ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Your company plans to follow DevSecOps best practices of the Microsoft Cloud Adoption Framework for Azure. You need to perform threat modeling by using a top-down approach based on the Microsoft Cloud Adoption Framework for Azure. What should you use to start the threat modeling process?

A.

the STRIDE model

A.

the STRIDE model

Answers
B.

the DREAD model

B.

the DREAD model

Answers
C.

OWASP threat modeling

C.

OWASP threat modeling

Answers
D.

Other options

D.

Other options

Answers
Suggested answer: C

You have an Azure AD tenant that syncs with an Active Directory Domain Services {AD DS) domain.

Client computers run Windows and are hybrid-joined to Azure AD.

You are designing a strategy to protect endpoints against ransomware. The strategy follows Microsoft Security Best Practices. You plan to remove all the domain accounts from the Administrators group on the Windows computers.

You need to recommend a solution that will provide users with administrative access to the Windows computers only when access is required. The solution must minimize the lateral movement of ransomware attacks if an administrator account on a computer is compromised.

What should you include in the recommendation?

A.

Local Administrator Password Solution (LAPS)

A.

Local Administrator Password Solution (LAPS)

Answers
B.

Privileged Access Workstations (PAWs)

B.

Privileged Access Workstations (PAWs)

Answers
C.

Azure AD Privileged Identity Management (PIM)

C.

Azure AD Privileged Identity Management (PIM)

Answers
D.

Azure AD identity Protection

D.

Azure AD identity Protection

Answers
Suggested answer: A

You have a Microsoft 365 subscription that syncs with Active Directory Domain Services (AD DS).

You need to define the recovery steps for a ransomware attack that encrypted data in the subscription The solution must follow Microsoft Security Best Practices. What is the first step in the recovery plan?

A.

Disable Microsoft OneDnve sync and Exchange ActiveSync.

A.

Disable Microsoft OneDnve sync and Exchange ActiveSync.

Answers
B.

Recover files to a cleaned computer or device.

B.

Recover files to a cleaned computer or device.

Answers
C.

Contact law enforcement.

C.

Contact law enforcement.

Answers
D.

From Microsoft Defender for Endpoint perform a security scan.

D.

From Microsoft Defender for Endpoint perform a security scan.

Answers
Suggested answer: A

You have an Azure AD tenant that syncs with an Active Directory Domain Services (AD DS) domain.

You have an on-premises datacenter that contains 100 servers. The servers run Windows Server and are backed up by using Microsoft Azure Backup Server (MABS). You are designing a recovery solution for ransomware attacks. The solution follows Microsoft Security Best Practices. You need to ensure that a compromised administrator account cannot be used to delete the backups

What should you do?

A.

From a Recovery Services vault generate a security PIN for critical operations.

A.

From a Recovery Services vault generate a security PIN for critical operations.

Answers
B.

From Azure Backup, configure multi-user authorization by using Resource Guard.

B.

From Azure Backup, configure multi-user authorization by using Resource Guard.

Answers
C.

From Microsoft Azure Backup Setup, register MABS with a Recovery Services vault

C.

From Microsoft Azure Backup Setup, register MABS with a Recovery Services vault

Answers
D.

From Azure AD Privileged identity Management (PIM), create a role assignment for the Backup Contributor role.

D.

From Azure AD Privileged identity Management (PIM), create a role assignment for the Backup Contributor role.

Answers
Suggested answer: A

You have a Microsoft 365 subscription.

You are designing a user access solution that follows the Zero Trust principles of the Microsoft Cybersecurity Reference Architectures (MCRA). You need to recommend a solution that automatically restricts access to Microsoft Exchange Online.

SharePoint Online, and Teams m near-real-lime (NRT) in response to the following Azure AD events:

• A user account is disabled or deleted

• The password of a user is changed or reset.

• All the refresh tokens for a user are revoked

• Multi-factor authentication (MFA) is enabled for a user

Which two features should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

continuous access evaluation

A.

continuous access evaluation

Answers
B.

a sign-in risk policy

B.

a sign-in risk policy

Answers
C.

Azure AD Privileged Identity Management (PIM)

C.

Azure AD Privileged Identity Management (PIM)

Answers
D.

Conditional Access

D.

Conditional Access

Answers
E.

Azure AD Application Proxy

E.

Azure AD Application Proxy

Answers
Suggested answer: B, D

HOTSPOT

You are planning the security levels for a security access strategy.

You need to identify which job roles to configure at which security levels. The solution must meet security best practices of the Microsoft Cybersecurity Reference Architectures (MCRA). Which security level should you configure for each job role? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Question 126
Correct answer: Question 126

Your company plans to evaluate the security of its Azure environment based on the principles of the Microsoft Cloud Adoption Framework for Azure. You need to recommend a cloud-based service to evaluate whether the Azure resources comply with the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). What should you recommend?

A.

Compliance Manager in Microsoft Purview

A.

Compliance Manager in Microsoft Purview

Answers
B.

Microsoft Defender for Cloud

B.

Microsoft Defender for Cloud

Answers
C.

Microsoft Sentinel

C.

Microsoft Sentinel

Answers
D.

Microsoft Defender for Cloud Apps

D.

Microsoft Defender for Cloud Apps

Answers
Suggested answer: B

Your company uses Azure Pipelines and Azure Repos to implement continuous integration and continuous deployment (CI/CD) workflows for the deployment of applications to Azure. You are updating the deployment process to align with DevSecOps controls guidance in the Microsoft Cloud Adoption Framework for Azure. You need to recommend a solution to ensure that all code changes are submitted by using pull requests before being deployed by the CI/CD workflow. What should you include in the recommendation?

A.

custom roles in Azure Pipelines

A.

custom roles in Azure Pipelines

Answers
B.

branch policies in Azure Repos

B.

branch policies in Azure Repos

Answers
C.

Azure policies

C.

Azure policies

Answers
D.

custom Azure roles

D.

custom Azure roles

Answers
Suggested answer: B

Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security Best Practices. You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART) approach in Microsoft Security Best Practices. What should you include in the response plan?

A.

controlled folder access

A.

controlled folder access

Answers
B.

application isolation

B.

application isolation

Answers
C.

memory scanning

C.

memory scanning

Answers
D.

machine isolation

D.

machine isolation

Answers
E.

user isolation

E.

user isolation

Answers
Suggested answer: D

HOTSPOT

For a Microsoft cloud environment, you are designing a security architecture based on the Microsoft Cybersecurity Reference Architectures (MCRA). You need to protect against the following external threats of an attack chain:

• An attacker attempts to exfiltrate data to external websites.

• An attacker attempts lateral movement across domain-joined computers.

What should you include in the recommendation for each threat? To answer, select the appropriate options in the answer area.


Question 130
Correct answer: Question 130
Total 177 questions
Go to page: of 18