Full explanation on Azure AD features and licensing
Microsoft Cloud Adoption Framework
**Best practices from Microsoft employees, partners, and customers
**Tools and guidance for Azure deployment included.
Correct answer: Microsoft Cloud Adoption Framework
e-Discovery
Identifies, holds, and exports electronic information for investigations.
Microsoft Purview tools for content search and export.
Correct answer: e-Discovery (e-Discovery in Microsoft Purview)**
Microsoft Endpoint Manager
Management of Microsoft Intune.
Includes configuration of manager, desktop analytics, co-management, and Windows Autopilot.
Correct answer: Microsoft Endpoint Manager Admin Center
Federation
Used to establish trust relationships between organizations.
Correct answer: Trust relationship
Secure Score in Microsoft Defender
Statements about increasing Secure Score with updates, MFA, and multi-subscription evaluation.
All statements given are true.
Compliance Score
Measures progression in reducing data protection risks.
Correct answer: Compliance Score
Integration with Azure Sentinel
Real-time integration between Azure Sentinel and other security sources using a connector.
Correct answer: Connector
Microsoft Service Trust Portal
Information about regulatory compliance of Microsoft Cloud Services.
Correct answer: Microsoft Service Trust Portal
Shared Responsibility Model in Azure
Microsoft's responsibility: Management of physical hardware.
Correct answer: Management of physical hardware.
Zero Trust Security Model
Principles: Verify explicitly, least privileged access, assume breach.
Correct answers: True for explicit verification and assume breach; false for internal network firewall.
Microsoft Privacy Principles
Key principles: Control, Transparency, Security, Legal protections, No content-based targeting, Benefits to you.
Control and Transparency are true statements; Shared Responsibility is not a key privacy principle.
File Encryption
Encrypting files to make them readable only with the appropriate key.
Correct answer: Encrypting
Digital Signature
Verifying a digitally signed document requires a public key, not the private key.
Correct answers: True for the first two statements; false for the third statement.
Authentication and Authorization
User authentication before authorization.
Correct answer for authenticating users signing into the Azure portal: Authentication
Correct answer for process of identifying access to resource: Authorization
Azure AD Business to Business (B2B)
Collaboration with external users and guest access management.
Correct answer: Azure AD B2B
Cloud Adoption Framework Phases
Phases before 'Ready': Plan and Define Strategy
Correct answers: Plan and Define Strategy
Hybrid Identity
Syncing identities with Azure AD Connect, requiring only one Microsoft 365 tenant, and synchronizing AD DS with AAD.
Correct answers: True for statements regarding hybrid identity and AD synchronization.
Azure Defender and Security Baseline
Real-time integration, security benchmarks, and use cases for encryption and secure authentication practices.
Correct answers span across Microsoft's security principles and configurations.
Advanced Security Measures
Using multi-factor authentication, conditional access, information barriers, and automatic security detections/remediation.
Variety of scenarios answered including device compliance, guest user policies, and application-specific security measures.
Microsoft Security Tools and Recommendations
Defender for Cloud, Endpoint, Office 365, and Identity tools used for managing and detecting threats, vulnerabilities, and ensuring secure environments.
Security and compliance tools and policy recommendations spanning Microsoft's various platforms and encouraged practices.
Azure Networking Services
Firewall, Bastion, and Network Security Groups usage for secure connectivity and traffic filtering.
Expansion on various networking features and protective measures.
Security Information and Event Management (SIEM)
Azure Sentinel used for alert detection, threat visibility, proactive hunting, and response.
Included integrated tools for efficient security.
Conclusion
Comprehensive question and answer explanations to prepare for the SC-900 exam.
Encouragement to review explanations and understand the application of Microsoft security principles and practices.