ExamGecko
Home / Microsoft / SC-100 / List of questions
Ask Question

Microsoft SC-100 Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report
Export
Collapse

Your company has an office in Seattle.

The company has two Azure virtual machine scale sets hosted on different virtual networks.

The company plans to contract developers in India.

You need to recommend a solution provide the developers with the ability to connect to the virtual machines over SSL from the Azure portal. The solution must meet the following requirements:

• Prevent exposing the public IP addresses of the virtual machines.

• Provide the ability to connect without using a VPN.

• Minimize costs.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Deploy Azure Bastion to one virtual network.

Deploy Azure Bastion to one virtual network.

Deploy Azure Bastion to each virtual network.

Deploy Azure Bastion to each virtual network.

Enable just-in-time VM access on the virtual machines.

Enable just-in-time VM access on the virtual machines.

Create a hub and spoke network by using virtual network peering.

Create a hub and spoke network by using virtual network peering.

Create NAT rules and network rules in Azure Firewall.

Create NAT rules and network rules in Azure Firewall.

Suggested answer: A, D

Explanation:

https://docs.microsoft.com/en-us/learn/modules/connect-vm-with-azure-bastion/2-what-is-azure- bastion

asked 05/10/2024
Siddig Ahmed
47 questions

Question 62

Report
Export
Collapse

Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?

dataflow

dataflow

system flow

system flow

process flow

process flow

network flow

network flow

Suggested answer: A

Explanation:

https://docs.microsoft.com/en-us/learn/modules/tm-create-a-threat-model-using-foundational- data-flow-diagram-elements/1b-elements https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-getting- started? source=recommendations

asked 05/10/2024
Unai M
39 questions

Question 63

Report
Export
Collapse

Your company is moving a big data solution to Azure.

The company plans to use the following storage workloads:

• Azure Storage blob containers

• Azure Data Lake Storage Gen2

• Azure Storage file shares

• Azure Disk Storage

Which two storage workloads support authentication by using Azure Active Directory (Azure AD)?

Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Azure Disk Storage

Azure Disk Storage

Azure Storage blob containers

Azure Storage blob containers

Azure Storage file shares

Azure Storage file shares

Azure Data Lake Storage Gen2

Azure Data Lake Storage Gen2

Suggested answer: B, D
asked 05/10/2024
Alexander Ang
39 questions

Question 64

Report
Export
Collapse

You are evaluating an Azure environment for compliance.

You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources. Which effect should you use in Azure Policy?

Deny

Deny

Disabled

Disabled

Modify

Modify

Append

Append

Suggested answer: B

Explanation:

Before looking to manage new or updated resources with your new policy definition, it's best to see how it evaluates a limited subset of existing resources, such as a test resource group. Use the enforcement mode Disabled (DoNotEnforce) on your policy assignment to prevent the effect from triggering or activity log entries from being created. https://docs.microsoft.com/en-us/azure/governance/policy/concepts/evaluate-impact

asked 05/10/2024
kinshuk choubisa
30 questions

Question 65

Report
Export
Collapse

Your company has a Microsoft 365 E5 subscription.

The Chief Compliance Officer plans to enhance privacy management in the working environment.

You need to recommend a solution to enhance the privacy management. The solution must meet the following requirements:

• Identify unused personal data and empower users to make smart data handling decisions.

• Provide users with notifications and guidance when a user sends personal data in Microsoft Teams.

• Provide users with recommendations to mitigate privacy risks.

What should you include in the recommendation?

Microsoft Viva Insights

Microsoft Viva Insights

Advanced eDiscovery

Advanced eDiscovery

Privacy Risk Management in Microsoft Priva

Privacy Risk Management in Microsoft Priva

communication compliance in insider risk management

communication compliance in insider risk management

Suggested answer: C

Explanation:

Privacy Risk Management in Microsoft Priva gives you the capability to set up policies that identify privacy risks in your Microsoft 365 environment and enable easy remediation. Privacy Risk Management policies are meant to be internal guides and can help you: Detect overexposed personal data so that users can secure it.Spot and limit transfers of personal data across departments or regional borders.Help users identify and reduce the amount of unused personal data that you store.https://www.microsoft.com/en-us/security/business/privacy/microsoft-priva-risk-management

asked 05/10/2024
Kevin Harley
29 questions

Question 66

Report
Export
Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You are evaluating the Azure Security Benchmark V3 report as shown in the following exhibit.

Microsoft SC-100 image Question 47 107658 10052024010833000000

Microsoft SC-100 image Question 47 107658 10052024010833000000

You need to verify whether Microsoft Defender for servers is installed on all the virtual machines that run Windows. Which compliance control should you evaluate?

Data Protection

Data Protection

Incident Response

Incident Response

Posture and Vulnerability Management

Posture and Vulnerability Management

Asset Management

Asset Management

Endpoint Security

Endpoint Security

Suggested answer: E
asked 05/10/2024
Ajay Jaiswal
28 questions

Question 67

Report
Export
Collapse

A customer is deploying Docker images to 10 Azure Kubernetes Service (AKS) resources across four Azure subscriptions. You are evaluating the security posture of the customer. You discover that the AKS resources are excluded from the secure score recommendations. You need to produce accurate recommendations and update the secure score. Which two actions should you recommend in Microsoft Defender for Cloud? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Configure auto provisioning.

Configure auto provisioning.

Assign regulatory compliance policies.

Assign regulatory compliance policies.

Review the inventory.

Review the inventory.

Add a workflow automation.

Add a workflow automation.

Enable Defender plans.

Enable Defender plans.

Suggested answer: A, E

Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance- packages https://docs.microsoft.com/en-us/azure/defender-for-cloud/workflow-automation

asked 05/10/2024
Franjo Tomurad
27 questions

Question 68

Report
Export
Collapse

You have Microsoft Defender for Cloud assigned to Azure management groups.

You have a Microsoft Sentinel deployment.

During the triage of alerts, you require additional information about the security events, including suggestions for remediation. Which two components can you use to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

workload protections in Defender for Cloud

workload protections in Defender for Cloud

threat intelligence reports in Defender for Cloud

threat intelligence reports in Defender for Cloud

Microsoft Sentinel notebooks

Microsoft Sentinel notebooks

Microsoft Sentinel threat intelligence workbooks

Microsoft Sentinel threat intelligence workbooks

Suggested answer: B, D

Explanation:

A: Workbooks provide insights about your threat intelligence

Workbooks provide powerful interactive dashboards that give you insights into all aspects of Microsoft Sentinel, and threat intelligence is no exception. You can use the built-in Threat Intelligence workbook to visualize key information about your threat intelligence, and you can easily customize the workbook according to your business needs. You can even create new dashboards combining many different data sources so you can visualize your data in unique ways. Since Microsoft Sentinel workbooks are based on Azure Monitor workbooks, there is already extensive documentation available, and many more templates. C: What is a threat intelligence report?

Defender for Cloud's threat protection works by monitoring security information from your Azure resources, the network, and connected partner solutions. It analyzes this information, often correlating information from multiple sources, to identify threats.

Defender for Cloud has three types of threat reports, which can vary according to the attack. The reports available are:

Activity Group Report: provides deep dives into attackers, their objectives, and tactics.

Campaign Report: focuses on details of specific attack campaigns.

Threat Summary Report: covers all of the items in the previous two reports.

This type of information is useful during the incident response process, where there's an ongoing investigation to understand the source of the attack, the attacker's motivations, and what to do to mitigate this issue in the future. Incorrect:

Not B: When to use Jupyter notebooks

While many common tasks can be carried out in the portal, Jupyter extends the scope of what you can do with this data. For example, use notebooks to:

Perform analytics that aren't provided out-of-the box in Microsoft Sentinel, such as some Python machine learning features Create data visualizations that aren't provided out-of-the box in Microsoft Sentinel, such as custom timelines and process trees Integrate data sources outside of Microsoft Sentinel, such as an on-premises data set.

Not D: Defender for Cloud offers security alerts that are powered by Microsoft Threat Intelligence. It also includes a range of advanced, intelligent, protections for your workloads. The workload protections are provided through Microsoft Defender plans specific to the types of resources in your subscriptions. For example, you can enable Microsoft Defender for Storage to get alerted about suspicious activities related to your Azure Storage accounts.

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction https://docs.microsoft.com/en-us/azure/defender-for-cloud/threat-intelligence-reports https://docs.microsoft.com/en-us/azure/sentinel/notebooks

asked 05/10/2024
shafinaaz hossenny
39 questions

Question 69

Report
Export
Collapse

You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled. The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019. You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.

Which security control should you recommend?

Azure Active Directory (Azure AD) Conditional Access App Control policies

Azure Active Directory (Azure AD) Conditional Access App Control policies

OAuth app policies in Microsoft Defender for Cloud Apps

OAuth app policies in Microsoft Defender for Cloud Apps

app protection policies in Microsoft Endpoint Manager

app protection policies in Microsoft Endpoint Manager

application control policies in Microsoft Defender for Endpoint

application control policies in Microsoft Defender for Endpoint

Suggested answer: D

Explanation:

<https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender- application-control/select-types-of-rules-to-create#windows-defender-application-control-policy>- rules

asked 05/10/2024
Fahad Mustafa
41 questions

Question 70

Report
Export
Collapse

Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud. The company signs a contract with the United States government. You need to review the current subscription for NIST 800-53 compliance. What should you do first?

From Defender for Cloud, review the Azure security baseline for audit report.

From Defender for Cloud, review the Azure security baseline for audit report.

From Defender for Cloud, add a regulatory compliance standard.

From Defender for Cloud, add a regulatory compliance standard.

From Defender for Cloud, enable Defender for Cloud plans.

From Defender for Cloud, enable Defender for Cloud plans.

From Defender for Cloud, review the secure score recommendations.

From Defender for Cloud, review the secure score recommendations.

Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance- packages#what-regulatory-compliance-standards-are-available-in-defender-for-cloud

asked 05/10/2024
J.L.M. van Loo
48 questions
Total 200 questions
Go to page: of 20
Search

Related questions