ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are authenticated by using access keys. You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts. The solution must minimize the impact on the legacy applications. What should you include in the recommendation?

A.

Apply read-only locks on the storage accounts.

A.

Apply read-only locks on the storage accounts.

Answers
B.

Set the AllowSharcdKeyAccess property to false.

B.

Set the AllowSharcdKeyAccess property to false.

Answers
C.

Set the AllowBlobPublicAcccss property to false.

C.

Set the AllowBlobPublicAcccss property to false.

Answers
D.

Configure automated key rotation.

D.

Configure automated key rotation.

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources

Azure subscription that uses Azure Storage.

The company plans to share specific blobs with vendors. You need to recommend a solution to provide the vendors with secure access to specific blobs without exposing the blobs publicly. The access must be t\me-Vim\ted. What should you include in the recommendation?

A.

Create shared access signatures (SAS).

A.

Create shared access signatures (SAS).

Answers
B.

Share the connection string of the access key.

B.

Share the connection string of the access key.

Answers
C.

Configure private link connections.

C.

Configure private link connections.

Answers
D.

Configure encryption by using customer-managed keys (CMKs)

D.

Configure encryption by using customer-managed keys (CMKs)

Answers
Suggested answer: D

You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

Enable Microsoft Defender for Cosmos DB.

A.

Enable Microsoft Defender for Cosmos DB.

Answers
B.

Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.

B.

Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.

Answers
C.

Disable local authentication for Azure Cosmos DB.

C.

Disable local authentication for Azure Cosmos DB.

Answers
D.

Enable Microsoft Defender for Identity.

D.

Enable Microsoft Defender for Identity.

Answers
E.

Send the Azure Cosmos DB logs to a Log Analytics workspace.

E.

Send the Azure Cosmos DB logs to a Log Analytics workspace.

Answers
Suggested answer: B, C

Explanation:


You need to design a solution to provide administrators with secure remote access to the virtual machines. The solution must meet the following requirements:

• Prevent the need to enable ports 3389 and 22 from the internet.

• Only provide permission to connect the virtual machines when required.

• Ensure that administrators use the Azure portal to connect to the virtual machines.

Which two actions should you include in the solution? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

Enable Azure Active Directory (Azure AD) Privileged Identity Management (PIM) roles as virtual machine contributors.

A.

Enable Azure Active Directory (Azure AD) Privileged Identity Management (PIM) roles as virtual machine contributors.

Answers
B.

Configure Azure VPN Gateway.

B.

Configure Azure VPN Gateway.

Answers
C.

Enable Just Enough Administration (JEA).

C.

Enable Just Enough Administration (JEA).

Answers
D.

Enable just-in-time (JIT) VM access.

D.

Enable just-in-time (JIT) VM access.

Answers
E.

Configure Azure Bastion.

E.

Configure Azure Bastion.

Answers
Suggested answer: D, E

Explanation:

https://docs.microsoft.com/en- us/powershell/scripting/learn/remoting/jea/overview?view=powershell-7.2 https://docs.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles

Your company is designing an application architecture for Azure App Service Environment (ASE) web apps as shown in the exhibit. (Click the Exhibit tab.)

Communication between the on-premises network and Azure uses an ExpressRoute connection.

You need to recommend a solution to ensure that the web apps can communicate with the onpremises application server. The solution must minimize the number of public IP addresses that are allowed to access the on-premises network. What should you include in the recommendation?

A.

Azure Traffic Manager with priority traffic-routing methods

A.

Azure Traffic Manager with priority traffic-routing methods

Answers
B.

Azure Application Gateway v2 with user-defined routes (UDRs).

B.

Azure Application Gateway v2 with user-defined routes (UDRs).

Answers
C.

Azure Front Door with Azure Web Application Firewall (WAF)

C.

Azure Front Door with Azure Web Application Firewall (WAF)

Answers
D.

Azure Firewall with policy rule sets

D.

Azure Firewall with policy rule sets

Answers
Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/azure/web-application-firewall/afds/afds-overview

You have Windows 11 devices and Microsoft 365 E5 licenses.

You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites. What should you include in the recommendation?

A.

Microsoft Endpoint Manager

A.

Microsoft Endpoint Manager

Answers
B.

Compliance Manager

B.

Compliance Manager

Answers
C.

Microsoft Defender for Cloud Apps

C.

Microsoft Defender for Cloud Apps

Answers
D.

Microsoft Defender for Endpoint

D.

Microsoft Defender for Endpoint

Answers
Suggested answer: D

Explanation:

ttps://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-content- filtering?view=o365-worldwide#configure-web-content-filtering-policies

Your company plans to move all on-premises virtual machines to Azure. A network engineer proposes the Azure virtual network design shown in the following table.

You need to recommend an Azure Bastion deployment to provide secure remote access to all the virtual machines. Based on the virtual network design, how many Azure Bastion subnets are required?

A.

1

A.

1

Answers
B.

2

B.

2

Answers
C.

3

C.

3

Answers
D.

4

D.

4

Answers
E.

5

E.

5

Answers
Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/azure/bastion/vnet-peering https://docs.microsoft.com/en-us/learn/modules/connect-vm-with-azure-bastion/2-what-is-azure- bastion

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You need to enforce ISO 2700V2013 standards for the subscription. The solution must ensure that noncompliant resources are remediated automatically. What should you use?

A.

the regulatory compliance dashboard in Defender for Cloud

A.

the regulatory compliance dashboard in Defender for Cloud

Answers
B.

Azure Policy

B.

Azure Policy

Answers
C.

Azure Blueprints

C.

Azure Blueprints

Answers
D.

Azure role-based access control (Azure RBAC)

D.

Azure role-based access control (Azure RBAC)

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/governance/blueprints/samples/iso27001-shared/control-mapping https://docs.microsoft.com/en-us/azure/defender-for-cloud/release-notes-archive https://docs.microsoft.com/en-us/azure/defender-for-cloud/prevent-misconfigurations

You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.)

After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?

A.

Storage account public access should be disallowed

A.

Storage account public access should be disallowed

Answers
B.

Azure Key Vault Managed HSM should have purge protection enabled

B.

Azure Key Vault Managed HSM should have purge protection enabled

Answers
C.

Storage accounts should prevent shared key access

C.

Storage accounts should prevent shared key access

Answers
D.

Storage account keys should not be expired

D.

Storage account keys should not be expired

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent

Your company is preparing for cloud adoption.

You are designing security for Azure landing zones.

Which two preventative controls can you implement to increase the secure score? Each NOTE: Each correct selection is worth one point.

A.

Azure Firewall

A.

Azure Firewall

Answers
B.

Azure Web Application Firewall (WAF)

B.

Azure Web Application Firewall (WAF)

Answers
C.

Microsoft Defender for Cloud alerts

C.

Microsoft Defender for Cloud alerts

Answers
D.

Azure Active Directory (Azure AD Privileged Identity Management (PIM)

D.

Azure Active Directory (Azure AD Privileged Identity Management (PIM)

Answers
E.

Microsoft Sentinel

E.

Microsoft Sentinel

Answers
Suggested answer: A, B

Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls

Total 177 questions
Go to page: of 18