Course Information
Course Overview
Be prepared for the Microsoft Exam SC-900: Microsoft Security, Compliance, and Identity Fundamentals
In order to set realistic expectations, please note: These questions are NOT official questions that you will find on the official exam. These questions DO cover all the material outlined in the knowledge sections below. Many of the questions are based on fictitious scenarios which have questions posed within them.
The official knowledge requirements for the exam are reviewed routinely to ensure that the content has the latest requirements incorporated in the practice questions. Updates to content are often made without prior notification and are subject to change at any time.
Each question has a detailed explanation and links to reference materials to support the answers which ensures accuracy of the problem solutions.
The questions will be shuffled each time you repeat the tests so you will need to know why an answer is correct, not just that the correct answer was item "B" last time you went through the test.
NOTE: This course should not be your only study material to prepare for the official exam. These practice tests are meant to supplement topic study material.
Should you encounter content which needs attention, please send a message with a screenshot of the content that needs attention and I will be reviewed promptly. Providing the test and question number do not identify questions as the questions rotate each time they are run. The question numbers are different for everyone.
If you have an interest in Microsoft SCI solutions, this exam is for you, whether you’re a:
Business stakeholder
New or existing IT professional
Student
You should be familiar with Microsoft Azure and Microsoft 365 and want to understand how Microsoft SCI solutions can span across these solution areas to provide a holistic and end-to-end solution.
Skills at a glance
Describe the concepts of security, compliance, and identity (10–15%)
Describe the capabilities of Microsoft Entra (25–30%)
Describe the capabilities of Microsoft security solutions (35–40%)
Describe the capabilities of Microsoft compliance solutions (20–25%)
Describe the concepts of security, compliance, and identity (10–15%)
Describe security and compliance concepts
Describe the shared responsibility model
Describe defense-in-depth
Describe the Zero Trust model
Describe encryption and hashing
Describe Governance, Risk, and Compliance (GRC) concepts
Define identity concepts
Define identity as the primary security perimeter
Define authentication
Define authorization
Describe identity providers
Describe the concept of directory services and Active Directory
Describe the concept of federation
Describe the capabilities of Microsoft Entra (25–30%)
Describe function and identity types of Microsoft Entra ID
Describe Microsoft Entra ID
Describe types of identities
Describe hybrid identity
Describe authentication capabilities of Microsoft Entra ID
Describe the authentication methods
Describe multi-factor authentication (MFA)
Describe password protection and management capabilities
Describe access management capabilities of Microsoft Entra ID
Describe Conditional Access
Describe Microsoft Entra roles and role-based access control (RBAC)
Describe identity protection and governance capabilities of Microsoft Entra
Describe Microsoft Entra ID Governance
Describe access reviews
Describe the capabilities of Microsoft Entra Privileged Identity Management
Describe Microsoft Entra ID Protection
Describe the capabilities of Microsoft security solutions (35–40%)
Describe core infrastructure security services in Azure
Describe Azure distributed denial-of-service (DDoS) Protection
Describe Azure Firewall
Describe Web Application Firewall (WAF)
Describe network segmentation with Azure virtual networks
Describe network security groups (NSGs)
Describe Azure Bastion
Describe Azure Key Vault
Describe security management capabilities of Azure
Describe Microsoft Defender for Cloud
Describe Cloud Security Posture Management (CSPM)
Describe how security policies and initiatives improve the cloud security posture
Describe enhanced security features provided by cloud workload protection
Describe capabilities of Microsoft Sentinel
Define the concepts of security information and event management (SIEM) and security orchestration automated response (SOAR)
Describe threat detection and mitigation capabilities in Microsoft Sentinel
Describe threat protection with Microsoft Defender XDR
Describe Microsoft Defender XDR services
Describe Microsoft Defender for Office 365
Describe Microsoft Defender for Endpoint
Describe Microsoft Defender for Cloud Apps
Describe Microsoft Defender for Identity
Describe Microsoft Defender Vulnerability Management
Describe Microsoft Defender Threat Intelligence (Defender TI)
Describe the Microsoft Defender portal
Describe the capabilities of Microsoft compliance solutions (20–25%)
Describe Microsoft Service Trust Portal and privacy principles
Describe the Service Trust Portal offerings
Describe the privacy principles of Microsoft
Describe Microsoft Priva
Describe compliance management capabilities of Microsoft Purview
Describe the Microsoft Purview portal
Describe Compliance Manager
Describe the uses and benefits of compliance score
Describe information protection, data lifecycle management, and data governance capabilities of Microsoft Purview
Describe the data classification capabilities
Describe the benefits of Content explorer and Activity explorer
Describe sensitivity labels and sensitivity label policies
Describe data loss prevention (DLP)
Describe records management
Describe retention policies, retention labels, and retention label policies
Describe insider risk, eDiscovery, and audit capabilities in Microsoft Purview
Describe insider risk management
Describe eDiscovery solutions in Microsoft Purview
Describe audit solutions in Microsoft Purview
Course Content
- 1 section(s)
- Section 1 Practice Tests
What You’ll Learn
- Describe the Concepts of Security, Compliance, and Identity
- Describe security and compliance concepts & methodologies
- Describe Define security identity concepts
- Describe Microsoft Security and compliance principles
- Describe the capabilities of Microsoft Identity and Access Management Solutions
- Define identity principles/concepts
- Describe the basic identity services and identity types of Azure AD
- Describe the authentication capabilities of Azure AD
- Describe access management capabilities of Azure AD
- Describe the identity protection & governance capabilities of Azure AD
- Describe the capabilities of Microsoft Security Solutions
- Describe basic security capabilities in Azure
- Describe security management capabilities of Azure
- Describe security capabilities of Azure Sentinel
- Describe threat protection with Microsoft 365 Defender
- Describe security management capabilities of Microsoft 365
- Describe endpoint security with Microsoft Intune
- Describe the Capabilities of Microsoft Compliance Solutions
- Describe the compliance management capabilities in Microsoft
- Describe information protection and governance capabilities of Microsoft 365
- Describe insider risk capabilities in Microsoft 365
- Describe the eDiscovery and audit capabilities of Microsoft 365
- Describe the audit capabilities in Microsoft 365
- Describe resource governance capabilities in Azure
Skills covered in this course
Reviews
-
GGourav Bhowmik
Ok
-
CCheikh Ba
It was very Good !
-
FFisayo Ademidun
Really good test, more difficult than the real test but get you really prepared, passed with 844 comfortably.. Thanks
-
BBesenty Mendy
These practice examinations are harder than the real test, as several reviewers stated, but they do help you understand the things you don't understand or know well.