ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 76 - SC-100 discussion

Report
Export


A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription. All the on-premises servers in the perimeter network are prevented from connecting directly to the internet. The customer recently recovered from a ransomware attack.

The customer plans to deploy Microsoft Sentinel.

You need to recommend configurations to meet the following requirements:

• Ensure that the security operations team can access the security logs and the operation logs.

• Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network. Which two configurations can you include in the recommendation? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Configure Azure Active Directory (Azure AD) Conditional Access policies.

Answers
A.

Configure Azure Active Directory (Azure AD) Conditional Access policies.

B.

Use the Azure Monitor agent with the multi-homing configuration.

Answers
B.

Use the Azure Monitor agent with the multi-homing configuration.

C.

Implement resource-based role-based access control (RBAC) in Microsoft Sentinel.

Answers
C.

Implement resource-based role-based access control (RBAC) in Microsoft Sentinel.

D.

Create a custom collector that uses the Log Analytics agent.

Answers
D.

Create a custom collector that uses the Log Analytics agent.

Suggested answer: B, C
asked 05/10/2024
Vijayakumar Dhandapani
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first