Practice Free SC-900 Exam Online Questions
DRAG DROP
Match the types of Conditional Access signals to the appropriate definitions. To answer, drag the appropriate Conditional Access signal type from the column on the left to its definition on the right. Each signal type may be used once, more than once, or not at all. NOTE: Each correct match is worth one point.


HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Explanation:
Box 1: No
Compliance Manager tracks Microsoft managed controls, customer-managed controls, and shared controls.
Box 2: Yes
Box 3: Yes
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-manager?view=o365-worldwide
What can you use to provision Azure resources across multiple subscriptions in a consistent manner?
- A . Azure Defender
- B . Azure Blueprints
- C . Azure Sentinel
- D . Azure Policy
B
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/governance/blueprints/overview
Which Microsoft 365 compliance feature can you use to encrypt content automatically based on specific conditions?
- A . Content Search
- B . sensitivity labels
- C . retention policies
- D . eDiscovery
B
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
What is a characteristic of a sensitivity label in Microsoft 365?
- A . persistent
- B . encrypted
- C . restricted to predefined categories
Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?
- A . retention policies
- B . data loss prevention (DLP) policies
- C . conditional access policies
- D . information barriers
B
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
Which compliance feature should you use to identify documents that are employee resumes?
- A . pre-trained classifiers
- B . Content explorer
- C . Activity explorer
- D . eDiscovery
What should you use in the Microsoft 365 security center to view security trends and track the protection status of identities?
- A . Attack simulator
- B . Reports
- C . Hunting
- D . Incidents
B
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/reports-and-insights-in-security- and-compliance?view=o365-worldwide




