Microsoft Security, Compliance, and Identity Fundamentals Practice Test (SC-900)
Use the form below to configure your Microsoft Security, Compliance, and Identity Fundamentals Practice Test (SC-900). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Security, Compliance, and Identity Fundamentals SC-900 Information
About the Microsoft Security, Compliance, and Identity Fundamentals Exam (SC-900)
The Microsoft Security, Compliance, and Identity Fundamentals (SC-900) certification is an entry-level credential designed to validate a candidate's foundational knowledge of Microsoft's security, compliance, and identity (SCI) solutions. This certification is the starting point for individuals interested in understanding how to protect data and manage users and resources within Microsoft 365 and Azure environments. The exam is not just for aspiring IT professionals; it is also targeted toward business stakeholders, students, and new or existing IT professionals who want to familiarize themselves with the fundamentals of SCI across cloud-based and related Microsoft services. Although there are no formal prerequisites, a basic understanding of Microsoft 365 and Azure services is recommended.
The SC-900 exam covers four main domains: the concepts of security, compliance, and identity; the capabilities of Microsoft Entra (formerly Azure Active Directory); the capabilities of Microsoft's security solutions; and the capabilities of Microsoft's compliance solutions. Candidates will be tested on their understanding of core concepts like the Zero Trust model, the shared responsibility model, and defense-in-depth. The exam questions will also assess knowledge of specific Microsoft tools and services, including Microsoft Defender for Cloud, Microsoft Sentinel, and Microsoft Purview. The exam itself typically consists of 40-60 questions, which may include multiple-choice and scenario-based formats, and requires a score of 700 or greater to pass.
Using Practice Exams in Your Preparation
A crucial component of preparing for the SC-900 exam is taking practice tests. These assessments are an excellent way to review the material you've learned and get a feel for the real exam environment. One of the primary benefits of using practice exams is enhancing your time management skills, which is a significant factor in Microsoft certification exams. They also provide an opportunity for revision, helping you to consolidate complex topics. By simulating the actual exam, practice tests help identify your strengths and weaknesses, allowing you to focus your study efforts more effectively and boost your confidence.
Our assessments are created by the same team that develops the certification exams, ensuring they are closely aligned with the exam's content and difficulty. You can take these practice tests multiple times, and each attempt can help you become more familiar with the question formats. Upon completion, you receive a score report that provides the correct answers, rationales, and links to additional learning resources, helping you to fill any knowledge gaps.

Free Microsoft Security, Compliance, and Identity Fundamentals SC-900 Practice Test
- 20 Questions
- Unlimited
- Describe the concepts of security, compliance, and identityDescribe the capabilities of Microsoft EntraDescribe the capabilities of Microsoft security solutionsDescribe the capabilities of Microsoft compliance solutions
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
Your company plans to adopt Microsoft's Zero Trust security model. Leadership asks what principle under this model drives the requirement that every access request-whether from inside or outside the corporate network-must be authenticated and authorized using all available signals. Which Zero Trust principle are they referring to?
Shift-left security
Verify explicitly
Use least-privileged access
Assume breach
Answer Description
The Zero Trust model is built on three core principles: verify explicitly, use least-privileged access, and assume breach. The mandate to authenticate and authorize every access attempt based on all available signals-such as user identity, location, and device health-directly aligns with the "verify explicitly" principle. While least-privilege focuses on limiting permissions and assume breach focuses on containment and monitoring, verify explicitly requires continuous validation before granting access, even to internal requests. "Shift-left security" is a software-development concept and is not one of the formal Zero Trust principles.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the 'verify explicitly' principle mean in the Zero Trust model?
How does 'verify explicitly' differ from 'least-privileged access' in Zero Trust?
Why is 'shift-left security' incorrect in the context of Zero Trust principles?
Your organization wants to allow employees to sign in once and seamlessly access several Software as a Service (SaaS) applications such as Microsoft 365, Salesforce, and ServiceNow, to support single sign-on and avoid storing separate passwords in each service. Which function must be provided by the identity provider participating in this scenario?
Maintain off-site backups of the data stored in every SaaS application
Validate user credentials and issue security tokens that applications accept for access
Host each SaaS application and determine its licensing terms
Encrypt all network traffic between user devices and the SaaS applications
Answer Description
An identity provider (IdP) is responsible for authenticating users and issuing the security tokens that SaaS applications (relying parties) trust. By validating the user's credentials and providing a signed token, the IdP enables single sign-on across multiple services. Hosting the applications, encrypting all traffic, or backing up application data are important tasks, but they are not core responsibilities of an IdP.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Identity Provider (IdP)?
How does single sign-on (SSO) work in this scenario?
What is a security token and how is it used?
Your organization is adopting Microsoft's Zero Trust model. A security architect states that every access request must be authenticated and authorized using all available signals such as user identity, device compliance, and location before any resource is accessed. Which Zero Trust principle is being applied?
Verify explicitly
Assume breach
Segment access by network zone
Use least-privileged access
Answer Description
The requirement to assess every access attempt based on multiple signals (identity, device health, location, etc.) illustrates the Verify explicitly principle. Zero Trust stresses three core principles: Verify explicitly, Use least-privileged access, and Assume breach. While least-privileged access limits permissions after authentication and assume breach prepares for compromise, only verify explicitly mandates rigorous, signal-based authentication and authorization for each request. Segmenting by network zone can be part of a Zero Trust architecture, but it is not one of the three core principles.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'Verify explicitly' mean in the context of Zero Trust?
How is 'Verify explicitly' different from 'Assume breach'?
How does 'Verify explicitly' enhance security compared to traditional perimeter-based security models?
An administrator assigns a network security group (NSG) to a subnet. The NSG contains several inbound security rules with different priority numbers. When an incoming packet reaches the subnet, how does Azure determine which single rule from the NSG is applied to the traffic?
It combines the actions of every rule that matches the packet and applies them in sequence.
It evaluates rules starting with the lowest priority number and applies the first rule that matches the packet.
It evaluates all rules and enforces whichever rule is the most restrictive for the packet.
It evaluates rules starting with the highest priority number and applies the first rule that matches the packet.
Answer Description
Azure evaluates NSG security rules in ascending order of their priority number (where 100 is evaluated before 200, and so on). As soon as the first rule that matches the packet's characteristics is found, Azure stops processing further rules and enforces the action (allow or deny) defined in that rule. Rules with higher priority numbers are evaluated later and are ignored if an earlier rule already matched the traffic. Therefore, lower priority numbers have precedence. The other options are incorrect because Azure does not start with the highest priority number, does not aggregate multiple rules, and does not apply the most restrictive action after reviewing all rules.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Network Security Group (NSG) in Azure?
How does priority numbering work in NSG security rules?
What happens if no rule matches the incoming packet in an NSG?
During a security awareness session, you explain that Microsoft recommends placing complementary controls at successive layers-physical, perimeter, network, host, application, and data-so that if one control fails, the remaining layers still protect the workload. Which security strategy does this description represent?
Zero Trust model
Encrypting data in transit
Defense in depth
Shared responsibility model
Answer Description
The scenario describes defense in depth, a strategy that applies coordinated security controls at multiple layers. Each layer (for example, physical, perimeter, network, identity, host, application, and data) provides an additional barrier. If an attacker compromises one layer, the remaining layers continue to limit movement and protect assets. Zero Trust focuses on continuous verification, the shared responsibility model divides duties between provider and customer, and encrypting data in transit is only one control, not an overall strategy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the concept of defense in depth?
How does defense in depth compare to the Zero Trust model?
What are some examples of security layers within the defense in depth strategy?
Your company wants employees to use their existing corporate Azure AD credentials to access several third-party SaaS applications, so that the SaaS providers do not need to store or manage your users' passwords. Which identity concept makes this scenario possible by establishing a trust relationship between the corporate tenant and each SaaS provider?
Authorization
Federation
Role-based access control
Directory synchronization
Answer Description
Identity federation creates a trust relationship between an identity provider-such as Azure Active Directory-and one or more service providers. When the trust is in place, the service provider accepts a security token issued by the identity provider and grants the user access without maintaining its own user store. This allows single sign-on across organizational boundaries while keeping authentication centralized. Directory synchronization only copies account data and still requires local authentication, authorization defines what a user can do after access is granted, and role-based access control is a method of assigning permissions, not of sharing identities between organizations. Therefore, federation is the required concept.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is identity federation?
What is the difference between federation and directory synchronization?
How does Single Sign-On (SSO) work in identity federation?
You need to recommend a technique to ensure that a file stored in Azure retains confidentiality so that only authorized users can read its contents. The technique must allow the file to be returned to its original form when accessed. Which concept should you recommend?
Salting
Tokenization
Symmetric encryption
Hashing
Answer Description
Symmetric encryption converts readable data into ciphertext using a secret key and can be reversed (decrypted) with the same key, meeting the requirement for confidentiality and recoverability. Hashing and salting create one-way digests that cannot be converted back to the original data and are intended for integrity or password storage, not confidentiality. Tokenization substitutes sensitive data with unrelated tokens without providing a built-in way to restore the original value from the token alone. Therefore, symmetric encryption is the only option that both protects the data and allows it to be restored to its initial state.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is symmetric encryption?
How does symmetric encryption differ from asymmetric encryption?
When should symmetric encryption be used?
Your organization wants to prompt multifactor authentication only when users open the Azure portal, while allowing access to other Microsoft 365 apps without extra prompts. Within a Conditional Access policy, which assignment setting do you configure so that the policy applies solely to the Azure portal?
Users or workload identities
Conditions
Cloud apps or actions
Session controls
Answer Description
To scope a Conditional Access policy to a particular application, you configure the Cloud apps or actions assignment. In this section you can select the "Microsoft Azure Management" cloud app, which represents the Azure portal. The other options serve different purposes: "Users or workload identities" chooses who is affected, "Conditions" refines circumstances such as location or device state, and "Session controls" are enforcement actions that apply after access is granted. Without targeting the correct cloud app, the policy would either not run or would apply to unintended services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Conditional Access in Azure AD?
What does 'Cloud apps or actions' mean in Conditional Access policies?
How does multifactor authentication integrate with Conditional Access?
A company wants to confirm that a document remains unchanged when it is downloaded from cloud storage. Which characteristic of hashing makes it better suited than encryption for this integrity check?
It creates a fixed-length value that cannot be reversed to the original data.
It relies on the same secret key for both scrambling and descrambling data.
It converts data into ciphertext that authorized users can later decrypt.
It uses a public and private key pair to protect data during transit.
Answer Description
Hashing applies a mathematical function to input data and returns a short, fixed-length value (the hash, or message digest). Because the process is one-way, any change to the original data produces a completely different hash, allowing quick verification that data is unaltered. Encryption focuses on confidentiality and is designed to be reversed (decrypted) with the correct key, so it is not inherently ideal for simple integrity comparisons.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is hashing considered one-way and irreversible?
How does hashing ensure data integrity?
What is the difference between hashing and encryption?
An administrator is comparing encryption and hashing when deciding how to protect data in Microsoft 365. Which statement correctly describes how hashing differs from encryption?
Hashing creates a fixed-length value that cannot be reversed, while encrypted data can be returned to its original form with the appropriate key.
Hashing significantly increases the size of the data, but encryption keeps data length unchanged.
Hashing protects confidentiality but not integrity, whereas encryption protects integrity but not confidentiality.
Hashing requires a public/private key pair, whereas encryption never uses keys.
Answer Description
Hashing takes an input of any length and produces a fixed-length digest that is designed to be irreversible. Because the process cannot be reversed, hashing is used to verify data integrity, such as when Microsoft 365 checks file hashes after download. Encryption, by contrast, is a reversible operation: the original plaintext can be recovered by applying the correct decryption key, which is why encryption is suited to protecting confidentiality. The other answers are incorrect because hashing does not rely on key pairs, does not inherently enlarge data, and does not provide confidentiality-those properties are associated with encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of hashing in data protection?
How do encryption and hashing differ in their methods of protecting data?
What are common use cases for hashing versus encryption?
A company must store user passwords in its database so that it can verify them during sign-in, but no one, including administrators, should be able to retrieve the original passwords. Which security technique best meets this requirement?
Symmetric encryption with an algorithm such as AES
Transport Layer Security (TLS) to encrypt the network connection
Asymmetric encryption with an algorithm such as RSA
Hashing with a one-way algorithm such as SHA-256
Answer Description
Hashing uses a one-way mathematical function to convert input data into a fixed-length digest. Because the function is non-reversible, the original password cannot be reconstructed from the hash, yet the application can verify a user by hashing the provided password and comparing the digests. Symmetric and asymmetric encryption are reversible by design, so administrators with the appropriate keys could recover the plaintext. TLS protects data only while it is in transit and does not secure how the password is stored.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between hashing and encryption?
What makes hashing algorithms like SHA-256 secure?
How does the application verify a password using a hash?
Your organization has begun cataloging threats, estimating how likely each threat is to occur, evaluating the potential business impact, and then deciding which safeguards to implement first. In Governance, Risk, and Compliance (GRC) terminology, which discipline is the organization currently performing?
Risk management
Data classification
Compliance
Governance
Answer Description
The described activities-identifying threats, analyzing their likelihood and impact, and prioritizing mitigation efforts-are core parts of the risk management discipline of GRC. Governance focuses on establishing policies and overall direction, while compliance addresses meeting regulatory or contractual requirements. Data classification is a supporting security practice but is not itself one of the three primary GRC disciplines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is risk management in the context of GRC?
How does governance differ from risk management?
Why is compliance not the correct discipline in this scenario?
Your company decides to enforce multifactor authentication (MFA) for all employees to reduce the risk of account compromise. According to Microsoft's defense-in-depth model, which security layer is primarily strengthened by this action?
Identity and access
Data
Network
Perimeter
Answer Description
Multifactor authentication is a control that verifies user identities before granting access to resources. In Microsoft's defense-in-depth model, such controls belong to the Identity and access layer. Perimeter and Network layers protect traffic flow, while the Data layer safeguards the information itself; none of these layers are primarily focused on confirming who the user is.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is the Identity and Access layer critical in the defense-in-depth model?
What is Multifactor Authentication (MFA) and why is it secure?
How does the Identity and Access layer differ from the Perimeter and Network layers?
You deploy an Azure App Service that runs as a managed platform instance. According to Azure's shared responsibility model, which task remains Microsoft's responsibility rather than yours?
Encrypting data stored in your application database
Defining role assignments for application users in Azure AD
Configuring inbound firewall rules that restrict traffic to the web app
Installing security patches for the underlying operating system
Answer Description
With Platform as a Service (PaaS) offerings such as Azure App Service, Microsoft is responsible for securing and maintaining the underlying platform. That includes installing operating-system updates and patches on the hosts that run customers' code. Customers, however, must protect their own data, manage identities and access, and set any additional network controls they require. Therefore only the operating-system patching task falls under Microsoft's responsibility in this scenario; the other listed tasks remain customer duties.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Azure shared responsibility model?
Why does Microsoft handle OS security patches in PaaS offerings?
What security tasks do customers handle in a PaaS like Azure App Service?
You need to explain to a colleague how Azure Active Directory (Azure AD) differs from on-premises Active Directory Domain Services (AD DS). Which statement correctly describes a key structural difference between the two directory services?
Azure AD always relies on on-premises domain controllers for every sign-in, so it cannot operate independently in the cloud.
AD DS natively supports multiple tenants within a single forest, but each Azure AD directory can host only one tenant.
AD DS organizes objects in hierarchical forests, domains, and organizational units, whereas Azure AD provides a flat, cloud-based directory in which all users and groups reside at the tenant level.
Azure AD authenticates users only with Kerberos tickets, while AD DS supports modern protocols such as OAuth 2.0 and OpenID Connect.
Answer Description
AD DS stores objects in a hierarchical structure that includes forests, domains, and organizational units (OUs), which administrators use together with Group Policy. Azure AD is a cloud-based, multi-tenant directory that keeps users, groups, and other objects in a flat structure scoped to a single tenant and does not provide OUs or Group Policy. The other options either reverse the protocol support, incorrectly state that Azure AD depends on on-premises domain controllers, or misrepresent which service is multi-tenant.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the primary structural difference between Azure AD and AD DS?
What are organizational units (OUs) in AD DS, and why does Azure AD not use them?
How does Azure AD manage configurations and policies without Group Policy?
An organization wants partners to access a new business application by signing in with the partners' own corporate credentials. The partners' identity provider will authenticate the users and issue tokens that the application trusts, so no passwords are stored or synchronized between the two organizations. What identity approach does this scenario illustrate?
Identity federation
Role-based access control (RBAC)
Multi-factor authentication (MFA)
Password hash synchronization
Answer Description
The scenario describes two separate security realms-your organization and the partners' organization-establishing mutual trust so that authentication is performed by the partners' identity provider and accepted by your application. This is the essence of identity federation. The other options are different concepts: password hash synchronization copies password hashes to Azure AD, role-based access control governs permissions after authentication, and multi-factor authentication adds verification steps but does not establish cross-organization trust.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is identity federation?
How does identity federation differ from password hash synchronization?
What role do tokens play in identity federation?
A user signs in to Microsoft Entra ID with the correct credentials and receives a security token, but is then told they do not have permission to open a particular SharePoint Online site. In terms of identity concepts, which process has succeeded and which one has failed in this scenario?
Federation succeeded; authentication failed.
Authorization succeeded; authentication failed.
Both authentication and authorization failed.
Authentication succeeded; authorization failed.
Answer Description
The sign-in process that confirms the user is who they claim to be is authentication, and it completed successfully because the user obtained a valid token. The process that evaluates the user's permissions to decide whether the requested SharePoint Online site can be accessed is authorization, and that process failed because the user was denied access. Therefore, authentication succeeded while authorization failed. The other options reverse these roles, claim both processes failed, or mix in federation, which is unrelated to the permission decision for a SharePoint resource.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between authentication and authorization?
What role does a security token play in Microsoft Entra ID authentication?
What is the difference between Microsoft Entra ID Authentication and Federation?
To align with Microsoft's guidance that identity, rather than the corporate network, is the primary security perimeter, which Azure Active Directory capability should an organization use to automatically grant or block access based on real-time signals such as user risk, device compliance, and sign-in location?
Azure DDoS Protection Standard
Azure AD Conditional Access
Microsoft Defender for Endpoint attack surface reduction rules
Azure Information Protection sensitivity labels
Answer Description
Identity is treated as the first line of defense because users and devices connect from many networks. Azure AD Conditional Access continuously evaluates signals (user risk, sign-in location, device health, etc.) and applies policies to allow, require additional verification, or block access. This makes Conditional Access the key enforcement tool for using identity as the security perimeter. The other options do not provide policy-based, real-time access decisions centered on identity: Azure Information Protection labels classify data, Defender for Endpoint attack-surface rules harden devices, and Azure DDoS Protection safeguards network resources from volumetric attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are real-time signals in Azure AD Conditional Access?
How does Azure AD Conditional Access differ from Microsoft Defender for Endpoint?
Why is identity considered the primary security perimeter?
Your organization wants to let external customers access a new web app by signing in with their existing Google or Facebook accounts through an Azure AD B2C tenant. Within this sign-in flow, which term best describes Google and Facebook?
Resource providers
Identity providers
Conditional access policies
Session hosts
Answer Description
Google and Facebook perform the authentication step on behalf of the customer. Services that authenticate users and issue the resulting security token to relying applications are known as identity providers. Conditional access policies, resource providers, and session hosts have different roles and do not directly authenticate users.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an identity provider?
How does Azure AD B2C work with external identity providers?
What is the difference between an identity provider and a resource provider?
When managing access in Azure, you assign the built-in Reader role to a security group at the resource group scope. Which identity concept are you applying through this action?
Authorization
Federation
Authentication
Identity provisioning
Answer Description
Assigning the Reader role with Azure role-based access control does not verify who the user is; that occurs during authentication. Instead, the role defines what the signed-in users are permitted to do-view resources within the assigned scope. Deciding and enforcing these post-sign-in permissions is the purpose of authorization. Federation and identity provisioning relate to how identities are established or trusted, not to the permissions they receive after sign-in.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure role-based access control (Azure RBAC)?
How is authorization different from authentication?
What are the scopes in Azure RBAC, and how do they work?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.