ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











Your company plans to apply the Zero Trust Rapid Modernization Plan (RaMP) to its IT environment.

You need to recommend the top three modernization areas to prioritize as part of the plan.

Which three areas should you recommend based on RaMP? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

data, compliance, and governance

A.

data, compliance, and governance

Answers
B.

user access and productivity

B.

user access and productivity

Answers
C.

infrastructure and development

C.

infrastructure and development

Answers
D.

modern security operations

D.

modern security operations

Answers
E.

operational technology (OT) and loT

E.

operational technology (OT) and loT

Answers
Suggested answer: A, B, D

Explanation:


You have an operational model based on the Microsoft Cloud Adoption framework for Azure.

You need to recommend a solution that focuses on cloud-centric control areas to protect resources such as endpoints, database, files, and storage accounts.

What should you include in the recommendation?

A.

security baselines in the Microsoft Cloud Security Benchmark

A.

security baselines in the Microsoft Cloud Security Benchmark

Answers
B.

modern access control

B.

modern access control

Answers
C.

business resilience

C.

business resilience

Answers
D.

network isolation

D.

network isolation

Answers
Suggested answer: A

You are designing a new Azure environment based on the security best practices of the Microsoft Cloud Adoption Framework for Azure. The environment will contain one subscription for shared infrastructure components and three separate subscriptions for applications.

You need to recommend a deployment solution that includes network security groups (NSGs) Azure Key Vault, and Azure Bastion. The solution must minimize deployment effort and follow security best practices of the Microsoft Cloud Adoption Framework for Azure.

What should you include in the recommendation?

A.

the Azure landing zone accelerator

A.

the Azure landing zone accelerator

Answers
B.

the Azure Will-Architected Framework

B.

the Azure Will-Architected Framework

Answers
C.

Azure Security Benchmark v3

C.

Azure Security Benchmark v3

Answers
D.

Azure Advisor

D.

Azure Advisor

Answers
Suggested answer: A

You have an on-premises network and a Microsoft 365 subscription.

You are designing a Zero Trust security strategy.

Which two security controls should you include as part of the Zero Trust solution? Each correct answer part of the solution.

NOTE: Each correct answer is worth one point.

A.

Block sign-attempts from unknown location.

A.

Block sign-attempts from unknown location.

Answers
B.

Always allow connections from the on-premises network.

B.

Always allow connections from the on-premises network.

Answers
C.

Disable passwordless sign-in for sensitive account.

C.

Disable passwordless sign-in for sensitive account.

Answers
D.

Block sign-in attempts from noncompliant devices.

D.

Block sign-in attempts from noncompliant devices.

Answers
Suggested answer: A, D

You have an Azure subscription.

You have a DNS domain named contoso.com that is hosted by a third-party DNS registrar.

Developers use Azure DevOps to deploy web apps to App Service Environments- When a new app is deployed, a CNAME record for the app is registered in contoso.com.

You need to recommend a solution to secure the DNS record tor each web app. The solution must meet the following requirements:

* Ensure that when an app is deleted, the CNAME record for the app is removed also

* Minimize administrative effort.

What should you include in the recommendation?

A.

Microsoft Defender for DevOps

A.

Microsoft Defender for DevOps

Answers
B.

Microsoft Defender foe App Service

B.

Microsoft Defender foe App Service

Answers
C.

Microsoft Defender for Cloud Apps

C.

Microsoft Defender for Cloud Apps

Answers
D.

Microsoft Defender for DNS

D.

Microsoft Defender for DNS

Answers
Suggested answer: C

HOTSPOT

Your network contains an on-premises Active Directory Domain Services (AO DS) domain. The domain contains a server that runs Windows Server and hosts shared folders The domain syncs with Azure AD by using Azure AD Connect Azure AD Connect has group writeback enabled.

You have a Microsoft 365 subscription that uses Microsoft SharePoint Online.

You have multiple project teams. Each team has an AD DS group that syncs with Azure AD Each group has permissions to a unique SharePoint Online site and a Windows Server shared folder for its project. Users routinely move between project teams.

You need to recommend an Azure AD identity Governance solution that meets the following requirements:

* Project managers must verify that their project group contains only the current members of their project team

* The members of each project team must only have access to the resources of the project to which they are assigned

* Users must be removed from a project group automatically if the project manager has MOT verified the group s membership for 30 days.

* Administrative effort must be minimized.

What should you include in the recommendation? To answer select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 136
Correct answer: Question 136

You are designing a security operations strategy based on the Zero Trust framework.

You need to minimize the operational load on Tier 1 Microsoft Security Operations Center (SOC) analysts.

What should you do?

A.

Enable built-in compliance policies in Azure Policy.

A.

Enable built-in compliance policies in Azure Policy.

Answers
B.

Enable self-healing in Microsoft 365 Defender.

B.

Enable self-healing in Microsoft 365 Defender.

Answers
C.

Automate data classification.

C.

Automate data classification.

Answers
D.

Create hunting queries in Microsoft 365 Defender.

D.

Create hunting queries in Microsoft 365 Defender.

Answers
Suggested answer: C

You have an Azure AD tenant that syncs with an Active Directory Domain Services (AD DS) domain.

You are designing an Azure DevOps solution to deploy applications to an Azure subscription by using continuous integration and continuous deployment (CI/CD) pipelines.

You need to recommend which types of identities to use for the deployment credentials of the service connection. The solution must follow DevSecOps best practices from the Microsoft Cloud Adoption Framework for Azure.

What should you recommend?

A.

an Azure AD user account that has a password stored in Azure Key Vault

A.

an Azure AD user account that has a password stored in Azure Key Vault

Answers
B.

a group managed service account (gMSA)

B.

a group managed service account (gMSA)

Answers
C.

an Azure AD user account that has role assignments in Azure AD Privileged Identity Management {PIM)

C.

an Azure AD user account that has role assignments in Azure AD Privileged Identity Management {PIM)

Answers
D.

a managed identity in Azure

D.

a managed identity in Azure

Answers
Suggested answer: D

DRAG DROP

Your company wants to optimize ransomware incident investigations.

You need to recommend a plan to investigate ransomware incidents based on the Microsoft Detection and Response Team (DART) approach.

Which three actions should you recommend performing in sequence in the plan? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Question 139
Correct answer: Question 139

Explanation:

Assess teh current situation and identity the scope.

Identity which line-of-business (LOB) apps are unavailable due to ransomware incident.

Identity the compromise recovery process.


HOTSPOT

You have an Azure subscription and an on-premises datacenter. The datacenter contains 100 servers that run Windows Server. AJI the servers are backed up to a Recovery Services vault by using Azure Backup and the Microsoft Azure Recovery Services (MARS) agent.

You need to design a recovery solution for ransomware attacks that encrypt the on-premises servers. The solution must follow Microsoft Security Best Practices and protect against the following risks:

* A compromised administrator account used to delete the backups from Azure Backup before encrypting the servers

* A compromised administrator account used to disable the backups on the MARS agent before encrypting the servers

What should you use for each risk? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point


Question 140
Correct answer: Question 140
Total 177 questions
Go to page: of 18