ExamGecko
Home / Microsoft / SC-100 / List of questions
Ask Question

Microsoft SC-100 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

You are designing security for an Azure landing zone. Your company identifies the following compliance and privacy requirements:

β€’ Encrypt cardholder data by using encryption keys managed by the company.

β€’ Encrypt insurance claim files by using encryption keys hosted on-premises.

Which two configurations meet the compliance and privacy requirements? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.

Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.

Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM

Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM

Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HSM.

Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HSM.

Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed Keys.

Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed Keys.

Suggested answer: A, C
Explanation:

https://azure.microsoft.com/en-us/blog/customer-provided-keys-with-azure-storage-service- encryption/

asked 05/10/2024
Paramdeep Saini
45 questions

Question 32

Report Export Collapse

Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud.

You receive the following recommendations in Defender for Cloud

β€’ Access to storage accounts with firewall and virtual network configurations should be restricted,

β€’ Storage accounts should restrict network access using virtual network rules.

β€’ Storage account should use a private link connection.

β€’ Storage account public access should be disallowed.

You need to recommend a service to mitigate identified risks that relate to the recommendations.

What should you recommend?

Azure Storage Analytics

Azure Storage Analytics

Azure Network Watcher

Azure Network Watcher

Microsoft Sentinel

Microsoft Sentinel

Azure Policy

Azure Policy

Suggested answer: D
Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/security-policy-concept https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/storage-security-baseline

asked 05/10/2024
Josef Anwar Panerio
40 questions

Question 33

Report Export Collapse

You have 50 Azure subscriptions.

You need to monitor resource in the subscriptions for compliance with the ISO 27001:2013 standards. The solution must minimize the effort required to modify the list of monitored policy definitions for the subscriptions. NOTE: Each correct selection is worth one point.

Assign an initiative to a management group.

Assign an initiative to a management group.

Assign a policy to each subscription.

Assign a policy to each subscription.

Assign a policy to a management group.

Assign a policy to a management group.

Assign an initiative to each subscription.

Assign an initiative to each subscription.

Assign a blueprint to each subscription.

Assign a blueprint to each subscription.

Assign a blueprint to a management group.

Assign a blueprint to a management group.

Suggested answer: A, F
Explanation:

https://docs.microsoft.com/en-us/azure/governance/management-groups/overview https://docs.microsoft.com/en-us/azure/governance/blueprints/overview https://docs.microsoft.com/en-us/azure/governance/policy/samples/iso-27001 https://docs.microsoft.com/en-us/azure/governance/policy/tutorials/create-and-manage

asked 05/10/2024
Joseph Martin
34 questions

Question 34

Report Export Collapse

Your company has a Microsoft 365 E5 subscription. The company wants to identify and classify data in Microsoft Teams, SharePoint Online, and Exchange Online. You need to recommend a solution to identify documents that contain sensitive information. What should you include in the recommendation?

data classification content explorer

data classification content explorer

data loss prevention (DLP)

data loss prevention (DLP)

eDiscovery

eDiscovery

Information Governance

Information Governance

Suggested answer: B
asked 05/10/2024
Nick Sheremet
29 questions

Question 35

Report Export Collapse

Your company is developing an invoicing application that will use Azure Active Directory (Azure AD) B2C. The application will be deployed as an App Service web app. You need to recommend a solution to the application development team to secure the application from identity related attacks. Which two configurations should you recommend? Each correct answer presents part of the solution. NOTE:

Each correct selection is worth one point.

Azure AD Conditional Access integration with user flows and custom policies

Azure AD Conditional Access integration with user flows and custom policies

Azure AD workbooks to monitor risk detections

Azure AD workbooks to monitor risk detections

custom resource owner password credentials (ROPC) flows in Azure AD B2C

custom resource owner password credentials (ROPC) flows in Azure AD B2C

access packages in Identity Governance

access packages in Identity Governance

smart account lockout in Azure AD B2C

smart account lockout in Azure AD B2C

Suggested answer: A, C
Explanation:

https://docs.microsoft.com/en-us/azure/active-directory-b2c/threat-management https://docs.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-user- flow?pivots=b2c-user-flow

asked 05/10/2024
Mary Andreou
50 questions

Question 36

Report Export Collapse

Your company has a Microsoft 365 E5 subscription.

Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications. What should you recommend using to prevent the PHI from being shared outside the company?

insider risk management policies

insider risk management policies

data loss prevention (DLP) policies

data loss prevention (DLP) policies

sensitivity label policies

sensitivity label policies

retention policies

retention policies

Suggested answer: C
Explanation:

https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp- policy?view=o365-worldwide

asked 05/10/2024
Santosh Kumar
45 questions

Question 37

Report Export Collapse

You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities?

Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Linux containers deployed to Azure Container Registry

Linux containers deployed to Azure Container Registry

Linux containers deployed to Azure Kubernetes Service (AKS)

Linux containers deployed to Azure Kubernetes Service (AKS)

Windows containers deployed to Azure Container Registry

Windows containers deployed to Azure Container Registry

Windows containers deployed to Azure Kubernetes Service (AKS)

Windows containers deployed to Azure Kubernetes Service (AKS)

Linux containers deployed to Azure Container Instances

Linux containers deployed to Azure Container Instances

Suggested answer: A, C
Explanation:

https://docs.microsoft.com/en-us/learn/modules/design-strategy-for-secure-paas-iaas-saas- services/9-specify-security-requirements-for-containers https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-introduction#view-vulnerabilities-for-running-images

asked 05/10/2024
Dennis Valencia
41 questions

Question 38

Report Export Collapse

Your company has an on-premises network and an Azure subscription.

The company does NOT have a Site-to-Site VPN or an ExpressRoute connection to Azure.

You are designing the security standards for Azure App Service web apps. The web apps will access Microsoft SQL Server databases on the network. You need to recommend security standards that will allow the web apps to access the databases. The solution must minimize the number of open internet-accessible endpoints to the on-premises network. What should you include in the recommendation?

a private endpoint

a private endpoint

hybrid connections

hybrid connections

virtual network NAT gateway integration

virtual network NAT gateway integration

virtual network integration

virtual network integration

Suggested answer: B
Explanation:

https://docs.microsoft.com/en-us/azure/app-service/app-service-hybrid-connections

asked 05/10/2024
Ahmad Khader
29 questions

Question 39

Report Export Collapse

Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription. The company's on-premises network contains internal web apps that use Kerberos authentication.

Currently, the web apps are accessible only from the network.

You have remote users who have personal devices that run Windows 11.

You need to recommend a solution to provide the remote users with the ability to access the web apps. The solution must meet the following requirements:

β€’ Prevent the remote users from accessing any other resources on the network.

β€’ Support Azure Active Directory (Azure AD) Conditional Access.

β€’ Simplify the end-user experience.

What should you include in the recommendation?

Azure AD Application Proxy

Azure AD Application Proxy

Azure Virtual WAN

Azure Virtual WAN

Microsoft Tunnel

Microsoft Tunnel

web content filtering in Microsoft Defender for Endpoint

web content filtering in Microsoft Defender for Endpoint

Suggested answer: A
Explanation:

https://docs.microsoft.com/en-us/learn/modules/configure-azure-ad-application-proxy/2-explore

asked 05/10/2024
Biji Abraham
44 questions

Question 40

Report Export Collapse

Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk. You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. What should you include in the recommendation?

Azure Event Hubs

Azure Event Hubs

Azure Data Factor

Azure Data Factor

a Microsoft Sentinel workbook

a Microsoft Sentinel workbook

a Microsoft Sentinel data connector

a Microsoft Sentinel data connector

Suggested answer: D
Explanation:

https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/azure-sentinel-side-by-side-with- splunk-via-eventhub/ba-p/2307029

asked 05/10/2024
alex aguirre
46 questions
Total 200 questions
Go to page: of 20
Search

Related questions