시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / SC-900 덤프  / SC-900 문제 연습

Microsoft SC-900 시험

Microsoft Security Compliance and Identity Fundamentals 온라인 연습

최종 업데이트 시간: 2025년10월10일

당신은 온라인 연습 문제를 통해 Microsoft SC-900 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 SC-900 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 198개의 시험 문제와 답을 포함하십시오.

 / 9

Question No : 1


Which Microsoft portal provides information about how Microsoft manages privacy, compliance, and security?

정답:
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-with-service-trust-portal?view=o365-worldwide

Question No : 2


In a Core eDiscovery workflow, what should you do before you can search for content?

정답:
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/get-started-core-ediscovery?view=o365-worldwide

Question No : 3


HOTSPOT
Select the answer that correctly completes the sentence.



정답:


Explanation:
Reference: https://docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview

Question No : 4


Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

정답:
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

Question No : 5


HOTSPOT
Select the answer that correctly completes the sentence.



정답:


Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/microsoft-365-compliance-center?view=o365-worldwide
MIP capabilities are included with Microsoft 365 Compliance and give you the tools to know your data, protect your data, and prevent data loss.
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide

Question No : 6


Which Azure Active Directory (Azure AD) feature can you use to restrict Microsoft Intune-managed devices from accessing corporate resources?

정답:

Question No : 7


HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.



정답:

Question No : 8


What can you use to provide threat detection for Azure SQL Managed Instance?

정답:

Question No : 9


Which feature provides the extended detection and response (XDR) capability of Azure Sentinel?

정답:
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/eval-overview?view=o365-worldwide

Question No : 10


What can you use to scan email attachments and forward the attachments to recipients only if the attachments are free from malware?

정답:
Explanation:
Reference: https://docs.microsoft.com/en-us/office365/servicedescriptions/office-365-advanced-threat-protection-service-description

Question No : 11


HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.



정답:

Question No : 12


You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.
Which security methodology does this represent?

정답:
Explanation:
Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth

Question No : 13


Which two types of resources can be protected by using Azure Firewall? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

정답:
Explanation:
Firewall is really not directly protecting the Virtual Networks though DDOS would have been ideal for VNETS

Question No : 14


HOTSPOT
Select the answer that correctly completes the sentence.



정답:


Explanation:
Reference: https://docs.microsoft.com/en-us/azure/sentinel/overview

Question No : 15


What feature in Microsoft Defender for Endpoint provides the first line of defense against cyberthreats by reducing the attack surface?

정답:
Explanation:
Network protection helps protect devices from Internet-based events. Network protection is an attack surface reduction capability.
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-protection?view=o365-worldwide

 / 9