0% found this document useful (0 votes)
430 views

7 CertLibrary - Com SC 900

SC 900

Uploaded by

Mubashir Ahmad
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
430 views

7 CertLibrary - Com SC 900

SC 900

Uploaded by

Mubashir Ahmad
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Microsoft Security, Compliance, and Identity Fundamentals v1.

0
Page:    7 / 13      Exam contains 131 questions Q's per page: 10 

 EXPAND ALL

Question 61 (
Describe the Capabilities of Microsoft Security Solutions)

HOTSPOT -

Select the answer that correctly completes the sentence.

Hot Area:

EXPOSE CORRECT ANSWER

Answer :

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender/threat-
analytics?view=o365-worldwide

NEXT QUESTION

Question 62 (
Describe the Capabilities of Microsoft Security Solutions)

HOTSPOT -

For each of the following statements, select Yes if the statement is true.
Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

EXPOSE CORRECT ANSWER

Answer :

Explanation:

You can use an Azure network security group to filter network traffic to and
from Azure resources in an Azure virtual network. A network security group
contains security rules that allow or deny inbound network traffic to, or
outbound network traffic from, several types of Azure resources. For each
rule, you can specify source and destination, port, and protocol.

Reference:

https://docs.microsoft.com/en-us/azure/virtual-network/network-
security-groups-overview

NEXT QUESTION

Question 63 (
Describe the Capabilities of Microsoft Security Solutions)

HOTSPOT
HOTSPOT -

For each of the following statements, select Yes if the statement is true.
Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

EXPOSE CORRECT ANSWER

Answer :

Reference:

https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-is-
intune https://docs.microsoft.com/en-us/mem/intune/fundamentals/what-
is-device-management

NEXT QUESTION

Question 64 (
Describe the Capabilities of Microsoft Security Solutions)

HOTSPOT -

For each of the following statements, select Yes if the statement is true.
Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

EXPOSE CORRECT ANSWER

Answer :

Reference:

https://docs.microsoft.com/en-us/azure/bastion/bastion-overview
https://docs.microsoft.com/en-us/azure/bastion/tutorial-create-host-
portal

NEXT QUESTION

Question 65 (
Describe the Capabilities of Microsoft Security Solutions)

What feature in Microsoft Defender for Endpoint provides the first line of
defense against cyberthreats by reducing the attack surface?

A.
automated remediation
B.
automated investigation
C.
advanced hunting
D.
network protection
EXPOSE CORRECT ANSWER

Answer : D

Explanation:

Network protection helps protect devices from Internet-based events.


Network protection is an attack surface reduction capability.

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-
endpoint/network-protection?view=o365-worldwide

NEXT QUESTION

Question 66 (
Describe the Capabilities of Microsoft Security Solutions)

HOTSPOT -

Select the answer that correctly completes the sentence.

Hot Area:

EXPOSE CORRECT ANSWER

Answer :

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/overview

NEXT QUESTION

Question 67 (
Describe the Capabilities of Microsoft Security Solutions)

Which two types of resources can be protected by using Azure Firewall? Each
correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.
Azure virtual machines
B.
Azure Active Directory (Azure AD) users
C.
Microsoft Exchange Online inboxes
D.
Azure virtual networks
E.
Microsoft SharePoint Online sites

EXPOSE CORRECT ANSWER

Answer : DE

NEXT QUESTION

Question 68 (
Describe the Capabilities of Microsoft Security Solutions)

You plan to implement a security strategy and place multiple layers of defense
throughout a network infrastructure.

Which security methodology does this represent?

A.
threat modeling
B.
identity as the security perimeter
C.
defense in depth
D.
the shared responsibility model

EXPOSE CORRECT ANSWER


Answer : C

Reference:

https://docs.microsoft.com/en-us/learn/modules/secure-network-
connectivity-azure/2-what-is-defense-in-depth

NEXT QUESTION

Question 69 (
Describe the Capabilities of Microsoft Security Solutions)

HOTSPOT -

For each of the following statements, select Yes if the statement is true.
Otherwise, select No.

NOTE: Each correct selection is worth one point.

Hot Area:

EXPOSE CORRECT ANSWER

Answer :

NEXT QUESTION

Question 70 (
Describe the Capabilities of Microsoft Security Solutions)
What can you use to scan email attachments and forward the attachments to
recipients only if the attachments are free from malware?

A.
Microsoft Defender for Office 365
B.
Microsoft Defender Antivirus
C.
Microsoft Defender for Identity
D.
Microsoft Defender for Endpoint

EXPOSE CORRECT ANSWER

Answer : A

Reference:

https://docs.microsoft.com/en-us/office365/servicedescriptions/office-365-
advanced-threat-protection-service-description

NEXT QUESTION

Page:    7 / 13      Exam contains 131 questions Q's per page: 10 

 EXPAND ALL

Talk to us!
Have any questions or issues ? Please dont hesitate to contact us


[email protected]

Certlibrary doesn't offer Real Microsoft Exam Questions.

Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.

CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered

trademarks owned by CFA Institute.

You might also like