ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription that has Microsoft Defender for Cloud enabled. You have an Amazon Web Services (AWS) implementation. You plan to extend the Azure security strategy to the AWS implementation. The solution will NOT use Azure Arc. Which three services can you use to provide security for the AWS resources? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

A.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Answers
B.

Azure Active Directory (Azure AD) Conditional Access

B.

Azure Active Directory (Azure AD) Conditional Access

Answers
C.

Microsoft Defender for servers

C.

Microsoft Defender for servers

Answers
D.

Azure Policy

D.

Azure Policy

Answers
E.

Microsoft Defender for Containers

E.

Microsoft Defender for Containers

Answers
Suggested answer: B, D, E

Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/supported-machines-endpoint- solutions-clouds-containers?tabs=aws-eks

You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the on-premises infrastructure to a cloud-only infrastructure. You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the administrative effort to maintain the infrastructure. Which identity service should you include in the recommendation?

A.

Azure Active Directory Domain Services (Azure AD DS)

A.

Azure Active Directory Domain Services (Azure AD DS)

Answers
B.

Azure Active Directory (Azure AD) B2C

B.

Azure Active Directory (Azure AD) B2C

Answers
C.

Azure Active Directory (Azure AD)

C.

Azure Active Directory (Azure AD)

Answers
D.

Active Directory Domain Services (AD DS)

D.

Active Directory Domain Services (AD DS)

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/azure/active-directory-domain-services/overview

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.

You need to recommend configurations to increase the score of the Secure management ports controls. Solution: You recommend enabling adaptive network hardening. Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:


You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.

You need to recommend configurations to increase the score of the Secure management ports controls. Solution: You recommend onboarding all virtual machines to Microsoft Defender for Endpoint.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend configuring gateway-required virtual network integration.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#restrict-access-to-a- specific-azure-front-door-instance

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend access restrictions to allow traffic from the backend IP address of the Front Door instance. Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend access restrictions that allow traffic from the Front Door service tags.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#restrict-access-to-a- specific-azure-front-door-instance

You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment What should you include during the application design phase?

A.

static application security testing (SAST) by using SonarQube

A.

static application security testing (SAST) by using SonarQube

Answers
B.

dynamic application security testing (DAST) by using Veracode

B.

dynamic application security testing (DAST) by using Veracode

Answers
C.

threat modeling by using the Microsoft Threat Modeling Tool

C.

threat modeling by using the Microsoft Threat Modeling Tool

Answers
D.

software decomposition by using Microsoft Visual Studio Enterprise

D.

software decomposition by using Microsoft Visual Studio Enterprise

Answers
Suggested answer: C

Explanation:

https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling

Your company is developing a new Azure App Service web app. You are providing design assistance to verify the security of the web app. You need to recommend a solution to test the web app for vulnerabilities such as insecure server configurations, cross-site scripting (XSS), and SQL injection. What should you include in the recommendation?

A.

interactive application security testing (IAST)

A.

interactive application security testing (IAST)

Answers
B.

static application security testing (SAST)

B.

static application security testing (SAST)

Answers
C.

runtime application se/f-protection (RASP)

C.

runtime application se/f-protection (RASP)

Answers
D.

dynamic application security testing (DAST)

D.

dynamic application security testing (DAST)

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/azure/security/develop/secure-develop#test-your-application-in- an-operating-state

Your company plans to deploy several Azure App Service web apps. The web apps will be deployed to the West Europe Azure region. The web apps will be accessed only by customers in Europe and the United States. You need to recommend a solution to prevent malicious bots from scanning the web apps for vulnerabilities. The solution must minimize the attach surface. What should you include in the recommendation?

A.

Azure Firewall Premium

A.

Azure Firewall Premium

Answers
B.

Azure Application Gateway Web Application Firewall (WAF)

B.

Azure Application Gateway Web Application Firewall (WAF)

Answers
C.

network security groups (NSGs)

C.

network security groups (NSGs)

Answers
D.

Azure Traffic Manager and application security groups

D.

Azure Traffic Manager and application security groups

Answers
Suggested answer: D

Explanation:

https://docs.microsoft.com/en-us/azure/web-application-firewall/ag/bot-protection

Total 177 questions
Go to page: of 18