Directory Privileged Identity Management. Can Privileged Identity Management be used to provide time-bound assignments for Azure resources?<\/span><\/em><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Yes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No<\/span><\/li>\n<\/ol>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">You can manage the access of users to Azure resources. You can also give time-bound access to Azure resources. Below is a screenshot of the quick start page of Privileged Identity Management for Azure resources<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81341 size-full\" title=\"Privileged Identity Management in Microsoft 365\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22.png\" alt=\"Privileged Identity Management in Microsoft 365\" width=\"1195\" height=\"574\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22.png 1195w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22-300x144.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22-1024x492.png 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22-768x369.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22-874x420.png 874w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22-640x307.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-22-681x327.png 681w\" sizes=\"(max-width: 1195px) 100vw, 1195px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure AD Privileged Identity Management with Azure roles , please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/privileged-identity-management\/pim-resource-roles-assign-roles\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/privileged-identity-management\/pim-resource-roles-assign-roles<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-8\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q23\u200b : Which of the following maps to the below encryption technique?<\/span><\/em><\/h4>\n<h4><em><b>\u201cEncrypting information that resides in persistent storage on physical media\u201d<\/b><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Encryption in transit<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Encryption at rest<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>In-memory Encryption<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>SSL Encryption<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Here this concept is mapped to the concept of ensuring that data is encrypted at rest. Here the data on the underlying physical media is encrypted.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The other options are all incorrect since the keyword of \u201crest\u201d maps to data that resides on the physical device<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure Encryption, please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/encryption-overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/encryption-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_security_solutions-9\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft security solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q24\u200b : You are planning on using the Azure Firewall service. Can you use the Azure Firewall service to encrypt incoming network traffic to Azure virtual machines?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Azure Firewall service is a managed service that can be used to protect your Azure virtual network resources. But it can\u2019t be used to encrypt the incoming traffic onto Azure virtual machines.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on the Azure Firewall service, please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Describe_the_capabilities_of_Microsoft_identity_and_access_management_solutions-7\"><\/span><span style=\"font-weight: 400;\">Domain : Describe the capabilities of Microsoft identity and access management solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q25 : You are looking at using Azure Active Directory Access Reviews. Can you use Azure AD Access reviews to review group memberships for users defined in Azure AD?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A.<\/strong> Yes<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B.<\/strong> No<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">When you create an Access Review in Azure Active Directory, you can review the access of users to teams and groups as shown below<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81342 size-full\" title=\"New access review in Microsoft 365\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25.png\" alt=\"New access review in Microsoft 365\" width=\"1124\" height=\"530\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25.png 1124w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25-300x141.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25-1024x483.png 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25-768x362.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25-891x420.png 891w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25-640x302.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/sc-900-25-681x321.png 681w\" sizes=\"(max-width: 1124px) 100vw, 1124px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For more information on Azure AD Access reviews, please refer to the below URL: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/governance\/access-reviews-overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/governance\/access-reviews-overview<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hope you have enjoyed this post. These SC-900 exam questions give you an overall assessment of the exam. By hovering through these questions, you can get to know the pattern of the questions asked. To get a detailed view, take the practice tests further, and with their elaborate explanations, learn and understand the concepts.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you looking for SC-900 exam questions ? &#8211; This blog post has free questions and answers on SC-900 certification exam which acts as a preparation guide for your real exam. The SC-900 exam is intended for the ones looking forward to learning and attesting their knowledge on the fundamentals of Compliance, Security and Identity, across Cloud-based and relevant Microsoft services. Who this exam is intended for? It enwraps students, new and experienced IT Professionals, Business Stakeholders, or anyone trying their hand in the field of Microsoft Security, Identity and Compliance solutions. Prerequisites Candidates appearing for the SC-900 certification are [&hellip;]<\/p>\n","protected":false},"author":371,"featured_media":81488,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4828],"tags":[4832],"class_list":["post-81324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-365","tag-sc-900-exam-questions"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",600,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions-150x150.jpg",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions-300x158.jpg",300,158,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",600,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",600,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",600,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",600,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",24,13,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",48,25,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",96,50,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",150,79,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",300,158,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions-250x250.jpg",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",600,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",96,50,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/Microsoft-SC-900-Free-Questions.jpg",150,79,false]},"uagb_author_info":{"display_name":"Sweta Singhal","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/sweta\/"},"uagb_comment_info":470,"uagb_excerpt":"Are you looking for SC-900 exam questions ? &#8211; This blog post has free questions and answers on SC-900 certification exam which acts as a preparation guide for your real exam. The SC-900 exam is intended for the ones looking forward to learning and attesting their knowledge on the fundamentals of Compliance, Security and Identity,&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/371"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=81324"}],"version-history":[{"count":10,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81324\/revisions"}],"predecessor-version":[{"id":85575,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81324\/revisions\/85575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/81488"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=81324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=81324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=81324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}