ExamGecko
Home / Microsoft / SC-100 / List of questions
Ask Question

Microsoft SC-100 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are authenticated by using access keys. You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts. The solution must minimize the impact on the legacy applications. What should you include in the recommendation?

Apply read-only locks on the storage accounts.

Apply read-only locks on the storage accounts.

Set the AllowSharcdKeyAccess property to false.

Set the AllowSharcdKeyAccess property to false.

Set the AllowBlobPublicAcccss property to false.

Set the AllowBlobPublicAcccss property to false.

Configure automated key rotation.

Configure automated key rotation.

Suggested answer: A
Explanation:

https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources

asked 05/10/2024
Michael Geary
42 questions

Question 22

Report Export Collapse

Azure subscription that uses Azure Storage.

The company plans to share specific blobs with vendors. You need to recommend a solution to provide the vendors with secure access to specific blobs without exposing the blobs publicly. The access must be t\me-Vim\ted. What should you include in the recommendation?

Create shared access signatures (SAS).

Create shared access signatures (SAS).

Share the connection string of the access key.

Share the connection string of the access key.

Configure private link connections.

Configure private link connections.

Configure encryption by using customer-managed keys (CMKs)

Configure encryption by using customer-managed keys (CMKs)

Suggested answer: D
asked 05/10/2024
Carlos Eduardo Araujo Fonseca
45 questions

Question 23

Report Export Collapse

You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Enable Microsoft Defender for Cosmos DB.

Enable Microsoft Defender for Cosmos DB.

Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.

Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.

Disable local authentication for Azure Cosmos DB.

Disable local authentication for Azure Cosmos DB.

Enable Microsoft Defender for Identity.

Enable Microsoft Defender for Identity.

Send the Azure Cosmos DB logs to a Log Analytics workspace.

Send the Azure Cosmos DB logs to a Log Analytics workspace.

Suggested answer: B, C
Explanation:


asked 05/10/2024
Firasat Siddiqui
49 questions

Question 24

Report Export Collapse

You need to design a solution to provide administrators with secure remote access to the virtual machines. The solution must meet the following requirements:

β€’ Prevent the need to enable ports 3389 and 22 from the internet.

β€’ Only provide permission to connect the virtual machines when required.

β€’ Ensure that administrators use the Azure portal to connect to the virtual machines.

Which two actions should you include in the solution? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Enable Azure Active Directory (Azure AD) Privileged Identity Management (PIM) roles as virtual machine contributors.

Enable Azure Active Directory (Azure AD) Privileged Identity Management (PIM) roles as virtual machine contributors.

Configure Azure VPN Gateway.

Configure Azure VPN Gateway.

Enable Just Enough Administration (JEA).

Enable Just Enough Administration (JEA).

Enable just-in-time (JIT) VM access.

Enable just-in-time (JIT) VM access.

Configure Azure Bastion.

Configure Azure Bastion.

Suggested answer: D, E
Explanation:

https://docs.microsoft.com/en- us/powershell/scripting/learn/remoting/jea/overview?view=powershell-7.2 https://docs.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles

asked 05/10/2024
James Davis
46 questions

Question 25

Report Export Collapse

Your company is designing an application architecture for Azure App Service Environment (ASE) web apps as shown in the exhibit. (Click the Exhibit tab.)

Microsoft SC-100 image Question 6 107617 10052024010833000000

Communication between the on-premises network and Azure uses an ExpressRoute connection.

You need to recommend a solution to ensure that the web apps can communicate with the onpremises application server. The solution must minimize the number of public IP addresses that are allowed to access the on-premises network. What should you include in the recommendation?

Azure Traffic Manager with priority traffic-routing methods

Azure Traffic Manager with priority traffic-routing methods

Azure Application Gateway v2 with user-defined routes (UDRs).

Azure Application Gateway v2 with user-defined routes (UDRs).

Azure Front Door with Azure Web Application Firewall (WAF)

Azure Front Door with Azure Web Application Firewall (WAF)

Azure Firewall with policy rule sets

Azure Firewall with policy rule sets

Suggested answer: C
Explanation:

https://docs.microsoft.com/en-us/azure/web-application-firewall/afds/afds-overview

asked 05/10/2024
Tillmon, Quinton
41 questions

Question 26

Report Export Collapse

You have Windows 11 devices and Microsoft 365 E5 licenses.

You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites. What should you include in the recommendation?

Microsoft Endpoint Manager

Microsoft Endpoint Manager

Compliance Manager

Compliance Manager

Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint

Suggested answer: D
Explanation:

ttps://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-content- filtering?view=o365-worldwide#configure-web-content-filtering-policies

asked 05/10/2024
CCF AG Alexander Seidler
37 questions

Question 27

Report Export Collapse

Your company plans to move all on-premises virtual machines to Azure. A network engineer proposes the Azure virtual network design shown in the following table.

Microsoft SC-100 image Question 8 107619 10052024010833000000

You need to recommend an Azure Bastion deployment to provide secure remote access to all the virtual machines. Based on the virtual network design, how many Azure Bastion subnets are required?

1

1

2

2

3

3

4

4

5

5

Suggested answer: C
Explanation:

https://docs.microsoft.com/en-us/azure/bastion/vnet-peering https://docs.microsoft.com/en-us/learn/modules/connect-vm-with-azure-bastion/2-what-is-azure- bastion

asked 05/10/2024
Ilya Shadrin
44 questions

Question 28

Report Export Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You need to enforce ISO 2700V2013 standards for the subscription. The solution must ensure that noncompliant resources are remediated automatically. What should you use?

the regulatory compliance dashboard in Defender for Cloud

the regulatory compliance dashboard in Defender for Cloud

Azure Policy

Azure Policy

Azure Blueprints

Azure Blueprints

Azure role-based access control (Azure RBAC)

Azure role-based access control (Azure RBAC)

Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/governance/blueprints/samples/iso27001-shared/control-mapping https://docs.microsoft.com/en-us/azure/defender-for-cloud/release-notes-archive https://docs.microsoft.com/en-us/azure/defender-for-cloud/prevent-misconfigurations

asked 05/10/2024
Jermaine Wells
47 questions

Question 29

Report Export Collapse

You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.)

Microsoft SC-100 image Question 10 107621 10052024010833000000

After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?

Storage account public access should be disallowed

Storage account public access should be disallowed

Azure Key Vault Managed HSM should have purge protection enabled

Azure Key Vault Managed HSM should have purge protection enabled

Storage accounts should prevent shared key access

Storage accounts should prevent shared key access

Storage account keys should not be expired

Storage account keys should not be expired

Suggested answer: A
Explanation:

https://docs.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent

asked 05/10/2024
Angelica Caldeo
46 questions

Question 30

Report Export Collapse

Your company is preparing for cloud adoption.

You are designing security for Azure landing zones.

Which two preventative controls can you implement to increase the secure score? Each NOTE: Each correct selection is worth one point.

Azure Firewall

Azure Firewall

Azure Web Application Firewall (WAF)

Azure Web Application Firewall (WAF)

Microsoft Defender for Cloud alerts

Microsoft Defender for Cloud alerts

Azure Active Directory (Azure AD Privileged Identity Management (PIM)

Azure Active Directory (Azure AD Privileged Identity Management (PIM)

Microsoft Sentinel

Microsoft Sentinel

Suggested answer: A, B
Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls

asked 05/10/2024
Maurice Nicholson
35 questions
Total 200 questions
Go to page: of 20
Search

Related questions