Practice Exams | SC-900: MS Security, Compliance & ID Fundam
Practice Exams | SC-900: MS Security, Compliance & ID Fundam
In order to set realistic expectations, please note: These questions are NOT official questions that you will find on the official exam. These questions DO cover all the material outlined in the knowledge sections below. Many of the questions are based on fictitious scenarios which have questions posed within them.
The official knowledge requirements for the exam are reviewed routinely to ensure that the content has the latest requirements incorporated in the practice questions. Updates to content are often made without prior notification and are subject to change at any time.
Each question has a detailed explanation and links to reference materials to support the answers which ensures accuracy of the problem solutions.
The questions will be shuffled each time you repeat the tests so you will need to know why an answer is correct, not just that the correct answer was item "B" last time you went through the test.
This certification is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
This practice exam series measures your ability to describe the following: concepts of security, compliance, and identity; capabilities of Microsoft identity and access management solutions; capabilities of Microsoft security solutions; and capabilities of Microsoft compliance solutions.
This course is for a broad audience that may include business stakeholders, new or existing IT professionals, or students who have an interest in Microsoft security, compliance, and identity solutions.
Candidates should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Describe the Concepts of Security, Compliance, and Identity (10-15%)
Describe security and compliance concepts & methodologies
describe the Zero-Trust methodology
describe the shared responsibility model
define defense in depth
describe common threats
describe encryption
describe cloud adoption framework
Define identity concepts
define identity as the primary security perimeter
define authentication
define authorization
describe what identity providers are
describe what Active Directory is
describe the concept of Federated services
define common Identity Attacks
Describe the capabilities of Microsoft Identity and Access Management Solutions (30-35%)
Describe the basic identity services and identity types of Azure AD
describe what Azure Active Directory is
describe Azure AD identities (users, devices, groups, service principals/applications)
describe what hybrid identity is
describe the different external identity types (Guest Users)
Describe the authentication capabilities of Azure AD
describe the different authentication methods
describe self-service password reset
describe password protection and management capabilities
describe Multi-factor Authentication
describe Windows Hello for Business
Describe access management capabilities of Azure AD
describe what conditional access is
describe uses and benefits of conditional access
describe the benefits of Azure AD roles
Describe the identity protection & governance capabilities of Azure AD
describe what identity governance is
describe what entitlement management and access reviews is
describe the capabilities of PIM
describe Azure AD Identity Protection
Describe the capabilities of Microsoft Security Solutions (35-40%)
Describe basic security capabilities in Azure
describe Azure Network Security groups
describe Azure DDoS protection
describe what Azure Firewall is
describe what Azure Bastion is
describe what Web Application Firewall is
describe ways Azure encrypts data
Describe security management capabilities of Azure
describe the Azure Security centre
describe Azure Secure score
describe the benefit and use cases of Azure Defender - previously the cloud workload protection platform (CWPP)
describe Cloud security posture management (CSPM)
describe security baselines for Azure
Describe security capabilities of Azure Sentinel
define the concepts of SIEM, SOAR, XDR
describe the role and value of Azure Sentinel to provide integrated threat protection
Describe threat protection with Microsoft 365 Defender
describe Microsoft 365 Defender services
describe Microsoft Defender for Identity (formerly Azure ATP)
describe Microsoft Defender for Office 365 (formerly Office 365 ATP)
describe Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
describe Microsoft Cloud App Security
Describe security management capabilities of Microsoft 365
describe the Microsoft 365 Defender portal
describe how to use Microsoft Secure Score
describe security reports and dashboards
describe incidents and incident management capabilities
Describe endpoint security with Microsoft Intune
describe what Intune is
describe endpoint security with Intune
describe the endpoint security with the Microsoft Endpoint Manager admin center
Describe the Capabilities of Microsoft Compliance Solutions (25-30%)
Describe the compliance management capabilities in Microsoft
describe the offerings of the Service Trust portal
describe Microsoft’s privacy principles
describe the compliance centre
describe compliance manager
describe use and benefits of compliance score
Describe information protection and governance capabilities of Microsoft 365
describe data classification capabilities
describe the value of content and activity explorer
describe sensitivity labels
describe Retention Polices and Retention Labels
describe Records Management
describe Data Loss Prevention
Describe insider risk capabilities in Microsoft 365
describe Insider risk management solution
describe communication compliance
describe information barriers
describe privileged access management
describe customer lockbox
Describe the eDiscovery and audit capabilities of Microsoft 365
describe the purpose of eDiscovery
describe the capabilities of the content search tool
describe the core eDiscovery workflow
describe the advanced eDiscovery workflow
describe the core audit capabilities of M365
describe purpose and value of Advanced Auditing
Describe resource governance capabilities in Azure
describe the use of Azure Resource locks
describe what Azure Blueprints is
define Azure Policy and describe its use cases
Languages: English, Japanese, Chinese (Simplified), Korean, French, Spanish, Portuguese (Brazil), Russian, Arabic (Saudi Arabia), Indonesian (Indonesia), German, Chinese (Traditional), Italian
Be prepared for the Microsoft Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Url: View Details
What you will learn
- Describe the Concepts of Security, Compliance, and Identity
- Describe security and compliance concepts & methodologies
- Describe Define security identity concepts
Rating: 4.3
Level: All Levels
Duration: 220 questions
Instructor: Wade Henderson
Courses By: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
About US
The display of third-party trademarks and trade names on this site does not necessarily indicate any affiliation or endorsement of hugecourses.com.
View Sitemap