ExamGecko
Home Home / Microsoft / SC-100

Microsoft SC-100 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription that has Microsoft Defender for Cloud enabled. Suspicious authentication activity alerts have been appearing in the Workload protections dashboard. You need to recommend a solution to evaluate and remediate the alerts by using workflow automation. The solution must minimize development effort. What should you include in the recommendation?

A.

Azure Monitor webhooks

A.

Azure Monitor webhooks

Answers
B.

Azure Logics Apps

B.

Azure Logics Apps

Answers
C.

Azure Event Hubs

C.

Azure Event Hubs

Answers
D.

Azure Functions apps

D.

Azure Functions apps

Answers
Suggested answer: B

Explanation:

The workflow automation feature of Microsoft Defender for Cloud feature can trigger Logic Apps on security alerts, recommendations, and changes to regulatory compliance.Note: Azure Logic Apps is a cloud-based platform for creating and running automated workflows that integrate your apps, data, services, and systems. With this platform, you can quickly develop highly scalable integration solutions for your enterprise and business-to-business (B2B) scenarios.

Your on-premises network contains an e-commerce web app that was developed in Angular and Node.js. The web app uses a MongoDB database You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.

You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model. Solution: You recommend implementing Azure Application Gateway with Azure Web Application Firewall (WAF). Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

When using Azure-provided PaaS services (e.g., Azure Storage, Azure Cosmos DB, or Azure Web App, use the PrivateLink connectivity option to ensure all data exchanges are over the private IP space and the traffic never leaves the Microsoft network.

You need to recommend a strategy for routing internet-bound traffic from the landing zones. The solution must meet the landing zone requirements. What should you recommend as part of the landing zone deployment?

A.

service chaining

A.

service chaining

Answers
B.

local network gateways

B.

local network gateways

Answers
C.

forced tunneling

C.

forced tunneling

Answers
D.

a VNet-to-VNet connection

D.

a VNet-to-VNet connection

Answers
Suggested answer: A

Your company has devices that run either Windows 10, Windows 11, or Windows Server.

You are in the process of improving the security posture of the devices.

You plan to use security baselines from the Microsoft Security Compliance Toolkit.

What should you recommend using to compare the baselines to the current device configurations?

A.

Microsoft Intune

A.

Microsoft Intune

Answers
B.

Policy Analyzer

B.

Policy Analyzer

Answers
C.

Local Group Policy Object (LGPO)

C.

Local Group Policy Object (LGPO)

Answers
D.

Windows Autopilot

D.

Windows Autopilot

Answers
Suggested answer: B

Explanation:

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security- configuration-framework/security-compliance-toolkit-10

A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications. The customer discovers that several endpoints are infected with malware.

The customer suspends access attempts from the infected endpoints.

The malware is removed from the end point.

Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

Microsoft Defender for Endpoint reports the endpoints as compliant.

A.

Microsoft Defender for Endpoint reports the endpoints as compliant.

Answers
B.

Microsoft Intune reports the endpoints as compliant.

B.

Microsoft Intune reports the endpoints as compliant.

Answers
C.

A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.

C.

A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.

Answers
D.

The client access tokens are refreshed.

D.

The client access tokens are refreshed.

Answers
Suggested answer: B, D


A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription. All the on-premises servers in the perimeter network are prevented from connecting directly to the internet. The customer recently recovered from a ransomware attack.

The customer plans to deploy Microsoft Sentinel.

You need to recommend configurations to meet the following requirements:

• Ensure that the security operations team can access the security logs and the operation logs.

• Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network. Which two configurations can you include in the recommendation? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

A.

Configure Azure Active Directory (Azure AD) Conditional Access policies.

A.

Configure Azure Active Directory (Azure AD) Conditional Access policies.

Answers
B.

Use the Azure Monitor agent with the multi-homing configuration.

B.

Use the Azure Monitor agent with the multi-homing configuration.

Answers
C.

Implement resource-based role-based access control (RBAC) in Microsoft Sentinel.

C.

Implement resource-based role-based access control (RBAC) in Microsoft Sentinel.

Answers
D.

Create a custom collector that uses the Log Analytics agent.

D.

Create a custom collector that uses the Log Analytics agent.

Answers
Suggested answer: B, C

Your company has the virtual machine infrastructure shown in the following table.

The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines to Azure. You need to provide recommendations to increase the resiliency of the backup strategy to mitigate attacks such as ransomware. What should you include in the recommendation?

A.

Use geo-redundant storage (GRS).

A.

Use geo-redundant storage (GRS).

Answers
B.

Use customer-managed keys (CMKs) for encryption.

B.

Use customer-managed keys (CMKs) for encryption.

Answers
C.

Require PINs to disable backups.

C.

Require PINs to disable backups.

Answers
D.

Implement Azure Site Recovery replication.

D.

Implement Azure Site Recovery replication.

Answers
Suggested answer: C

You have a customer that has a Microsoft 365 subscription and an Azure subscription.

The customer has devices that run either Windows, iOS, Android, or macOS. The Windows devices are deployed on-premises and in Azure. You need to design a security solution to assess whether all the devices meet the customer's compliance rules. What should you include in the solution?

A.

Microsoft Information Protection

A.

Microsoft Information Protection

Answers
B.

Microsoft Defender for Endpoint

B.

Microsoft Defender for Endpoint

Answers
C.

Microsoft Sentinel

C.

Microsoft Sentinel

Answers
D.

Microsoft Endpoint Manager

D.

Microsoft Endpoint Manager

Answers
Suggested answer: D

Your company has a hybrid cloud infrastructure.

Data and applications are moved regularly between cloud environments.

The company's on-premises network is managed as shown in the following exhibit.

You are designing security operations to support the hybrid cloud infrastructure. The solution must meet the following requirements: Govern virtual machines and servers across multiple environments.Enforce standards for all the resources across all the environment across the Azure policy.Which two components should you recommend for the on-premises network? Each correct answer presents part of the solution.

A.

Azure VPN Gateway

A.

Azure VPN Gateway

Answers
B.

guest configuration in Azure Policy

B.

guest configuration in Azure Policy

Answers
C.

on-premises data gateway

C.

on-premises data gateway

Answers
D.

Azure Bastion

D.

Azure Bastion

Answers
E.

Azure Arc

E.

Azure Arc

Answers
Suggested answer: B, E

Explanation:

https://docs.microsoft.com/en-us/azure/governance/machine-configuration/overview

You are designing the security standards for a new Azure environment.

You need to design a privileged identity strategy based on the Zero Trust model.

Which framework should you follow to create the design?

A.

Enhanced Security Admin Environment (ESAE)

A.

Enhanced Security Admin Environment (ESAE)

Answers
B.

Microsoft Security Development Lifecycle (SDL)

B.

Microsoft Security Development Lifecycle (SDL)

Answers
C.

Rapid Modernization Plan (RaMP)

C.

Rapid Modernization Plan (RaMP)

Answers
D.

Microsoft Operational Security Assurance (OSA)

D.

Microsoft Operational Security Assurance (OSA)

Answers
Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/security/compass/security-rapid-modernization-plan This rapid modernization plan (RAMP) will help you quickly adopt Microsoft's recommended privileged access strategy.

Total 177 questions
Go to page: of 18