Free Practice Test

Free SC-900 Practice Exam – 2025 Updated

Study Smarter for the SC-900 Exam with Our Free and Reliable SC-900 Exam Questions – Updated for 2025.

At Cert Empire, we are focused on delivering the most accurate and up-to-date exam questions for students preparing for the Microsoft SC-900 Exam. To make preparation easier, we’ve made parts of our SC-900 exam resources free for everyone. You can practice as much as you like with Free SC-900 Practice Test.

Microsoft SC-900 Free Exam Questions

Disclaimer

Please keep a note that the demo questions are not frequently updated. You may as well find them in open communities around the web. However, this demo is only to depict what sort of questions you may find in our original files.

Nonetheless, the premium exam dumps files are frequently updated and are based on the latest exam syllabus and real exam questions.

1 / 60

What is a key benefit of Microsoft Information Protection (MIP)?

2 / 60

Which of the following best describes the purpose of Microsoft Defender for Endpoint?

3 / 60

What is the primary purpose of Microsoft Purview Compliance Manager?

4 / 60

A company is using Microsoft Entra ID (formerly Azure AD). What feature can help protect accounts from credential compromise?

5 / 60

What role does Microsoft Sentinel play in an organization's security strategy?

6 / 60

A company wants to implement Zero Trust principles. Which of the following is a key concept of Zero Trust?

7 / 60

What is the primary function of Microsoft Defender for Cloud?

8 / 60

Which Microsoft Purview data classification type supports the use of regular expressions?

9 / 60

What should you create to search and export content preserved in an eDiscovery hold?

10 / 60

What can you use to ensure that all the users in a specific group must use multi-factor authentication (MFA) to sign in to Azure AD?

11 / 60

When you enable Azure AD Multi-Factor Authentication (MFA), how many factors are required for authentication?

12 / 60

You need to keep a copy of all files in a Microsoft SharePoint site for one year, even if users delete the files from the site. What should you apply to the site?

13 / 60

You have an Azure subscription that contains multiple resources. You need to assess compliance and enforce standards for the existing resources. What should you use?

14 / 60

What can you use to provision Azure resources across multiple subscriptions in a consistent manner?

15 / 60

What is an assessment in Compliance Manager?

16 / 60

You plan to move resources to the cloud.
You are evaluating the use of Infrastructure as a service (laaS),
Platform as a service (PaaS), and Software as a service (SaaS) cloud models.
You plan to manage only the data, user accounts, and user devices for a cloud-based app.

Which cloud model will you use?

17 / 60

You have an Azure subscription that contains a Log Analytics workspace. You need to onboard Microsoft Sentinel. What should you do first?

18 / 60

Which portal contains the solution catalog?

19 / 60

What are customers responsible for when evaluating security in a software as a service (SaaS) cloud services model?

20 / 60

What can be created in Active Directory Domain Services (AD DS)?

21 / 60

Which two types of devices can be managed by using Endpoint data loss prevention (Endpoint DLP)?

22 / 60

Which Microsoft Purview feature allows users to identify content that should be protected?

23 / 60

What is a characteristic of a sensitivity label in Microsoft 365?

24 / 60

Which feature is included in Microsoft Entra ID Governance?

25 / 60

Which two cards are available in the Microsoft 365 Defender portal?

26 / 60

Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?

27 / 60

What can you protect by using the information protection solution in the Microsoft 365 compliance center?

28 / 60

What can you specify in Microsoft 365 sensitivity labels?

29 / 60

Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

30 / 60

In a Core eDiscovery workflow, what should you do before you can search for content?

31 / 60

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

32 / 60

Which Microsoft 365 compliance center feature can you use to identify all the documents on a Microsoft SharePoint Online site that contain a specific key word?

33 / 60

What can you use to deploy Azure resources across multiple subscriptions in a consistent manner?

34 / 60

What is a use case for implementing information barrier policies in Microsoft 365?

35 / 60

Which type of alert can you manage from the Microsoft 365 Defender portal?

36 / 60

Which service includes the Attack simulation training feature?

37 / 60

You need to connect to an Azure virtual machine by using Azure Bastion. What should you use?

38 / 60

To which type of resource can Azure Bastion provide secure access?

39 / 60

You have a Microsoft 365 E3 subscription. You plan to audit user activity by using the unified audit log and Basic Audit. For how long will the audit records be retained?

40 / 60

What should you use in the Microsoft 365 Defender portal to view security trends and track the protection status of identities?

41 / 60

Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

42 / 60

What can you use to provide threat detection for Azure SQL Managed Instance?

43 / 60

Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?

44 / 60

What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

45 / 60

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure. Which security methodology does this represent?

46 / 60

What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?

47 / 60

Which type of identity is created when you register an application with Active Directory (Azure AD)?

48 / 60

Which Microsoft portal provides information about how Microsoft cloud services comply with regulatory standard, such as International Organization for Standardization (ISO)?

49 / 60

In a hybrid identity model, what can you use to sync identities between Active Directory Domain Services (AD DS) and Azure Active Directory (Azure AD)?

50 / 60

What do you use to provide real-time integration between Azure Sentinel and another security source?

51 / 60

You have an Azure subscription. You need to implement approval-based, time-bound role activation. What should you use?

52 / 60

Which Microsoft 365 feature can you use to restrict communication and the sharing of information between members of two departments at your organization?

53 / 60

Which Azure Active Directory (Azure AD) feature can you use to provide just-in-time (JIT) access to manage Azure resources?

54 / 60

Which Azure Active Directory (Azure AD) feature can you use to evaluate group membership and automatically remove users that no longer require membership in a group?

55 / 60

What is the purpose of Azure Active Directory (Azure AD) Password Protection?

56 / 60

What can you use to provide a user with a two-hour window to complete an administrative task in Azure?

57 / 60

What is an example of encryption at rest?

58 / 60

In the Microsoft Cloud Adoption Framework for Azure, which two phases are addressed before the Ready phase?

59 / 60

In the shared responsibility model for an Azure deployment, what is Microsoft solely responsible for managing?

60 / 60

Which score measures an organization's progress in completing actions that help reduce risks associated to data protection and regulatory standards?

Your score is

The average score is 66%

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE