Microsoft SC-100 Practice Test - Questions Answers, Page 7
List of questions
Related questions
Your company has an office in Seattle.
The company has two Azure virtual machine scale sets hosted on different virtual networks.
The company plans to contract developers in India.
You need to recommend a solution provide the developers with the ability to connect to the virtual machines over SSL from the Azure portal. The solution must meet the following requirements:
• Prevent exposing the public IP addresses of the virtual machines.
• Provide the ability to connect without using a VPN.
• Minimize costs.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Deploy Azure Bastion to one virtual network.
Deploy Azure Bastion to each virtual network.
Enable just-in-time VM access on the virtual machines.
Create a hub and spoke network by using virtual network peering.
Create NAT rules and network rules in Azure Firewall.
Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?
dataflow
system flow
process flow
network flow
Your company is moving a big data solution to Azure.
The company plans to use the following storage workloads:
• Azure Storage blob containers
• Azure Data Lake Storage Gen2
• Azure Storage file shares
• Azure Disk Storage
Which two storage workloads support authentication by using Azure Active Directory (Azure AD)?
Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
Azure Disk Storage
Azure Storage blob containers
Azure Storage file shares
Azure Data Lake Storage Gen2
You are evaluating an Azure environment for compliance.
You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources. Which effect should you use in Azure Policy?
Deny
Disabled
Modify
Append
Your company has a Microsoft 365 E5 subscription.
The Chief Compliance Officer plans to enhance privacy management in the working environment.
You need to recommend a solution to enhance the privacy management. The solution must meet the following requirements:
• Identify unused personal data and empower users to make smart data handling decisions.
• Provide users with notifications and guidance when a user sends personal data in Microsoft Teams.
• Provide users with recommendations to mitigate privacy risks.
What should you include in the recommendation?
Microsoft Viva Insights
Advanced eDiscovery
Privacy Risk Management in Microsoft Priva
communication compliance in insider risk management
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You are evaluating the Azure Security Benchmark V3 report as shown in the following exhibit.
You need to verify whether Microsoft Defender for servers is installed on all the virtual machines that run Windows. Which compliance control should you evaluate?
Data Protection
Incident Response
Posture and Vulnerability Management
Asset Management
Endpoint Security
A customer is deploying Docker images to 10 Azure Kubernetes Service (AKS) resources across four Azure subscriptions. You are evaluating the security posture of the customer. You discover that the AKS resources are excluded from the secure score recommendations. You need to produce accurate recommendations and update the secure score. Which two actions should you recommend in Microsoft Defender for Cloud? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Configure auto provisioning.
Assign regulatory compliance policies.
Review the inventory.
Add a workflow automation.
Enable Defender plans.
You have Microsoft Defender for Cloud assigned to Azure management groups.
You have a Microsoft Sentinel deployment.
During the triage of alerts, you require additional information about the security events, including suggestions for remediation. Which two components can you use to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
workload protections in Defender for Cloud
threat intelligence reports in Defender for Cloud
Microsoft Sentinel notebooks
Microsoft Sentinel threat intelligence workbooks
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled. The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019. You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
Which security control should you recommend?
Azure Active Directory (Azure AD) Conditional Access App Control policies
OAuth app policies in Microsoft Defender for Cloud Apps
app protection policies in Microsoft Endpoint Manager
application control policies in Microsoft Defender for Endpoint
Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud. The company signs a contract with the United States government. You need to review the current subscription for NIST 800-53 compliance. What should you do first?
From Defender for Cloud, review the Azure security baseline for audit report.
From Defender for Cloud, add a regulatory compliance standard.
From Defender for Cloud, enable Defender for Cloud plans.
From Defender for Cloud, review the secure score recommendations.
Question