Handsome Savings - Limited Time Offer 30% OFF - Ends In 0d 0h 0m 0s Coupon code: 50OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Microsoft SC-100 Exam Actual Questions

The questions for SC-100 were last updated on Oct 4, 2024.
  • Viewing page 1 out of 35 pages.
  • Viewing questions 1-5 out of 176 questions
Unlock Access to All 176 Questions & Answers
Question No. 1

You design cloud-based software as a service (SaaS) solutions.

You need to recommend ransomware attacks. The solution must follow Microsoft Security Best Practices.

What should you recommend doing first?

Show Answer Hide Answer
Correct Answer: C

Question No. 2

You have legacy operational technology (OT) devices and loT devices.

You need to recommend best practices for applying Zero Trust principles to the OT and loT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.

Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point

Show Answer Hide Answer
Correct Answer: C, D

Question No. 3

You have an Azure subscription. The subscription contains 100 virtual machines that run Windows Server. The virtual machines are managed by using Azure Policy and Microsoft Defender for Servers.

You need to enhance security on the virtual machines. The solution must meet the following requirements:

* Ensure that only apps on an allowlist can be run.

* Require administrators to confirm each app added to the allowlist.

* Automatically add unauthorized apps to a blocklist when an attempt is made to launch the app.

* Require administrators to approve an app before the app can be moved from the blocklist to the allowlist.

What should you include in the solution?

Show Answer Hide Answer
Correct Answer: C

Question No. 4

You have an Azure subscription. The subscription contains 50 virtual machines that run Windows Server and 50 virtual machines that run Linux. You need to perform vulnerability assessments on the virtual machines. The solution must meet the following requirements:

* Identify missing updates and insecure configurations.

* Use the Qualys engine.

What should you use?

Show Answer Hide Answer
Correct Answer: A

Question No. 5

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are designing the encryption standards for data at rest for an Azure resource.

You need to provide recommendations to ensure that the data at rest is encrypted by using AES-256 keys. The solution must support rotating the encryption keys monthly.

Solution: For Azure SQL databases, you recommend Transparent Data Encryption (TDE) that uses Microsoft-managed keys.

Does this meet the goal?

Show Answer Hide Answer
Correct Answer: B

Product Image

Unlock All Questions for Microsoft SC-100 Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 176 Questions & Answers