{"id":57411,"date":"2022-08-31T16:44:22","date_gmt":"2022-08-31T16:44:22","guid":{"rendered":"https:\/\/www.testpreptraining.com\/tutorial\/?page_id=57411"},"modified":"2023-02-11T06:52:18","modified_gmt":"2023-02-11T06:52:18","slug":"microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions","status":"publish","type":"page","link":"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/","title":{"rendered":"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2022\/08\/Microsoft-SC-900-Security-Compliance-and-Identity-Fundamentals-Sample-Questions.jpg\" alt=\"Microsoft (SC-900) Security, Compliance, and Identity Fundamentals Sample Questions\" class=\"wp-image-57412\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"has-text-align-center has-content-bg-color has-content-primary-background-color has-text-color has-background wp-block-heading\"><strong>Advanced Sample Questions<\/strong><\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Which of the following is NOT a component of the Microsoft 365 security and compliance center?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. Threat protection<\/li><li>b. Data loss prevention<\/li><li>c. Network security<\/li><li>d. Information protection<\/li><\/ul>\n\n\n\n<p>Answer: c. Network security<\/p>\n\n\n\n<p>Explanation: The Microsoft 365 security and compliance center provides a range of security and compliance solutions, including threat protection, data loss prevention, and information protection. However, it does not provide network security solutions.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-security\/security-and-compliance-center?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-security\/security-and-compliance-center?view=o365-worldwide<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of Azure Active Directory (AD)?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide on-premises directory and identity management<\/li><li>b. To provide cloud-based directory and identity management<\/li><li>c. To provide virtual machine management<\/li><li>d. To provide storage solutions<\/li><\/ul>\n\n\n\n<p>Answer: b. To provide cloud-based directory and identity management<\/p>\n\n\n\n<p>Explanation: Azure Active Directory is a cloud-based directory and identity management solution provided by Microsoft. It enables organizations to manage user identities and provide access to resources.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Which of the following is NOT a security measure provided by Microsoft 365?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. Multi-factor authentication<\/li><li>b. Mobile device management<\/li><li>c. Data backup and recovery<\/li><li>d. Endpoint protection<\/li><\/ul>\n\n\n\n<p>Answer: c. Data backup and recovery<\/p>\n\n\n\n<p>Explanation: Microsoft 365 provides a range of security measures, including multi-factor authentication, mobile device management, and endpoint protection. However, it does not provide data backup and recovery solutions.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-security\/security-and-compliance-center?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-security\/security-and-compliance-center?view=o365-worldwide<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of Microsoft Cloud App Security?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide cloud application discovery and risk assessment<\/li><li>b. To provide network security<\/li><li>c. To provide data backup and recovery<\/li><li>d. To provide virtual machine management<\/li><\/ul>\n\n\n\n<p>Answer: a. To provide cloud application discovery and risk assessment<\/p>\n\n\n\n<p>Explanation: Microsoft Cloud App Security is a cloud security solution that provides discovery and risk assessment of cloud applications used in an organization. It helps to ensure that these applications are used in a secure and compliant manner.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/what-is-cloud-app-security\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/what-is-cloud-app-security<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of the Microsoft 365 Compliance Center?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide information protection and governance solutions<\/li><li>b. To provide virtual machine management<\/li><li>c. To provide data backup and recovery<\/li><li>d. To provide network security<\/li><\/ul>\n\n\n\n<p>Answer: a. To provide information protection and governance solutions<\/p>\n\n\n\n<p>Explanation: The Microsoft 365 Compliance Center provides information protection and governance solutions for organizations using Microsoft 365. It helps organizations to meet their legal, regulatory, and organizational compliance requirements.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-center-overview?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-center-overview?view=o365-worldwide<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of Azure Information Protection?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide data backup and recovery solutions<\/li><li>b. To provide network security<\/li><li>c. To classify and protect sensitive information<\/li><li>d. To provide virtual machine management<\/li><\/ul>\n\n\n\n<p>Answer: c. To classify and protect sensitive information<\/p>\n\n\n\n<p>Explanation: Azure Information Protection is a solution that helps organizations classify and protect sensitive information by allowing them to label and encrypt sensitive data. This helps organizations meet their compliance and security requirements.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/information-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/azure.microsoft.com\/en-us\/services\/information-protection\/<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of Microsoft Intune?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide data backup and recovery solutions<\/li><li>b. To provide network security<\/li><li>c. To manage and secure mobile devices<\/li><li>d. To provide virtual machine management<\/li><\/ul>\n\n\n\n<p>Answer: c. To manage and secure mobile devices<\/p>\n\n\n\n<p>Explanation: Microsoft Intune is a cloud-based mobile device management solution that helps organizations manage and secure mobile devices used by employees. It provides features such as device management, app management, and security management.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/intune\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/intune\/<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of Microsoft Defender for Endpoint?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide data backup and recovery solutions<\/li><li>b. To provide network security<\/li><li>c. To provide threat protection for endpoints<\/li><li>d. To provide virtual machine management<\/li><\/ul>\n\n\n\n<p>Answer: c. To provide threat protection for endpoints<\/p>\n\n\n\n<p>Explanation: Microsoft Defender for Endpoint is a solution that provides threat protection for endpoints such as computers and mobile devices. It uses machine learning and other advanced security technologies to protect against threats such as viruses, malware, and unauthorized access.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-defender\/microsoft-defender-for-endpoint\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-defender\/microsoft-defender-for-endpoint<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of Microsoft Defender for Office 365?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide data backup and recovery solutions<\/li><li>b. To provide network security<\/li><li>c. To protect against threats to email and collaboration tools<\/li><li>d. To provide virtual machine management<\/li><\/ul>\n\n\n\n<p>Answer: c. To protect against threats to email and collaboration tools<\/p>\n\n\n\n<p>Explanation: Microsoft Defender for Office 365 is a solution that helps protect against threats to email and collaboration tools such as Exchange Online and SharePoint Online. It uses machine learning and other security technologies to protect against email-based threats such as phishing and malware.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/microsoft-defender-for-office-365\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/microsoft-defender-for-office-365<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What is the purpose of Azure AD Premium P2?<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>a. To provide data backup and recovery solutions<\/li><li>b. To provide network security<\/li><li>c. To provide advanced identity and access management features<\/li><li>d. To provide virtual machine management<\/li><\/ul>\n\n\n\n<p>Answer: c. To provide advanced identity and access management features<\/p>\n\n\n\n<p>Explanation: Azure AD Premium P2 is a version of Azure Active Directory that provides advanced identity and access management features, such as multi-factor authentication, access reviews, and identity protection. These features help organizations to meet their security and compliance requirements.<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/active-directory\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/active-directory\/<\/a><\/p>\n\n\n\n<h2 class=\"has-text-align-center has-content-bg-color has-content-primary-background-color has-text-color has-background wp-block-heading\"><strong>Basic Sample Questions<\/strong><\/h2>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 1<\/strong> &#8211; <strong>As the first line of defense against cyber threats, what feature of Microsoft Defender for Endpoint reduces the attack surface?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. automated remediation<\/li><li>B. automated investigation<\/li><li>C. advanced hunting<\/li><li>D. network protection<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/network-protection?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/network-protection?view=o365-worldwide<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 2<\/strong> &#8211; <strong>What score is used to assess an organization&#8217;s progress when it comes to reducing the risks associated with data protection and regulatory compliance?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Microsoft Secure Score<\/li><li>B. Productivity Score<\/li><li>C. Secure score in Azure Security Center<\/li><li>D. Compliance score<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-manager?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-manager?view=o365-worldwide<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-score-calculation?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/compliance-score-calculation?view=o365-worldwide<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 3<\/strong> &#8211; <strong>In order to provide real-time integration between Azure Sentinel and another security source, what do you use?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Azure AD Connect<\/li><li>B. a Log Analytics workspace<\/li><li>C. Azure Information Protection<\/li><li>D. a connector<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/overview<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 4<\/strong> &#8211; <strong>In which Microsoft portal can you find information about how Microsoft cloud services are compliant with regulatory standards, such as International Organization for Standardization (ISO)?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. the Microsoft Endpoint Manager admin center<\/li><li>B. Azure Cost Management + Billing<\/li><li>C. Microsoft Service Trust Portal<\/li><li>D. the Azure Active Directory admin center<\/li><\/ul>\n\n\n\n<p>Correct Answer: C<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/get-started-with-service-trust-portal?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/get-started-with-service-trust-portal?view=o365-worldwide<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 5<\/strong> &#8211; <strong>Microsoft is solely responsible for what in the shared responsibility model for an Azure deployment?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. managing mobile devices<\/li><li>B. permissions for the user data stored in Azure<\/li><li>C. creating and managing user accounts<\/li><li>D. managing the physical hardware<\/li><\/ul>\n\n\n\n<p>Correct Answer: D<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 6<\/strong> &#8211; <strong>Which two of the given types of resources are protected by using Azure Firewall?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Azure virtual machines<\/li><li>B. Azure Active Directory (Azure AD) users<\/li><li>C. Microsoft Exchange Online inboxes<\/li><li>D. Azure virtual networks<\/li><li>E. Microsoft SharePoint Online sites<\/li><\/ul>\n\n\n\n<p>Correct Answer: DE<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 7<\/strong> &#8211; <strong>Implementing a security strategy and setting up multiple layers of defense throughout a network infrastructure is on your list of to-dos. Which of the following security methodology does this represent?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. threat modeling<\/li><li>B. identity as the security perimeter<\/li><li>C. defense in depth<\/li><li>D. the shared responsibility model<\/li><\/ul>\n\n\n\n<p>Correct Answer: C<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/secure-network-connectivity-azure\/2-what-is-defense-in-depth\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/secure-network-connectivity-azure\/2-what-is-defense-in-depth<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 8<\/strong> &#8211; <strong>Is there a tool available for scanning email attachments and forwarding them only if they&#8217;re malware-free?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Microsoft Defender for Office 365<\/li><li>B. Microsoft Defender Antivirus<\/li><li>C. Microsoft Defender for Identity<\/li><li>D. Microsoft Defender for Endpoint<\/li><\/ul>\n\n\n\n<p>Correct Answer: A<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/servicedescriptions\/office-365-advanced-threat-protection-service-description\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/office365\/servicedescriptions\/office-365-advanced-threat-protection-service-description<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 9<\/strong> &#8211; <strong>Azure Sentinel provides extended detection and response (XDR) capabilities through which feature?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. integration with the Microsoft 365 compliance center<\/li><li>B. support for threat hunting<\/li><li>C. integration with Microsoft 365 Defender<\/li><li>D. support for Azure Monitor Workbooks<\/li><\/ul>\n\n\n\n<p>Correct Answer: C<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender\/eval-overview?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender\/eval-overview?view=o365-worldwide<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 10<\/strong> &#8211; <strong>What threat detection methods can you use with Azure SQL Managed Instances?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Microsoft Secure Score<\/li><li>B. application security groups<\/li><li>C. Microsoft Defender for Cloud<\/li><li>D. Azure Bastion<\/li><\/ul>\n\n\n\n<p>Correct Answer: C<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 11<\/strong> &#8211; <strong>Microsoft Intune-managed devices cannot access corporate resources through which Azure Active Directory feature?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. network security groups (NSGs)<\/li><li>B. Azure AD Privileged Identity Management (PIM)<\/li><li>C. conditional access policies<\/li><li>D. resource locks<\/li><\/ul>\n\n\n\n<p>Correct Answer: C<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 12<\/strong> &#8211; <strong>What are the two phases that precede the Ready phase in the Microsoft Cloud Adoption Framework for Azure?<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>A. Plan<\/li><li>B. Manage<\/li><li>C. Adopt<\/li><li>D. Govern<\/li><li>E. Define Strategy<\/li><\/ul>\n\n\n\n<p>Correct Answer: AE<\/p>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/overview<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 13<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Choose Yes if the statement is true for each. If not, select No.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Statements&nbsp;<\/strong><\/td><td><strong>Yes\/No<\/strong><\/td><\/tr><tr><td><strong>Applying system updates increases an organization\u2019s secure score in Microsoft Defender for Cloud<\/strong><\/td><td><\/td><\/tr><tr><td><strong>The secure score in Microsoft Defender for Cloud can evaluate resources across multiple azure subscriptions<\/strong><\/td><td><\/td><\/tr><tr><td><strong>Enabling multi-factor authentication (MFA) increases an organization\u2019s secure score in Microsoft Defender for Cloud<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Statements&nbsp;<\/td><td>Yes\/No<\/td><\/tr><tr><td>Applying system updates increase an organization\u2019s secure score in Microsoft Defender for Cloud<\/td><td>Yes<\/td><\/tr><tr><td>The secure score in Microsoft Defender for Cloud can evaluate resources across multiple azure subscriptions<\/td><td>Yes&nbsp;<\/td><\/tr><tr><td>Enabling multi-factor authentication (MFA) increases an organization\u2019s secure score in Microsoft Defender for Cloud<\/td><td>Yes&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/secure-score-security-controls\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/secure-score-security-controls<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 14<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Choose Yes if the statement is true for each. If not, select No.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Statements&nbsp;<\/strong><\/td><td><strong>Yes\/No<\/strong><\/td><\/tr><tr><td><strong style=\"user-select: auto;\">All Azure Active Directory (Azure AD) license editions include the same features<\/strong><\/td><td><\/td><\/tr><tr><td><strong>You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal<\/strong><\/td><td><\/td><\/tr><tr><td><strong>You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Statements&nbsp;<\/td><td>Yes\/No<\/td><\/tr><tr><td>All Azure Active Directory (Azure AD) license editions include the same features<\/td><td>NO<\/td><\/tr><tr><td>You can manage an Azure Active Directory (Azure AD) tenant by using the Azure portal<\/td><td>YES<\/td><\/tr><tr><td>You must deploy Azure virtual machines to host an Azure Active Directory (Azure AD) tenant<\/td><td>NO<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 15<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Select the answer that correctly completes the sentence.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Azure blueprints&nbsp;<\/strong><\/td><td><strong>Provides best practices from Microsft employees, partners, and customers, including tools and guidance to assist in an Azure deployment<\/strong><\/td><\/tr><tr><td><strong>Azure policy<\/strong><\/td><td><\/td><\/tr><tr><td><strong>The Microsoft Cloud Adoption Framework for Azure<\/strong><\/td><td><\/td><\/tr><tr><td><strong>A resource lock<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Azure blueprints&nbsp;<\/td><td>Provides best practices from Microsft employees, partners, and customers, including tools and guidance to assist in an Azure deployment<\/td><\/tr><tr><td>Azure policy<\/td><td><\/td><\/tr><tr><td><strong>The Microsoft Cloud Adoption Framework for Azure<\/strong><\/td><td><\/td><\/tr><tr><td>A resource lock<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/get-started\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/get-started\/<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 16<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Select the answer that correctly completes the sentence.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Customer lockbox<\/strong><\/td><td><strong>Is used to identify, hold, and export electronic information that might be used in an investigation<\/strong><\/td><\/tr><tr><td><strong>Data loss prevention (DLP)<\/strong><\/td><td><\/td><\/tr><tr><td><strong>eDiscovery<\/strong><\/td><td><\/td><\/tr><tr><td><strong>A resource lock<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Customer lockbox<\/strong><\/td><td>Is used to identify, hold, and export electronic information that might be used in an investigation<\/td><\/tr><tr><td>Data loss prevention (DLP)<\/td><td><\/td><\/tr><tr><td>eDiscovery<\/td><td><\/td><\/tr><tr><td>A resource lock<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/customer-lockbox-overview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/customer-lockbox-overview<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 17<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Select the answer that correctly completes the sentence.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Federation is used to establish<\/strong><\/td><td><\/td><td><strong>between organizations<\/strong><\/td><\/tr><tr><td><\/td><td><strong>Multi-factor authentication (MFA)<\/strong><\/td><td><\/td><\/tr><tr><td><\/td><td><strong>A trust relationship<\/strong><\/td><td><\/td><\/tr><tr><td><\/td><td><strong>User account synchronization<\/strong><\/td><td><\/td><\/tr><tr><td><\/td><td><strong>A VPN connection<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Federation is used to establish<\/td><td><\/td><td>between organizations<\/td><\/tr><tr><td><\/td><td>Multi-factor authentication (MFA)<\/td><td><\/td><\/tr><tr><td><\/td><td><strong>A trust relationship<\/strong><\/td><td><\/td><\/tr><tr><td><\/td><td>User account synchronization<\/td><td><\/td><\/tr><tr><td><\/td><td>A VPN connection<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/hybrid\/whatis-fed\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/hybrid\/whatis-fed<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 18<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Select the answer that correctly completes the sentence.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Statements&nbsp;<\/strong><\/td><td><strong>Yes\/No&nbsp;<\/strong><\/td><\/tr><tr><td><strong>Verify explicitly is one of the guiding principles of Zero Trust<\/strong><\/td><td><\/td><\/tr><tr><td><strong>Assume breach is on the guiding principles of Zero Trust<\/strong><\/td><td><\/td><\/tr><tr><td><strong>The Zero Trust security model assumes that a firewall secures the internal network from external threats<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Statements&nbsp;<\/td><td>Yes\/No&nbsp;<\/td><\/tr><tr><td>Verify explicitly is one of the guiding principles of Zero Trust<\/td><td>YES<\/td><\/tr><tr><td>Assume breach is on the guiding principles of Zero Trust<\/td><td>YES<\/td><\/tr><tr><td>The Zero Trust security model assumes that a firewall secures the internal network from external threats<\/td><td>NO<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Reference: <a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/zero-trust\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/security\/zero-trust\/<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 19<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Select the answer that correctly completes the sentence.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Statements<\/strong><\/td><td><strong>Yes\/No&nbsp;<\/strong><\/td><\/tr><tr><td><strong style=\"user-select: auto;\">Control is a key privacy principle of Microsoft<\/strong><\/td><td><\/td><\/tr><tr><td><strong style=\"user-select: auto;\">Transparency is a key privacy principle of Microsoft<\/strong><\/td><td><\/td><\/tr><tr><td><strong>Shares responsibility is key privacy of Microsoft<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Statements<\/td><td>Yes\/No&nbsp;<\/td><\/tr><tr><td>Control is a key privacy principle of Microsoft<\/td><td>YES<\/td><\/tr><tr><td>Transparency is a key privacy principle of Microsoft<\/td><td>YES<\/td><\/tr><tr><td>Shares responsibility is key privacy of Microsoft<\/td><td>NO<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Question 20<\/strong> &#8211; <strong>HOTSPOT &#8211;<\/strong> <strong>Select the answer that correctly completes the sentence.<\/strong><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Hot Area:<\/strong><\/h5>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td><strong>a file makes the data in the file readable and usable to viewers that have the appropriate key<\/strong><\/td><\/tr><tr><td><strong>Archiving<\/strong><\/td><td><\/td><\/tr><tr><td><strong>Compressing<\/strong><\/td><td><\/td><\/tr><tr><td><strong>Deduplicating<\/strong><\/td><td><\/td><\/tr><tr><td><strong>Encrypting<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Correct Answer:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td>a file makes the data in the file readable and usable to viewers that have the appropriate key<\/td><\/tr><tr><td>Archiving<\/td><td><\/td><\/tr><tr><td>Compressing&nbsp;<\/td><td><\/td><\/tr><tr><td>Deduplicating&nbsp;<\/td><td><\/td><\/tr><tr><td><strong>Encrypting&nbsp;<\/strong><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.testpreptraining.ai\/exam-sc-900-microsoft-security-compliance-identity-fundamentals-free-practice-test\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"961\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2021\/05\/sc-900-tests.png\" alt=\"\" class=\"wp-image-40469\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2021\/05\/sc-900-tests.png 961w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2021\/05\/sc-900-tests-750x117.png 750w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/a><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Advanced Sample Questions Which of the following is NOT a component of the Microsoft 365 security and compliance center? a. Threat protection b. Data loss prevention c. Network security d. Information protection Answer: c. Network security Explanation: The Microsoft 365 security and compliance center provides a range of security and compliance solutions, including threat protection,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":57412,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[1226],"tags":[9009,9008],"class_list":["post-57411","page","type-page","status-publish","has-post-thumbnail","hentry","category-microsoft","tag-microsoft-sc-900-free-practice-tests","tag-microsoft-sc-900-sample-questions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions<\/title>\n<meta name=\"description\" content=\"Prepare for Microsoft (SC-900): Security, Compliance, and Identity Fundamentals exam with sample questions. Start Preparing Now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions\" \/>\n<meta property=\"og:description\" content=\"Prepare for Microsoft (SC-900): Security, Compliance, and Identity Fundamentals exam with sample questions. Start Preparing Now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/\" \/>\n<meta property=\"og:site_name\" content=\"Testprep Training Tutorials\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-11T06:52:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2022\/08\/Microsoft-SC-900-Security-Compliance-and-Identity-Fundamentals-Sample-Questions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/\",\"name\":\"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\"},\"datePublished\":\"2022-08-31T16:44:22+00:00\",\"dateModified\":\"2023-02-11T06:52:18+00:00\",\"description\":\"Prepare for Microsoft (SC-900): Security, Compliance, and Identity Fundamentals exam with sample questions. Start Preparing Now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"name\":\"Testprep Training Tutorials\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\",\"name\":\"Testprep Training\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"contentUrl\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"width\":583,\"height\":153,\"caption\":\"Testprep Training\"},\"image\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions","description":"Prepare for Microsoft (SC-900): Security, Compliance, and Identity Fundamentals exam with sample questions. Start Preparing Now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions","og_description":"Prepare for Microsoft (SC-900): Security, Compliance, and Identity Fundamentals exam with sample questions. Start Preparing Now!","og_url":"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/","og_site_name":"Testprep Training Tutorials","article_modified_time":"2023-02-11T06:52:18+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2022\/08\/Microsoft-SC-900-Security-Compliance-and-Identity-Fundamentals-Sample-Questions.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/","url":"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/","name":"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website"},"datePublished":"2022-08-31T16:44:22+00:00","dateModified":"2023-02-11T06:52:18+00:00","description":"Prepare for Microsoft (SC-900): Security, Compliance, and Identity Fundamentals exam with sample questions. Start Preparing Now!","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/microsoft-sc-900-security-compliance-and-identity-fundamentals-sample-questions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/tutorial\/"},{"@type":"ListItem","position":2,"name":"Microsoft (SC-900): Security, Compliance, and Identity Fundamentals Sample Questions"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","name":"Testprep Training Tutorials","description":"","publisher":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization","name":"Testprep Training","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/","url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","contentUrl":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","width":583,"height":153,"caption":"Testprep Training"},"image":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/57411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/comments?post=57411"}],"version-history":[{"count":6,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/57411\/revisions"}],"predecessor-version":[{"id":60629,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/57411\/revisions\/60629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media\/57412"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media?parent=57411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/categories?post=57411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/tags?post=57411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}