Download Microsoft.SC-100.CertDumps.2022-09-28.27q.vcex

Download Exam

File Info

Exam Microsoft Cybersecurity Architect (beta)
Number SC-100
File Name Microsoft.SC-100.CertDumps.2022-09-28.27q.vcex
Size 19 KB
Posted Sep 28, 2022
Download Microsoft.SC-100.CertDumps.2022-09-28.27q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation?


  1. Onboard the virtual machines to Microsoft Defender for Endpoint.
  2. Onboard the virtual machines to Azure Arc.
  3. Create a device compliance policy in Microsoft Endpoint Manager.
  4. Enable the Qualys scanner in Defender for Cloud.
Correct answer: A



Question 2

You need to recommend a solution to meet the AWS requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


  1. Mastered
  2. Not Mastered
Correct answer: A



Question 3

You need to recommend a solution to meet the compliance requirements.
What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


  1. Mastered
  2. Not Mastered
Correct answer: A



Question 4

You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. What should you recommend?
To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.


  1. Mastered
  2. Not Mastered
Correct answer: A



Question 5

You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements.
Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.


  1. Azure AD Conditional Access
  2. Microsoft Defender for Cloud Apps
  3. Microsoft Defender for Cloud
  4. Microsoft Defender for Endpoint
  5. access reviews in Azure AD
Correct answer: BE



Question 6

You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers.
In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each
correct selection is worth one point.


  1. Linux containers deployed to Azure Container Registry
  2. Linux containers deployed to Azure Kubernetes Service (AKS)
  3. Windows containers deployed to Azure Container Registry
  4. Windows containers deployed to Azure Kubernetes Service (AKS)
  5. Linux containers deployed to Azure Container Instances
Correct answer: DE



Question 7

You have Microsoft Defender for Cloud assigned to Azure management groups. You have a Microsoft Sentinel deployment.
During the triage of alerts, you require additional information about the security events, including suggestions for remediation. Which two components can you use
to achieve the goal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.


  1. workload protections in Defender for Cloud
  2. threat intelligence reports in Defender for Cloud
  3. Microsoft Sentinel notebooks
  4. Microsoft Sentinel threat intelligence workbooks
Correct answer: A



Question 8

You are evaluating an Azure environment for compliance.
You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources.
Which effect should you use in Azure Policy?


  1. Deny
  2. Disabled
  3. Modify
  4. Append
Correct answer: A



Question 9

You are creating the security recommendations for an Azure App Service web app named App1. App1 has the following specifications:
Users will request access to App1 through the My Apps portal. A human resources manager will approve the requests.
Users will authenticate by using Azure Active Directory (Azure AD) user accounts. You need to recommend an access security architecture for App1.
What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


  1. Mastered
  2. Not Mastered
Correct answer: A



Question 10

You open Microsoft Defender for Cloud as shown in the following exhibit.
Use the drop-down menus to select the answer choice that complete each statements based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.


  1. Mastered
  2. Not Mastered
Correct answer: A
Explanation:
 
 









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files