Download Microsoft Cybersecurity Architect.PremiumDumps.SC-100.2023-10-23.1e.110q.vcex

Download Exam

File Info

Exam Microsoft Cybersecurity Architect (beta)
Number SC-100
File Name Microsoft Cybersecurity Architect.PremiumDumps.SC-100.2023-10-23.1e.110q.vcex
Size 5.17 Mb
Posted October 23, 2023
Downloads 15

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
You have an Azure subscription that has Microsoft Defender for Cloud enabled. Suspicious authentication activity alerts have been appearing in the Workload protections dashboard. You need to recommend a solution to evaluate and remediate the alerts by using workflow automation. The solution must minimize development effort. 
What should you include in the recommendation?

  • A: Azure Monitor webhooks
  • B: Azure Event Hubs 
  • C: Azure Functions apps
  • D: Azure Logics Apps



Question 2
Your company is moving a big data solution to Azure. 
The company plans to use the following storage workloads:
Azure Storage blob containers 
Azure Data Lake Storage Gen2 
Azure Storage file shares - 
Azure Disk Storage 
Which two storage workloads support authentication by using Azure Active Directory (Azure AD)? Each correct answer presents a complete solution. 
NOTE: Each correct selection is worth one point.

  • A: Azure Storage file shares
  • B: Azure Disk Storage
  • C: Azure Storage blob containers
  • D: Azure Data Lake Storage Gen2



Question 3
Your company is migrating data to Azure. The data contains Personally Identifiable Information (PII). The company plans to use Microsoft Information Protection for the PII data store in Azure. You need to recommend a solution to discover PII data at risk in the Azure resources. What should you include in the recommendation? 
To answer, select the appropriate options in the answer area. 
NOTE: Each correct selection is worth one point.




Question 4
You have a Microsoft 365 E5 subscription and an Azure subscription. 
You are designing a Microsoft deployment. 
You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing security events. 
What should you recommend using in Microsoft Sentinel?

  • A: notebooks
  • B: playbooks
  • C: workbooks
  • D: threat intelligence



Question 5
Your company has a Microsoft 365 subscription and uses Microsoft Defender for Identity. You are informed about incidents that relate to compromised identities. You need to recommend a solution to expose several accounts for attackers to exploit. When the attackers attempt to exploit the accounts, an alert must be triggered. 
Which Defender for Identity feature should you include in the recommendation? 

  • A: sensitivity labels
  • B: custom user tags
  • C: standalone sensors
  • D: honeytoken entity tags



Question 6
You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases. All resources are backed up multiple times a day by using Azure Backup. 
You are developing a strategy to protect against ransomware attacks. 
You need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a successful ransomware attack. 
Which two controls should you include in the recommendation? Each correct answer presents a complete solution. 
NOTE: Each correct selection is worth one point.

  • A: Enable soft delete for backups.
  • B: Require PINs for critical operations.
  • C: Encrypt backups by using customer-managed keys (CMKs).
  • D: Perform offline backups to Azure Data Box.
  • E: Use Azure Monitor notifications when backup configurations change.



Question 7
Your company uses Microsoft Defender for Cloud and Microsoft Sentinel. The company is designing an application that will have the architecture shown in the following exhibit. 

    

You are designing a logging and auditing solution for the proposed architecture. 
The solution must meet the following requirements:
Integrate Azure Web Application Firewall (WAF) logs with Microsoft Sentinel. 
Use Defender for Cloud to review alerts from the virtual machines. 
What should you include in the solution? To answer, select the appropriate options in the answer area. 
NOTE: Each correct selection is worth one point.




Question 8
Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. 
You plan to integrate Microsoft Sentinel with Splunk. 
You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. 
What should you include in the recommendation?

  • A: a Microsoft Sentinel data connector
  • B: Azure Event Hubs
  • C: a Microsoft Sentinel workbook
  • D: Azure Data Factory



Question 9
A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications. The customer discovers that several endpoints are infected with malware. 
The customer suspends access attempts from the infected endpoints. 
The malware is removed from the endpoints. 
Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution. 
NOTE: Each correct selection is worth one point.

  • A: The client access tokens are refreshed.
  • B: Microsoft Intune reports the endpoints as compliant.
  • C: A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.
  • D: Microsoft Defender for Endpoint reports the endpoints as compliant.



Question 10
A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription. All on-premises servers in the perimeter network are prevented from connecting directly to the internet. 
The customer recently recovered from a ransomware attack. 
The customer plans to deploy Microsoft Sentinel. 
You need to recommend solutions to meet the following requirements:
Ensure that the security operations team can access the security logs and the operation logs. Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network. 
Which two solutions should you include in the recommendation? Each correct answer presents a complete solution. 
NOTE: Each correct selection is worth one point.

  • A: a custom collector that uses the Log Analytics agent
  • B: the Azure Monitor agent
  • C: resource-based role-based access control (RBAC)
  • D: Azure Active Directory (Azure AD) Conditional Access policies






CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset