ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











For of an Azure deployment you are designing a security architecture based on the Microsoft Cloud Security Benchmark. You need to recommend a best practice for implementing service accounts for Azure API management What should you include in the recommendation?

A.

device registrations in Azure AD

A.

device registrations in Azure AD

Answers
B.

application registrations m Azure AD

B.

application registrations m Azure AD

Answers
C.

Azure service principals with certificate credentials

C.

Azure service principals with certificate credentials

Answers
D.

Azure service principals with usernames and passwords

D.

Azure service principals with usernames and passwords

Answers
E.

managed identities in Azure

E.

managed identities in Azure

Answers
Suggested answer: E

HOTSPOT

You have a Microsoft 365 subscription that is protected by using Microsoft 365 Defender

You are designing a security operations strategy that will use Microsoft Sentinel to monitor events from Microsoft 365 and Microsoft 365 Defender

You need to recommend a solution to meet the following requirements:

* Integrate Microsoft Sentinel with a third-party security vendor to access information about known malware

* Automatically generate incidents when the IP address of a command-and control server is detected in the events

What should you configure in Microsoft Sentinel to meet each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 142
Correct answer: Question 142

You have an Azure subscription that contains a Microsoft Sentinel workspace.

Your on-premises network contains firewalls that support forwarding event logs m the Common Event Format (CEF). There is no built-in Microsoft Sentinel connector for the firewalls

You need to recommend a solution to ingest events from the firewalls into Microsoft Sentinel.

What should you include m the recommendation?

A.

an Azure logic app

A.

an Azure logic app

Answers
B.

an on-premises Syslog server

B.

an on-premises Syslog server

Answers
C.

an on-premises data gateway

C.

an on-premises data gateway

Answers
D.

Azure Data Factory

D.

Azure Data Factory

Answers
Suggested answer: B

You have a Microsoft 365 tenant. Your company uses a third-party software as a service (SaaS) app named App1. App1 supports authenticating users by using Azure AO credentials. You need to recommend a solution to enable users to authenticate to App1 by using their Azure AD credentials. What should you include in the recommendation?

A.

an Azure AD enterprise application

A.

an Azure AD enterprise application

Answers
B.

a retying party trust in Active Directory Federation Services (AD FS)

B.

a retying party trust in Active Directory Federation Services (AD FS)

Answers
C.

Azure AD Application Proxy

C.

Azure AD Application Proxy

Answers
D.

Azure AD B2C

D.

Azure AD B2C

Answers
Suggested answer: A

You are designing a ransomware response plan that follows Microsoft Security Best Practices.

You need to recommend a solution to minimize the risk of a ransomware attack encrypting local user files.

What should you include in the recommendation?

A.

Microsoft Defender for Endpoint

A.

Microsoft Defender for Endpoint

Answers
B.

Windows Defender Device Guard

B.

Windows Defender Device Guard

Answers
C.

protected folders

C.

protected folders

Answers
D.

Azure Files

D.

Azure Files

Answers
E.

BitLocker Drive Encryption (BitLocker)

E.

BitLocker Drive Encryption (BitLocker)

Answers
Suggested answer: C

Explanation:


You have a Microsoft 365 subscription.

You need to design a solution to block file downloads from Microsoft SharePoint Online by authenticated users on unmanaged devices.

Which two services should you include in the solution? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Microsoft Defender for Cloud Apps

A.

Microsoft Defender for Cloud Apps

Answers
B.

Azure AD Application Proxy

B.

Azure AD Application Proxy

Answers
C.

Azure Data Catalog

C.

Azure Data Catalog

Answers
D.

Azure AD Conditional Access

D.

Azure AD Conditional Access

Answers
E.

Microsoft Purview Information Protection

E.

Microsoft Purview Information Protection

Answers
Suggested answer: A, D

You have an Azure subscription.

Your company has a governance requirement that resources must be created in the West Europe or North Europe Azure regions.

What should you recommend using to enforce the governance requirement?

A.

regulatory compliance standards in Microsoft Defender for Cloud

A.

regulatory compliance standards in Microsoft Defender for Cloud

Answers
B.

custom Azure roles

B.

custom Azure roles

Answers
C.

Azure Policy assignments

C.

Azure Policy assignments

Answers
D.

Azure management groups

D.

Azure management groups

Answers
Suggested answer: C

You have a Microsoft 365 tenant.

Your company uses a third-party software as a service (SaaS) app named App1 that is integrated with an Azure AD tenant. You need to design a security strategy to meet the following requirements:

* Users must be able to request access to App1 by using a self-service request.

* When users request access to App1, they must be prompted to provide additional information about their request.

* Every three months, managers must verify that the users still require access to Appl.

What should you include in the design?

A.

Azure AD Application Proxy

A.

Azure AD Application Proxy

Answers
B.

connected apps in Microsoft Defender for Cloud Apps

B.

connected apps in Microsoft Defender for Cloud Apps

Answers
C.

Microsoft Entra Identity Governance

C.

Microsoft Entra Identity Governance

Answers
D.

access policies in Microsoft Defender for Cloud Apps

D.

access policies in Microsoft Defender for Cloud Apps

Answers
Suggested answer: C

DRAG DROP

You have a hybrid Azure AD tenant that has pass-through authentication enabled.

You are designing an identity security strategy.

You need to minimize the impact of brute force password attacks and leaked credentials of hybrid identities.

What should you include in the design? To answer, drag the appropriate features to the correct requirements. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 149
Correct answer: Question 149

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Exchange Online.

You need to recommend a solution to prevent malicious actors from impersonating the email addresses of internal senders.

What should you include in the recommendation? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 150
Correct answer: Question 150
Total 177 questions
Go to page: of 18