SC-300 Exam Questions: 15 Practice Questions With Answers (2026)

18 min read

Scenario-based SC-300 practice questions that mirror the style of the real Microsoft exam. Covers all four exam domains — with full explanations for every answer. Before diving in, it helps to understand how hard SC-300 really is and how it differs from other security certifications — read our SC-300 vs AZ-500 comparisonor the SC-900 vs SC-300 breakdown. When you're ready to go further, practice on our SC-300 certification quiz page.

About These Questions

These 10 questions (with 5 more at the bottom) are written to match the scenario-based format of the real SC-300 exam. Each question tests your ability to select the best solution for a business scenario — not just recall a definition. Click "Show Answer" to reveal the explanation after attempting each question.

Question 1AuthenticationMedium

Your organization requires that all users authenticate using MFA when accessing cloud apps from outside the corporate network. The solution must not affect users on the corporate network. Users on the corporate network connect through a known IP range of 203.0.113.0/24. What should you configure?

A. Enable per-user MFA for all users in Entra ID
B. Create a Conditional Access policy requiring MFA, with a Named Location for the corporate IP range excluded from the policy conditions
C. Configure a Conditional Access policy that blocks all sign-ins from outside the corporate IP range
D. Enable Security Defaults and exclude the corporate IP range in the MFA trusted IPs settings
Reveal Answer & Explanation

Correct Answer: B

The correct approach is a Conditional Access policy that requires MFA, with the corporate network's IP range defined as a Named Location and that Named Location excluded from the MFA requirement (or included as a trusted location). Per-user MFA (A) doesn't support location-based exclusions elegantly. Blocking sign-ins from outside (C) prevents remote work. Security Defaults (D) cannot be customized with Named Locations.

Question 2Identity GovernanceHard

An employee is leaving the organization in 30 days. They are currently an eligible owner of the Billing Administrators role in PIM. Their manager wants to ensure the employee cannot activate this role during their remaining 30 days while keeping their account active for knowledge transfer. What is the most efficient solution?

A. Remove the eligible role assignment from the user in PIM
B. Create a Conditional Access policy blocking the user from activating any PIM roles
C. Change the eligible assignment to an active assignment with no expiration
D. Disable the user account in Entra ID
Reveal Answer & Explanation

Correct Answer: A

Removing the eligible role assignment in PIM (A) directly prevents the user from activating the role while keeping their account active for normal work. A Conditional Access policy (B) cannot target PIM role activation specifically at the grant level. Changing to active (C) would give permanent access — the opposite of the goal. Disabling the account (D) would prevent all work, not just the role activation.

Question 3Application AccessHard

A developer has registered an application in Entra ID that will run as a background service without user interaction. The app needs to send emails as any user in the organization using Microsoft Graph. Which permission type and scope should you grant?

A. Delegated permission — Mail.Send
B. Application permission — Mail.Send
C. Delegated permission — Mail.ReadWrite
D. Application permission — Mail.ReadWrite.All
Reveal Answer & Explanation

Correct Answer: B

Application permissions (not delegated) are required when an app runs without a signed-in user. Mail.Send as an application permission allows the app to send email as any user. Delegated permissions (A, C) require a signed-in user context — a background service has no user context. Mail.ReadWrite.All (D) grants broader read/write access which is more than needed and violates least privilege.

Question 4Conditional AccessHard

Users in the Sales group report they cannot access Salesforce after a new Conditional Access policy was deployed. The policy requires a compliant device for all cloud apps. The Sales team uses personal iOS devices that are enrolled in Intune but do not meet the compliance policy because they are running an older iOS version. The IT manager wants Sales to still be able to access Salesforce from their devices immediately, with minimum policy changes. What should you do?

A. Exclude the Sales group from the Conditional Access policy
B. Create a separate Conditional Access policy for the Sales group that requires approved client app instead of compliant device
C. Update the device compliance policy to allow older iOS versions
D. Change the grant control from "Require compliant device" to "Require one of the selected controls" and add "Require approved client app"
Reveal Answer & Explanation

Correct Answer: D

Changing to "Require one of the selected controls" with both compliant device AND approved client app means users can satisfy either condition. Sales users with non-compliant devices can still access Salesforce via an approved client app (like the Salesforce mobile app through Intune-managed policies). Excluding Sales entirely (A) removes all protection. A separate policy (B) works but creates policy sprawl. Updating the compliance policy (C) lowers security for all devices.

Question 5Entra IDMedium

Your organization uses Microsoft Entra Connect to sync on-premises Active Directory to Entra ID using Password Hash Sync. Users report they can sign in to Entra ID but their on-premises AD passwords are not being updated when they reset via SSPR in Entra ID. What is the most likely cause?

A. Password Hash Sync is not configured correctly
B. Password writeback is not enabled in Entra Connect
C. SSPR is not licensed — it requires Microsoft Entra ID P2
D. The user accounts are cloud-only and not synced from on-premises AD
Reveal Answer & Explanation

Correct Answer: B

Password writeback must be explicitly enabled in Microsoft Entra Connect configuration to allow cloud-initiated password resets to propagate back to on-premises AD. Password Hash Sync (A) only syncs password hashes from on-premises to cloud — it does not provide writeback. SSPR (C) requires Entra ID P1 or P2, and since users can sign in successfully, licensing is not the issue. If accounts were cloud-only (D), there would be no on-premises AD to write back to.

Question 6Identity GovernanceMedium

A project team of 15 contractors needs access to three SharePoint sites and a Teams channel for 6 months. After 6 months, access should be automatically removed. The solution must allow contractors to self-request access and require manager approval. What should you configure?

A. Add contractors to a security group and set a group expiration policy for 6 months
B. Configure an access package in Entitlement Management with a 6-month expiration and approval workflow
C. Assign each contractor individually to the SharePoint sites and Teams channel and create a calendar reminder to remove access in 6 months
D. Create a Conditional Access policy that blocks contractor accounts after 6 months
Reveal Answer & Explanation

Correct Answer: B

Entitlement Management access packages are exactly designed for this scenario: bundling multiple resources (SharePoint sites, Teams), enabling self-service request, requiring approval, and automatically removing access at expiration. Group expiration (A) applies to the group lifecycle, not access expiration for specific resources. Manual process (C) is error-prone and doesn't support self-request. Conditional Access (D) blocks all access, not a graceful removal of specific resources.

Question 7AuthenticationMedium

A Global Administrator needs to ensure that users who are flagged as high-risk by Entra ID Protection are required to change their password immediately on their next sign-in. What should you configure?

A. Create a Conditional Access policy using Sign-in risk as a condition and require MFA as the grant
B. Create a Conditional Access policy using User risk as a condition and require password change as the grant
C. Enable the User risk policy in Entra ID Protection settings with password change required
D. Both B and C achieve the same result — either is correct
Reveal Answer & Explanation

Correct Answer: D

Both configuring a Conditional Access policy with User risk condition and require password change grant (B) and the legacy Entra ID Protection User risk policy (C) achieve the same outcome. Microsoft recommends using Conditional Access policies (B) for new configurations because they provide more control and visibility. However, the legacy User risk policy in Identity Protection (C) is still valid and functional. The exam may accept either — but if only one answer is accepted, choose B (CA policy is the recommended approach).

Question 8Application AccessHard

An organization wants to allow users to consent to apps requesting low-risk permissions without admin involvement. High-risk permissions must always require admin consent. How should you configure this?

A. Enable user consent for all apps without admin approval required
B. Disable all user consent and require admin consent for all apps
C. Configure the user consent settings to allow user consent for verified publisher apps with low-impact permissions, and require admin approval for all other permission requests
D. Create a Conditional Access policy that controls which apps users can consent to
Reveal Answer & Explanation

Correct Answer: C

The app consent policy in Entra ID allows granular control: users can consent to apps from verified publishers requesting only low-impact permissions (like read profile), while any high-risk permission requires admin consent. This balances user productivity with security. Allowing all user consent (A) is too permissive. Disabling all user consent (B) creates administrative bottlenecks. Conditional Access (D) does not control app consent.

Question 9Identity GovernanceHard

You are configuring an Access Review for members of the Global Administrator role. The review should run quarterly, reviewers should be the managers of each Global Administrator, and users whose access is not reviewed should have their access automatically removed. What should you configure?

A. Create an Access Review in Entra ID Identity Governance, set reviewers to "Managers of users", set recurrence to quarterly, and set "If reviewers don't respond" to "Remove access"
B. Create an Access Review in PIM for the Global Administrator role, set reviewers to "Managers of users", set recurrence to quarterly, and set "If reviewers don't respond" to "Remove access"
C. Create an Access Review in Entra ID Identity Governance, set reviewers to "Selected users", select each manager manually, set recurrence to quarterly
D. Create a PIM access review with auto-approval for members who self-certify
Reveal Answer & Explanation

Correct Answer: B

Access reviews for Entra ID roles (like Global Administrator) must be created within PIM (Privileged Identity Management), not in the general Identity Governance Access Reviews section. Creating the review in PIM (B) with "Managers of users" as reviewers, quarterly recurrence, and auto-remove when reviewers don't respond meets all requirements. Answer A would not capture role members correctly. C lacks auto-remove. D defeats the purpose of having a review.

Question 10Entra IDEasy

An administrator needs to create 500 user accounts in Entra ID from a CSV file export from an HR system. What is the most efficient method?

A. Create each user manually in the Entra ID portal
B. Use bulk user creation in the Entra ID portal by uploading a CSV file
C. Write a PowerShell script using the MSOnline module
D. Use the Azure CLI to create users from the CSV file
Reveal Answer & Explanation

Correct Answer: B

The Entra ID portal supports bulk user creation by uploading a CSV file — this is the most efficient built-in method for creating many users at once without code. Manual creation (A) is impractical for 500 users. PowerShell (C) and Azure CLI (D) work but require scripting knowledge and the question asks for the "most efficient" method, which for a non-developer admin is the built-in bulk operation.

Want 500 More SC-300 Questions?

Full question bank covering all SC-300 domains with practice mode and timed exam simulation.

40 questions free — no credit card required.

Start Free Practice →

SC-300 Question Patterns to Know

After reviewing thousands of SC-300 exam reports from candidates, here are the most common question patterns you'll encounter on exam day:

"Least privilege / minimum permissions" questions

The exam frequently asks for the solution that grants the minimum access required. Always scan all answers for the most restrictive option that still meets the requirement.

"Which feature should you use" scenario questions

Given a business requirement, identify the correct Entra ID feature (PIM vs Access Reviews vs Entitlement Management vs Conditional Access). These require you to know not just what each feature does but when to use each one.

Drag-and-drop and ordering questions

Some questions ask you to order configuration steps or match features to requirements. These can't be guessed — they require procedural knowledge.

Multi-requirement scenarios

Questions with 3–4 requirements in a single scenario are common. You need to identify the single answer that meets ALL requirements, not just most of them.