Microsoft SC-100 Questions & Answers

Full Version: 562 Q&A

SC-100 Dumps
SC-100 Braindumps SC-100 Real Questions SC-100 Practice Test
SC-100 Actual Questions
Microsoft
SC-100
Microsoft Cybersecurity Architect
https://killexams.com/pass4sure/exam-detail/SC-100
Question: 33
You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL).
You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment
What should you include during the application design phase?
1. static application security testing (SAST) by using SonarQube
2. dynamic application security testing (DAST) by using Veracode
3. threat modeling by using the Microsoft Threat Modeling Tool
4. software decomposition by using Microsoft Visual Studio Enterprise
Answer: C Explanation:
https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
Question: 34
HOTSPOT
You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements.
What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.
Explanation:
Box 1: Virtual Network Integration – correct
Virtual network integration gives your app access to resources in your virtual network, but it doesn’t grant inbound private access to your app from the virtual network.
Box 2: Private Endpoints. – correct
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access the app over Private Link.
Question: 35
Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit.
What should you include in the recommendation?
1. Azure Active Directory (Azure AD) enterprise applications
2. an Azure App Service Environment (ASE)
3. Azure service endpoints
4. an Azure Active Directory (Azure AD) application proxy
Answer: B Explanation:
App Service environments (ASEs) are appropriate for application workloads that require: Very high scale,Isolation and secure network access,High memory utilization.
This capability can host your: Windows web apps,Linux web apps Docker containers,Mobile apps Functions
https://docs.microsoft.com/en-us/azure/app-service/environment/overview
Question: 36
You need to recommend a solution to scan the application code. The solution must meet the application development requirements.
What should you include in the recommendation?
1. Azure Key Vault
2. GitHub Advanced Security
3. Application Insights in Azure Monitor
4. Azure DevTest Labs
Answer: B Explanation:
https://docs.microsoft.com/en-us/learn/modules/introduction-github-advanced-security/2-what-is-github-advanced- security
Question: 37
HOTSPOT
You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point.
Answer:
Explanation:
Question: 38
You are designing a ransomware response plan that follows Microsoft Security Best Practices.
You need to recommend a solution to limit the scope of damage of ransomware attacks without being locked out. What should you include in the recommendations?
1. Privileged Access Workstations (PAWs)
2. emergency access accounts
3. device compliance policies
4. Customer Lockbox for Microsoft Azure
Answer: B Question: 39 HOTSPOT
You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements.
What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct
selection is worth one point.
Answer:
Question: 40
HOTSPOT
You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (CI/CO) workflows.
You need to recommend best practices to secure the stages of the CI/CD workflows based on the Microsoft Cloud Adoption Framework for Azure.
What should you include in the recommendation for each stage? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Answer:
Question: 41
A customer is deploying Docker images to 10 Azure Kubernetes Service (AKS) resources across four Azure subscriptions. You are evaluating the security posture of the customer.
You discover that the AKS resources are excluded from the secure score recommendations. You need to produce accurate recommendations and update the secure score.
Which two actions should you recommend in Microsoft Defender for Cloud? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
1. Configure auto provisioning.
2. Assign regulatory compliance policies.
3. Review the inventory.
4. Add a workflow automation.
5. Enable Defender plans.
Answer: A,E Explanation:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages
https://docs.microsoft.com/en-us/azure/defender-for-cloud/workflow-automation
Question: 42
Your company has a Microsoft 365 E5 subscription.
Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications.
What should you recommend using to prevent the PHI from being shared outside the company?
1. insider risk management policies
2. data loss prevention (DLP) policies
3. sensitivity label policies
4. retention policies
Answer: B Explanation:
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp-policy?view=o365-worldwide

User: Jade*****

Initial file errors with killexams.com’s SC-100 testprep materials were quickly resolved, and their exam simulator proved highly effective. The practice tests ensured a confident pass, and I am thankful for their prompt and reliable support.
User: Mildred*****

User-friendly testprep device was exceptional, helping me score the highest marks on my SC-100 exam. Their exam simulator and practice tests mirrored the actual exam, ensuring I understood and could apply concepts effectively, with no technical issues.
User: Victoria*****

The team at Killexams.com is cooperative and capable, and they provided me with excellent material for sc-100 practice tests. I am so grateful for their support and highly recommend Killexams.com to anyone preparing for the exam.
User: Constantine*****

Up-to-date sc-100 testprep materials, including new modifications, were a pleasant surprise. Passing my first exam with confidence, I am eager to use their resources for future certifications. Their reliable materials are a must for any certification journey.
User: Tonja*****

After failing the SC-100 exam twice, killexams.com’s testprep questions, recommended by a friend, were a game-changer. Their excellent and clear content allowed me to memorize key concepts and answer all questions in 180 minutes, leading to a successful pass.

Features of iPass4sure SC-100 Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 562 Q&A

Get Full Version

All Microsoft Exams

Microsoft Exams

Certification and Entry Test Exams

Complete exam list