ExamGecko
Home / Microsoft / SC-100 / List of questions
Ask Question

Microsoft SC-100 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You have an Amazon Web Services (AWS) implementation. You plan to extend the Azure security strategy to the AWS implementation. The solution will NOT use Azure Arc. Which three services can you use to provide security for the AWS resources? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Azure Active Directory (Azure AD) Privileged Identity Management (PIM)

Azure Active Directory (Azure AD) Conditional Access

Azure Active Directory (Azure AD) Conditional Access

Microsoft Defender for servers

Microsoft Defender for servers

Azure Policy

Azure Policy

Microsoft Defender for Containers

Microsoft Defender for Containers

Suggested answer: B, D, E
Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/supported-machines-endpoint- solutions-clouds-containers?tabs=aws-eks

asked 05/10/2024
Clive Roberts
50 questions

Question 42

Report Export Collapse

You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service. You are migrating the on-premises infrastructure to a cloud-only infrastructure. You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the administrative effort to maintain the infrastructure. Which identity service should you include in the recommendation?

Azure Active Directory Domain Services (Azure AD DS)

Azure Active Directory Domain Services (Azure AD DS)

Azure Active Directory (Azure AD) B2C

Azure Active Directory (Azure AD) B2C

Azure Active Directory (Azure AD)

Azure Active Directory (Azure AD)

Active Directory Domain Services (AD DS)

Active Directory Domain Services (AD DS)

Suggested answer: A
Explanation:

https://docs.microsoft.com/en-us/azure/active-directory-domain-services/overview

asked 05/10/2024
LAURA Camacho
44 questions

Question 43

Report Export Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.

You need to recommend configurations to increase the score of the Secure management ports controls. Solution: You recommend enabling adaptive network hardening. Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:


asked 05/10/2024
abdelhafid houssa
46 questions

Question 44

Report Export Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled. You are evaluating the Azure Security Benchmark V3 report. In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.

You need to recommend configurations to increase the score of the Secure management ports controls. Solution: You recommend onboarding all virtual machines to Microsoft Defender for Endpoint.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls

asked 05/10/2024
Dan Yann
54 questions

Question 45

Report Export Collapse

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend configuring gateway-required virtual network integration.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:

https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#restrict-access-to-a- specific-azure-front-door-instance

asked 05/10/2024
Tim Baas
36 questions

Question 46

Report Export Collapse

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend access restrictions to allow traffic from the backend IP address of the Front Door instance. Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
asked 05/10/2024
Serhan Azdiken
40 questions

Question 47

Report Export Collapse

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend access restrictions that allow traffic from the Front Door service tags.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: A
Explanation:

https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#restrict-access-to-a- specific-azure-front-door-instance

asked 05/10/2024
Daria Frutskaya
44 questions

Question 48

Report Export Collapse

You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment What should you include during the application design phase?

static application security testing (SAST) by using SonarQube

static application security testing (SAST) by using SonarQube

dynamic application security testing (DAST) by using Veracode

dynamic application security testing (DAST) by using Veracode

threat modeling by using the Microsoft Threat Modeling Tool

threat modeling by using the Microsoft Threat Modeling Tool

software decomposition by using Microsoft Visual Studio Enterprise

software decomposition by using Microsoft Visual Studio Enterprise

Suggested answer: C
Explanation:

https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling

asked 05/10/2024
Janina Loveria
47 questions

Question 49

Report Export Collapse

Your company is developing a new Azure App Service web app. You are providing design assistance to verify the security of the web app. You need to recommend a solution to test the web app for vulnerabilities such as insecure server configurations, cross-site scripting (XSS), and SQL injection. What should you include in the recommendation?

interactive application security testing (IAST)

interactive application security testing (IAST)

static application security testing (SAST)

static application security testing (SAST)

runtime application se/f-protection (RASP)

runtime application se/f-protection (RASP)

dynamic application security testing (DAST)

dynamic application security testing (DAST)

Suggested answer: D
Explanation:

https://docs.microsoft.com/en-us/azure/security/develop/secure-develop#test-your-application-in- an-operating-state

asked 05/10/2024
Gilbert Ciepluch
60 questions

Question 50

Report Export Collapse

Your company plans to deploy several Azure App Service web apps. The web apps will be deployed to the West Europe Azure region. The web apps will be accessed only by customers in Europe and the United States. You need to recommend a solution to prevent malicious bots from scanning the web apps for vulnerabilities. The solution must minimize the attach surface. What should you include in the recommendation?

Azure Firewall Premium

Azure Firewall Premium

Azure Application Gateway Web Application Firewall (WAF)

Azure Application Gateway Web Application Firewall (WAF)

network security groups (NSGs)

network security groups (NSGs)

Azure Traffic Manager and application security groups

Azure Traffic Manager and application security groups

Suggested answer: D
Explanation:

https://docs.microsoft.com/en-us/azure/web-application-firewall/ag/bot-protection

asked 05/10/2024
Aleksei Chernikov
56 questions
Total 200 questions
Go to page: of 20
Search

Related questions