ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











You are designing security for an Azure landing zone. Your company identifies the following compliance and privacy requirements:

• Encrypt cardholder data by using encryption keys managed by the company.

• Encrypt insurance claim files by using encryption keys hosted on-premises.

Which two configurations meet the compliance and privacy requirements? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.

A.

Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.

Answers
B.

Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM

B.

Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM

Answers
C.

Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HSM.

C.

Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HSM.

Answers
D.

Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed Keys.

D.

Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed Keys.

Answers
Suggested answer: A, C

Explanation:

https://azure.microsoft.com/en-us/blog/customer-provided-keys-with-azure-storage-service- encryption/

Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud.

You receive the following recommendations in Defender for Cloud

• Access to storage accounts with firewall and virtual network configurations should be restricted,

• Storage accounts should restrict network access using virtual network rules.

• Storage account should use a private link connection.

• Storage account public access should be disallowed.

You need to recommend a service to mitigate identified risks that relate to the recommendations.

What should you recommend?

A.

Azure Storage Analytics

A.

Azure Storage Analytics

Answers
B.

Azure Network Watcher

B.

Azure Network Watcher

Answers
C.

Microsoft Sentinel

C.

Microsoft Sentinel

Answers
D.

Azure Policy

D.

Azure Policy

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/security-policy-concept https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/storage-security-baseline

You have 50 Azure subscriptions.

You need to monitor resource in the subscriptions for compliance with the ISO 27001:2013 standards. The solution must minimize the effort required to modify the list of monitored policy definitions for the subscriptions. NOTE: Each correct selection is worth one point.

A.

Assign an initiative to a management group.

A.

Assign an initiative to a management group.

Answers
B.

Assign a policy to each subscription.

B.

Assign a policy to each subscription.

Answers
C.

Assign a policy to a management group.

C.

Assign a policy to a management group.

Answers
D.

Assign an initiative to each subscription.

D.

Assign an initiative to each subscription.

Answers
E.

Assign a blueprint to each subscription.

E.

Assign a blueprint to each subscription.

Answers
F.

Assign a blueprint to a management group.

F.

Assign a blueprint to a management group.

Answers
Suggested answer: A, F

Explanation:

https://docs.microsoft.com/en-us/azure/governance/management-groups/overview https://docs.microsoft.com/en-us/azure/governance/blueprints/overview https://docs.microsoft.com/en-us/azure/governance/policy/samples/iso-27001 https://docs.microsoft.com/en-us/azure/governance/policy/tutorials/create-and-manage

Your company has a Microsoft 365 E5 subscription. The company wants to identify and classify data in Microsoft Teams, SharePoint Online, and Exchange Online. You need to recommend a solution to identify documents that contain sensitive information. What should you include in the recommendation?

A.

data classification content explorer

A.

data classification content explorer

Answers
B.

data loss prevention (DLP)

B.

data loss prevention (DLP)

Answers
C.

eDiscovery

C.

eDiscovery

Answers
D.

Information Governance

D.

Information Governance

Answers
Suggested answer: B

Your company is developing an invoicing application that will use Azure Active Directory (Azure AD) B2C. The application will be deployed as an App Service web app. You need to recommend a solution to the application development team to secure the application from identity related attacks. Which two configurations should you recommend? Each correct answer presents part of the solution. NOTE:

Each correct selection is worth one point.

A.

Azure AD Conditional Access integration with user flows and custom policies

A.

Azure AD Conditional Access integration with user flows and custom policies

Answers
B.

Azure AD workbooks to monitor risk detections

B.

Azure AD workbooks to monitor risk detections

Answers
C.

custom resource owner password credentials (ROPC) flows in Azure AD B2C

C.

custom resource owner password credentials (ROPC) flows in Azure AD B2C

Answers
D.

access packages in Identity Governance

D.

access packages in Identity Governance

Answers
E.

smart account lockout in Azure AD B2C

E.

smart account lockout in Azure AD B2C

Answers
Suggested answer: A, C

Explanation:

https://docs.microsoft.com/en-us/azure/active-directory-b2c/threat-management https://docs.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-user- flow?pivots=b2c-user-flow

Your company has a Microsoft 365 E5 subscription.

Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications. What should you recommend using to prevent the PHI from being shared outside the company?

A.

insider risk management policies

A.

insider risk management policies

Answers
B.

data loss prevention (DLP) policies

B.

data loss prevention (DLP) policies

Answers
C.

sensitivity label policies

C.

sensitivity label policies

Answers
D.

retention policies

D.

retention policies

Answers
Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp- policy?view=o365-worldwide

You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities?

Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Linux containers deployed to Azure Container Registry

A.

Linux containers deployed to Azure Container Registry

Answers
B.

Linux containers deployed to Azure Kubernetes Service (AKS)

B.

Linux containers deployed to Azure Kubernetes Service (AKS)

Answers
C.

Windows containers deployed to Azure Container Registry

C.

Windows containers deployed to Azure Container Registry

Answers
D.

Windows containers deployed to Azure Kubernetes Service (AKS)

D.

Windows containers deployed to Azure Kubernetes Service (AKS)

Answers
E.

Linux containers deployed to Azure Container Instances

E.

Linux containers deployed to Azure Container Instances

Answers
Suggested answer: A, C

Explanation:

https://docs.microsoft.com/en-us/learn/modules/design-strategy-for-secure-paas-iaas-saas- services/9-specify-security-requirements-for-containers https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-introduction#view-vulnerabilities-for-running-images

Your company has an on-premises network and an Azure subscription.

The company does NOT have a Site-to-Site VPN or an ExpressRoute connection to Azure.

You are designing the security standards for Azure App Service web apps. The web apps will access Microsoft SQL Server databases on the network. You need to recommend security standards that will allow the web apps to access the databases. The solution must minimize the number of open internet-accessible endpoints to the on-premises network. What should you include in the recommendation?

A.

a private endpoint

A.

a private endpoint

Answers
B.

hybrid connections

B.

hybrid connections

Answers
C.

virtual network NAT gateway integration

C.

virtual network NAT gateway integration

Answers
D.

virtual network integration

D.

virtual network integration

Answers
Suggested answer: B

Explanation:

https://docs.microsoft.com/en-us/azure/app-service/app-service-hybrid-connections

Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription. The company's on-premises network contains internal web apps that use Kerberos authentication.

Currently, the web apps are accessible only from the network.

You have remote users who have personal devices that run Windows 11.

You need to recommend a solution to provide the remote users with the ability to access the web apps. The solution must meet the following requirements:

• Prevent the remote users from accessing any other resources on the network.

• Support Azure Active Directory (Azure AD) Conditional Access.

• Simplify the end-user experience.

What should you include in the recommendation?

A.

Azure AD Application Proxy

A.

Azure AD Application Proxy

Answers
B.

Azure Virtual WAN

B.

Azure Virtual WAN

Answers
C.

Microsoft Tunnel

C.

Microsoft Tunnel

Answers
D.

web content filtering in Microsoft Defender for Endpoint

D.

web content filtering in Microsoft Defender for Endpoint

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/learn/modules/configure-azure-ad-application-proxy/2-explore

Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk. You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. What should you include in the recommendation?

A.

Azure Event Hubs

A.

Azure Event Hubs

Answers
B.

Azure Data Factor

B.

Azure Data Factor

Answers
C.

a Microsoft Sentinel workbook

C.

a Microsoft Sentinel workbook

Answers
D.

a Microsoft Sentinel data connector

D.

a Microsoft Sentinel data connector

Answers
Suggested answer: D

Explanation:

https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/azure-sentinel-side-by-side-with- splunk-via-eventhub/ba-p/2307029

Total 177 questions
Go to page: of 18