×

Special Offer! November Sale at DumpsCity! Get 20% Off on All Certification Exam Questions. Use Code: DC20OFF

Free Microsoft SC-100 Exam Questions

Try our Free Demo Practice Tests for Comprehensive SC-100 Exam Preparation

  • Microsoft SC-100 Exam Questions
  • Provided By: Microsoft
  • Exam: Microsoft Cybersecurity Architect
  • Certification: Microsoft Certified Cybersecurity Architect Expert
  • Total Questions: 185
  • Updated On: Nov 11, 2024
  • Rated: 4.9 |
  • Online Users: 370
Page No. 1 of 37
Add To Cart
  • Question 1
    • Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security Best Practices.

      You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART) approach in Microsoft Security Best Practices.

      What should you include in the response plan?


      Answer: D
  • Question 2
    • A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications.

      The customer discovers that several endpoints are infected with malware.

      The customer suspends access attempts from the infected endpoints.

      The malware is removed from the endpoints.

      Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution.

      NOTE: Each correct selection is worth one point.


      Answer: A,C
  • Question 3
    • You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.

      The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.

      You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.

      Which security control should you recommend?


      Answer: D
  • Question 4
    • You have an Azure AD tenant that syncs with an Active Directory Domain Services (AD DS) domain.

      You are designing an Azure DevOps solution to deploy applications to an Azure subscription by using continuous integration and continuous deployment (CI/CD) pipelines.

      You need to recommend which types of identities to use for the deployment credentials of the service connection. The solution must follow DevSecOps best practices from the Microsoft Cloud Adoption Framework for Azure.

      What should you recommend?


      Answer: D
  • Question 5
    • Your company has an Azure subscription that uses Microsoft Defender for Cloud.

      The company signs a contract with the United States government.

      You need to review the current subscription for NIST 800-53 compliance.

      What should you do first?


      Answer: C
PAGE: 1 - 37
Add To Cart

© Copyrights Dumpscity 2024. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the Dumpscity.