ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Security Assertion Markup Language (SAML)

A.

Security Assertion Markup Language (SAML)

Answers
B.

NTLMv2

B.

NTLMv2

Answers
C.

certificate-based authentication

C.

certificate-based authentication

Answers
D.

Kerberos

D.

Kerberos

Answers
Suggested answer: A, D

You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements. What should you configure for each landing zone?

A.

Azure DDoS Protection Standard

A.

Azure DDoS Protection Standard

Answers
B.

an Azure Private DNS zone

B.

an Azure Private DNS zone

Answers
C.

Microsoft Defender for Cloud

C.

Microsoft Defender for Cloud

Answers
D.

an ExpressRoute gateway

D.

an ExpressRoute gateway

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure- single-sign-on-on-premises-apps https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure- single-sign-on-with-kcd

https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure- custom-domain

HOTSPOT

You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer are a. NOTE; Each correct selection is worth one point.


Question 13
Correct answer: Question 13

Explanation:

1. Azure AD Identity Protection

Brute Force Detection: https://docs.microsoft.com/en-us/azure/active-directory/identity- protection/overview-identity-protection 2. Defender for Identity

MDI can detect brute force attacks: ref: https://docs.microsoft.com/en-us/defender-for- identity/compromised-credentials-alerts#suspected-brute-force-attack-ldap-external-id-2004

HOTSPOT

You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE:

Each correct selection is worth one point.


Question 14
Correct answer: Question 14

HOTSPOT

You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 15
Correct answer: Question 15

HOTSPOT

You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements. What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 16
Correct answer: Question 16

HOTSPOT

You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.


Question 17
Correct answer: Question 17

Explanation:

Box 1: Virtual Network Integration - correct Virtual network integration gives your app access to resources in your virtual network, but it doesn't grant inbound private access to your app from the virtual network. Box 2: Private Endpoints. - correct You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access the app over Private Link.

HOTSPOT

You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements. What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 18
Correct answer: Question 18

You need to design a strategy for securing the SharePoint Online and Exchange Online dat a. The solution must meet the application security requirements. Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.

A.

Azure AD Conditional Access

A.

Azure AD Conditional Access

Answers
B.

Microsoft Defender for Cloud Apps

B.

Microsoft Defender for Cloud Apps

Answers
C.

Microsoft Defender for Cloud

C.

Microsoft Defender for Cloud

Answers
D.

Microsoft Defender for Endpoint

D.

Microsoft Defender for Endpoint

Answers
E.

access reviews in Azure AD

E.

access reviews in Azure AD

Answers
Suggested answer: A, B

Explanation:

https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional- access-session#conditional-access-application-control

https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-integrate- with-microsoft-cloud-application-security

Your company has on-premises Microsoft SQL Server databases.

The company plans to move the databases to Azure.

You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive data by using dynamic data masking. The solution must minimize costs. What should you include in the recommendation?

A.

Azure SQL Managed Instance

A.

Azure SQL Managed Instance

Answers
B.

Azure Synapse Analytics dedicated SQL pools

B.

Azure Synapse Analytics dedicated SQL pools

Answers
C.

Azure SQL Database

C.

Azure SQL Database

Answers
D.

SQL Server on Azure Virtual Machines

D.

SQL Server on Azure Virtual Machines

Answers
Suggested answer: C
Total 177 questions
Go to page: of 18