SC-100 Exam - Free Actual Q&as, Page 1 - ExamTopics
SC-100 Exam - Free Actual Q&as, Page 1 - ExamTopics
SC-100 Exam - Free Actual Q&as, Page 1 - ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 1/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #1 Topic 1
D. Advanced eDiscovery
Correct Answer: C
Privacy Risk Management in Microsoft Priva gives you the capability to set up policies that identify privacy risks in your Microsoft 365
environment and enable easy remediation. Privacy Risk Management policies are meant to be internal guides and can help you:
Detect overexposed personal data so that users can secure it.
Spot and limit transfers of personal data across departments or regional borders.
Help users identify and reduce the amount of unused personal data that you store.
Incorrect:
Not B: Microsoft Viva Insights provides personalized recommendations to help you do your best work. Get insights to build better work habits,
such as following through on commitments made to collaborators and protecting focus time in the day for uninterrupted, individual work.
Not D: The Microsoft Purview eDiscovery (Premium) solution builds on the existing Microsoft eDiscovery and analytics capabilities. eDiscovery
(Premium) provides an end-to-end workflow to preserve, collect, analyze, review, and export content that's responsive to your organization's
internal and external investigations.
Reference:
https://docs.microsoft.com/en-us/privacy/priva/risk-management
I do have Az-500 and Az-104 so i know there are so many missing content in the mslearn, but.. this is the newest cert.. common microsoft.. and
they want us to pass without using the Dump.
upvoted 8 times
https://learn.microsoft.com/en-us/privacy/priva/risk-management
Privacy Risk Management in Microsoft Priva gives you the capability to set up policies that identify privacy risks in your Microsoft 365 environment
and enable easy remediation. Privacy Risk Management policies are meant to be internal guides and can help you:
- Detect overexposed personal data so that users can secure it.
- Spot and limit transfers of personal data across departments or regional borders.
- Help users identify and reduce the amount of unused personal data that you store.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 2/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Informing users of potential issues in the moment, and empowering them to remediate issues and refresh their skills, can be powerful tools for
building sound data handling practices across your organization.
upvoted 1 times
zellck 1 month, 2 weeks ago
https://learn.microsoft.com/en-us/privacy/priva/risk-management-policy-data-minimization
Data minimization policies focus on the age of your content and how long it has been since it was last modified. Monitoring for personal data
that's still being retained in older, unused content can help you better manage your stored data and reduce risks.
Privacy Risk Management allows you to create policies to monitor data that hasn't been modified within a timeframe that you select. When a
policy match is detected, you can send users email notifications with remediation options include marking items for deletion, notifying content
owners, or tagging items for further review.
upvoted 1 times
https://learn.microsoft.com/en-us/privacy/priva/risk-management
upvoted 3 times
Key features of Microsoft Priva Privacy Risk Management is to Assess your organization's privacy posture.
how much personal data exists in the environment, where it's located, how it moves, and the privacy risks detected.
Microsoft Purview automates data discovery by providing data scanning and classification for assets across your data estate.
Metadata and descriptions of discovered data assets are integrated into a holistic map of your data estate.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 3/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
c is correct
upvoted 1 times
SAMSH 9 months, 2 weeks ago
was in 20Sep2020 exam
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 4/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 1
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
Suspicious authentication activity alerts have been appearing in the Workload protections dashboard.
You need to recommend a solution to evaluate and remediate the alerts by using workflow automation. The solution must minimize development
effort.
What should you include in the recommendation?
Correct Answer: D
The workflow automation feature of Microsoft Defender for Cloud feature can trigger Logic Apps on security alerts, recommendations, and
changes to regulatory compliance.
Note: Azure Logic Apps is a cloud-based platform for creating and running automated workflows that integrate your apps, data, services, and
systems. With this platform, you can quickly develop highly scalable integration solutions for your enterprise and business-to-business (B2B)
scenarios.
Incorrect:
Not C: Using Azure Functions apps would require more effort.
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/workflow-automation
https://learn.microsoft.com/en-us/azure/defender-for-cloud/workflow-automation
Every security program includes multiple workflows for incident response. These processes might include notifying relevant stakeholders, launching
a change management process, and applying specific remediation steps. Security experts recommend that you automate as many steps of those
procedures as you can. Automation reduces overhead. It can also improve your security by ensuring the process steps are done quickly,
consistently, and according to your predefined requirements.
This feature can trigger consumption logic apps on security alerts, recommendations, and changes to regulatory compliance. For example, you
might want Defender for Cloud to email a specific user when an alert occurs. You'll also learn how to create logic apps using Azure Logic Apps.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 5/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 6/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 1
Correct Answer: CD
C: Azure Storage supports using Azure Active Directory (Azure AD) to authorize requests to blob data. With Azure AD, you can use Azure role-
based access control (Azure RBAC) to grant permissions to a security principal, which may be a user, group, or application service principal.
The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can then be used to authorize a request against the
Blob service.
You can scope access to Azure blob resources at the following levels, beginning with the narrowest scope:
* An individual container. At this scope, a role assignment applies to all of the blobs in the container, as well as container properties and
metadata.
* The storage account.
* The resource group.
* The subscription.
* A management group.
D: You can securely access data in an Azure Data Lake Storage Gen2 (ADLS Gen2) account using OAuth 2.0 with an Azure Active Directory
(Azure AD) application service principal for authentication. Using a service principal for authentication provides two options for accessing data
in your storage account:
A mount point to a specific file or path
Explanation:
Azure Storage file shares and Azure Data Lake Storage Gen2 both support authentication using Azure AD. Azure Disk Storage and Azure Storage
blob containers do not currently support Azure AD authentication.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 7/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Both Azure Storage file shares and Azure Data Lake Storage Gen2 support authentication through Azure AD. Azure Storage blob containers and
Azure Disk Storage do not natively support authentication through Azure AD. However, Azure Disk Storage can be integrated with Azure AD using
Managed Service Identity (MSI) to authenticate to other Azure services that support Azure AD.
Therefore, the correct answers are Azure Storage file shares and Azure Data Lake Storage Gen2.
upvoted 2 times
Azure Storage blob containers also support authentication using Azure AD, as pointed out in one of your previous messages. Therefore, the correct
answers could be A) Azure Storage file shares and C) Azure Storage blob containers, or A) Azure Storage file shares and D) Azure Data Lake Storage
Gen2.
The statement "To enable AD DS authentication over SMB for Azure file shares, you need to register your storage account with AD DS" is incorrect.
To enable Azure Active Directory Domain Services (AD DS) authentication over SMB for Azure file shares, you need to create an AD DS domain, and
then join your Azure file shares to the AD DS domain. After you have completed these steps, you can use Azure AD DS to manage and authenticate
users and groups for access to the Azure file shares.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 8/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 3 times
HardcodedCloud 10 months ago
Selected Answer: CD
Correct
upvoted 2 times
yf 10 months ago
Selected Answer: CD
correct
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 9/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 1
HOTSPOT -
Your company is migrating data to Azure. The data contains Personally Identifiable Information (PII).
The company plans to use Microsoft Information Protection for the PII data store in Azure.
You need to recommend a solution to discover PII data at risk in the Azure resources.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Cloud to manage the organization's security posture and protect against threats to their workloads. Data resources remain a popular target for
malicious actors, making it crucial for security teams to identify, prioritize, and secure sensitive data resources across their cloud
environments. The integration with Microsoft Purview expands visibility into the data layer, enabling security teams to prioritize resources that
contain sensitive data.
References:
https://docs.microsoft.com/en-us/azure/purview/overview
https://docs.microsoft.com/en-us/azure/purview/how-to-integrate-with-azure-security-products
https://learn.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
https://learn.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
Defender for Cloud collects, analyzes, and integrates log data from your Azure, hybrid, and multicloud resources, the network, and connected
partner solutions, such as firewalls and endpoint agents. Defender for Cloud uses the log data to detect real threats and reduce false positives. A
list of prioritized security alerts is shown in Defender for Cloud along with the information you need to quickly investigate the problem and the
steps to take to remediate an attack.
upvoted 1 times
Classifications and labels applied to data resources in Microsoft Purview are ingested into Microsoft Defender for Cloud, which provides valuable
context for protecting resources. Microsoft Defender for Cloud uses the resource classifications and labels to identify potential attack paths and
security risks related to sensitive data. The resources in the Defender for Cloud's Inventory and Alerts pages are also enriched with the
classifications and labels discovered by Microsoft Purview, so your security teams can filter and focus to prioritize protecting your most sensitive
assets."
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 11/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 12/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #5 Topic 1
A. notebooks
B. playbooks
C. workbooks
D. threat intelligence
Correct Answer: C
After you connected your data sources to Microsoft Sentinel, you get instant visualization and analysis of data so that you can know what's
happening across all your connected data sources. Microsoft Sentinel gives you workbooks that provide you with the full power of tools already
available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use built-in
workbooks or create a new workbook easily, from scratch or based on an existing workbook.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/get-visibility
https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data
Once you have connected your data sources to Microsoft Sentinel, you can visualize and monitor the data using the Microsoft Sentinel adoption of
Azure Monitor Workbooks, which provides versatility in creating custom dashboards. While the Workbooks are displayed differently in Microsoft
Sentinel, it may be useful for you to see how to create interactive reports with Azure Monitor Workbooks. Microsoft Sentinel allows you to create
custom workbooks across your data, and also comes with built-in workbook templates to allow you to quickly gain insights across your data as
soon as you connect a data source.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 13/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
BillyB2022 10 months, 1 week ago
Selected Answer: C
Workbooks
https://docs.microsoft.com/en-us/azure/azure-monitor/visualize/workbooks-overview
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 14/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #6 Topic 1
Your company has a Microsoft 365 subscription and uses Microsoft Defender for Identity.
You are informed about incidents that relate to compromised identities.
You need to recommend a solution to expose several accounts for attackers to exploit. When the attackers attempt to exploit the accounts, an
alert must be triggered.
Which Defender for Identity feature should you include in the recommendation?
A. sensitivity labels
C. standalone sensors
Correct Answer: D
Honeytoken entities are used as traps for malicious actors. Any authentication associated with these honeytoken entities triggers an alert.
Incorrect:
https://learn.microsoft.com/en-us/defender-for-identity/entity-tags#honeytoken-tags
Honeytoken entities are used as traps for malicious actors. Any authentication associated with these honeytoken entities triggers an alert.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 15/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
BillyB2022 10 months, 1 week ago
Selected Answer: D
D. honeytoken entity tags
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 16/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #7 Topic 1
Your company is moving all on-premises workloads to Azure and Microsoft 365.
You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following
requirements:
✑ Minimizes manual intervention by security operation analysts
✑ Supports triaging alerts within Microsoft Teams channels
What should you include in the strategy?
A. KQL
B. playbooks
C. data connectors
D. workbooks
Correct Answer: B
Playbooks in Microsoft Sentinel are based on workflows built in Azure Logic Apps, a cloud service that helps you schedule, automate, and
orchestrate tasks and workflows across systems throughout the enterprise.
A playbook is a collection of these remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help automate and
orchestrate your threat response; it can be run manually or set to run automatically in response to specific alerts or incidents, when triggered by
an analytics rule or an automation rule, respectively.
Incorrect:
Not A: Kusto Query Language is a powerful tool to explore your data and discover patterns, identify anomalies and outliers, create statistical
modeling, and more.
The query uses schema entities that are organized in a hierarchy similar to SQL's: databases, tables, and columns.
Not D: Workbooks provide a flexible canvas for data analysis and the creation of rich visual reports within the Azure portal. They allow you to
tap into multiple data sources from across Azure, and combine them into unified interactive experiences.
Workbooks allow users to visualize the active alerts related to their resources.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/automate-responses-with-playbooks https://docs.microsoft.com/en-us/azure/azure-
monitor/visualize/workbooks-overview
https://learn.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook?tabs=LAC%2Cincidents#what-are-automation-rules-and-
playbooks
Playbooks are collections of procedures that can be run from Microsoft Sentinel in response to an alert or incident. A playbook can help automate
and orchestrate your response, and can be set to run automatically when specific alerts or incidents are generated, by being attached to an
analytics rule or an automation rule, respectively. It can also be run manually on-demand.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 17/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Answer is B
upvoted 3 times
OCHT 3 months, 1 week ago
Selected Answer: C
Data connecter
upvoted 1 times
Playbooks are collections of procedures that can be run from Microsoft Sentinel in response to an alert or incident. A playbook can help automate
and orchestrate your response, and can be set to run automatically when specific alerts or incidents are generated, by being attached to an
analytics rule or an automation rule, respectively. It can also be run manually on-demand.
Playbooks in Microsoft Sentinel are based on workflows built in Azure Logic Apps, which means that you get all the power, customizability, and
built-in templates of Logic Apps. Each playbook is created for the specific subscription to which it belongs, but the Playbooks display shows you all
the playbooks available across any selected subscriptions.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 18/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #8 Topic 1
You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases.
All resources are backed up multiple times a day by using Azure Backup.
You are developing a strategy to protect against ransomware attacks.
You need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a
successful ransomware attack.
Which two controls should you include in the recommendation? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Correct Answer: BE
Checks have been added to make sure only valid users can perform various operations. These include adding an extra layer of authentication.
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN before modifying online
backups.
Your backups need to be protected from sophisticated bot and malware attacks. Permanent loss of data can have significant cost and time
implications to your business. To help protect against this, Azure Backup guards against malicious attacks through deeper security, faster
notifications, and extended recoverability.
For deeper security, only users with valid Azure credentials will receive a security PIN generated by the Azure portal to allow them to backup
data. If a critical backup operation is authorized, such as ג€delete backup data,ג€ a notification is immediately sent so you can engage and
minimize the impact to your business. If a hacker does delete backup data, Azure Backup will store the deleted backup data for up to 14 days
after deletion.
E: Key benefits of Azure Monitor alerts include:
Monitor alerts at-scale via Backup center: In addition to enabling you to manage the alerts from Azure Monitor dashboard, Azure Backup also
provides an alert management experience tailored to backups via Backup center. This allows you to filter alerts by backup specific properties,
such as workload type, vault location, and so on, and a way to get quick visibility into the active backup security alerts that need attention.
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware
https://www.microsoft.com/security/blog/2017/01/05/azure-backup-protects-against-ransomware/ https://docs.microsoft.com/en-
us/azure/backup/move-to-azure-monitor-alerts
B is a valid answer choice- MFA or security PIN is a recommendation for permitting an online backup be modified or erased
C is "not" a valid answer choice- it's not needed since PMKs will be used to encrypt backups by default. CMK would add an extra layer of
encryption (using your own keys)
D is "not" a valid answer choice- Azure Backups should be stored in offline or off-site storage- and Azure Data Box would be the recommended
tooling. However, this is more of a 'perk' and doesn't help with the restoration. Assuming you have an online data store, by going offline you're
not necessarily adding anything but a more robust/faster backup transition.
E is a not a valid answer choice- I don’t understand what having notifications turned on would do in the case of preventing a ransomware attack
other than provide you knowledge that someone backed up your system.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature-cloud
Concerns about security issues, like malware, ransomware, and intrusion, are increasing. These security issues can be costly, in terms of both money
and data. To guard against such attacks, Azure Backup now provides security features to help protect backup data even after deletion.
One such feature is soft delete. With soft delete, even if a malicious actor deletes a backup (or backup data is accidentally deleted), the backup data
is retained for 14 additional days, allowing the recovery of that backup item with no data loss. The additional 14 days of retention for backup data
in the "soft delete" state don't incur any cost to you.
https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature#authentication-to-perform-critical-operations
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 20/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Soft delete and PIN; See step #4, #5 documented here: https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature#prevent-
attacks
upvoted 2 times
loverboz 3 months, 1 week ago
Selected Answer: AC
To ensure that Azure Backup can be used to restore resources in the event of a successful ransomware attack, the two controls that should be
enabled are:
A. Enable soft delete for backups: This feature ensures that backups are retained even if an attacker tries to delete them. The backups can be
recovered from the soft-deleted state within the retention period.
C. Encrypt backups by using customer-managed keys (CMKs): This feature ensures that backups are encrypted with keys that are under the control
of the customer, making it difficult for attackers to access and read the data.
Note: B, D, and E are not relevant controls for protecting against ransomware attacks in Azure Backup.
upvoted 1 times
I'd say it was A and E, as they are both listed, plus I'm not leaning towards the CMK answer, as it quotes "By default, backup data at rest is
encrypted using platform-managed keys (PMK). For vaulted backups, you can choose to use customer-managed keys (CMK) to own and manage
the encryption keys yourself. ", so CMK is added on top.
upvoted 2 times
A. Enable soft delete for backups: This feature allows you to recover your deleted backups for a retention period even if they were deleted due to
ransomware attacks or accidental deletion.
C. Encrypt backups by using customer-managed keys (CMKs): This control ensures that the backups are encrypted with customer-managed keys
(CMKs), which means that only the customer can decrypt the backup data, making it more secure against ransomware attacks.
Option A - "Enable soft delete for backups" allows you to recover backups that were accidentally or intentionally deleted by a ransomware attacker
before they are permanently deleted.
Option C - "Encrypt backups using customer-managed keys (CMKs)" protects backups against ransomware attacks since the encryption key is
managed by the customer rather than Azure. This means that ransomware attackers cannot access the encryption key and decrypt the backups.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 21/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
AC
A. Enable soft delete for backups - this allows for the recovery of deleted backups in case they are affected by ransomware attacks.
C. Encrypt backups by using customer-managed keys (CMKs) - this ensures that backups cannot be restored without the encryption keys, which
provides an additional layer of protection against ransomware attacks.
B. Require PINs for critical operations, E. Use Azure Monitor notifications when backup configurations change, and D. Perform offline backups to
Azure Data Box are not directly related to the recommended controls for protecting against ransomware attacks.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 22/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 1
HOTSPOT -
You are creating the security recommendations for an Azure App Service web app named App1. App1 has the following specifications:
✑ Users will request access to App1 through the My Apps portal. A human resources manager will approve the requests.
✑ Users will authenticate by using Azure Active Directory (Azure AD) user accounts.
You need to recommend an access security architecture for App1.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 23/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-access-package-create
upvoted 20 times
https://learn.microsoft.com/en-us/azure/app-service/configure-authentication-provider-aad
https://learn.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview#what-are-access-packages-and-what-
resources-can-i-manage-with-them
Entitlement management introduces the concept of an access package. An access package is a bundle of all the resources with the access a user
needs to work on a project or perform their task. Access packages are used to govern access for your internal employees, and also users outside
your organization.
upvoted 1 times
To enable Azure AD authentication for App1 and provide access security, the recommended solution is to use an Azure AD application. You should
create an Azure AD application, configure the necessary permissions, and assign users and groups to the application.
An access package in identity governance should be used to implement access requests for App1. Identity Governance provides access packages
that allow users to request access to specific applications, groups, or roles. The request is routed to the appropriate approver, who can either
approve or reject the request. Access packages can be created, managed, and assigned in the Azure portal, and can be customized to include
specific access policies and permissions. This provides a streamlined and secure way to manage access to App1, ensuring that only authorized
users can access sensitive data or resources.
upvoted 3 times
So you don't need to touch 'Azure AD application' settings at all. The app gets registered by default when following the steps above.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 24/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
BUt for the second option, the question to be lacking good answering because in the real lie you would just permit the group under the "groups"
for the publish apps and add it in there but i would go with B as that is the only sensible option available.
upvoted 1 times
https://www.mathworks.com/help/mps/server/configure-access-control-using-azure-ad.html
https://learn.microsoft.com/en-us/azure/app-service/configure-authentication-provider-aad
upvoted 2 times
Use managed identity. If managed identity isn't available, then use Key Vault.
The user identity doesn't need to flow further. Any additional security to reach backend services is handled with the app service's identity.
Once the app service has the authenticated identity, your system needs to connect to backend services as the app:
Use managed identity. If managed identity isn't available, then use Key Vault.
The user identity doesn't need to flow further. Any additional security to reach backend services is handled with the app service's identity.
https://learn.microsoft.com/en-us/azure/app-service/scenario-secure-app-authentication-app-service#connect-to-backend-services-as-app
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 25/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT -
Your company uses Microsoft Defender for Cloud and Microsoft Sentinel.
The company is designing an application that will have the architecture shown in the following exhibit.
You are designing a logging and auditing solution for the proposed architecture. The solution must meet the following requirements:
✑ Integrate Azure Web Application Firewall (WAF) logs with Microsoft Sentinel.
✑ Use Defender for Cloud to review alerts from the virtual machines.
What should you include in the solution? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 26/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 27/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
The Log Analytics agent is required for solutions, VM insights, and other services such as Microsoft Defender for Cloud.
Note: The Log Analytics agent in Azure Monitor can also be used to collect monitoring data from the guest operating system of virtual
machines. You may choose to use either or both depending on your requirements.
For the VM - we have to install the Log analytics agent in teh VM in the cloud or on premises
The ans is correct
upvoted 11 times
(As an example) Setup the Diagnostic Settings in Azure AD to stream data to a Log Analytics workspace that hosts Sentinel, you will notice that the
Azure AD connector becomes enabled.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 28/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
I know this would make more sense to just say 'enable the connector', but it's technically correct as well if you stream it to LA; it works the same as
if it was a data connector to Sentinel.
upvoted 1 times
zellck 1 month, 2 weeks ago
1. Data connectors
2. Log Analytics agent (but should use Azure Monitor Agent now)
https://learn.microsoft.com/en-us/azure/sentinel/data-connectors/azure-web-application-firewall-waf
https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 29/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel.
You plan to integrate Microsoft Sentinel with Splunk.
You need to recommend a solution to send security events from Microsoft Sentinel to Splunk.
What should you include in the recommendation?
Correct Answer: A
Microsoft Sentinel Add-On for Splunk allows Azure Log Analytics and Microsoft Sentinel users to ingest security logs from Splunk platform
using the Azure HTTP
Data Collector API.
Reference:
https://splunkbase.splunk.com/app/5312/
https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/azure-sentinel-side-by-side-with-splunk-via-eventhub/ba-p/2307029
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 30/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
The requirement mentioned in the question is Sentinel to send events to Splunk whereas Microsoft Sentinel Add-On for Splunk allows Azure Log
Analytics and Microsoft Sentinel users to ingest security logs from Splunk platform using the Azure HTTP Data Collector API.
For sentinel to send the events to Splunk - we need to use Event hub. Refer more here on this techcommunity link.
https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/azure-sentinel-side-by-side-with-splunk-via-eventhub/ba-p/2307029
upvoted 1 times
To set up the integration, you can create a new data connector in Sentinel and select the "Send to Splunk" option. You will need to provide the
Splunk server details and configure the mapping of the fields in the event data. Once the connector is set up, you can start forwarding the events
from Sentinel to Splunk for further analysis and correlation with other security data.
upvoted 2 times
https://lantern.splunk.com/Data_Descriptors/Microsoft/Getting_started_with_Microsoft_Azure_Event_Hub_data
upvoted 2 times
Option B (Azure Event Hubs) and Option D (Azure Data Factory) are not suitable solutions for sending security events from Microsoft Sentinel to
Splunk, as they are focused on data ingestion and processing rather than data integration between two SIEM solutions.
Option C (a Microsoft Sentinel workbook) is also not a suitable solution for this scenario, as a workbook is a type of report or dashboard that
provides insights into security data, but it does not provide the capability to send data from Sentinel to Splunk.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 31/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
For sending security events from Microsoft Sentinel to Splunk, you can recommend using a Microsoft Sentinel data connector. This data connector
allows you to export data from Microsoft Sentinel to a third-party SIEM solution such as Splunk, where it can be analyzed and used to enhance the
overall security posture of your organization.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 32/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications.
The customer discovers that several endpoints are infected with malware.
The customer suspends access attempts from the infected endpoints.
The malware is removed from the endpoints.
Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the
solution.
NOTE: Each correct selection is worth one point.
C. A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.
Correct Answer: AC
A: When a client acquires an access token to access a protected resource, the client also receives a refresh token. The refresh token is used to
obtain new access/refresh token pairs when the current access token expires. Refresh tokens are also used to acquire extra access tokens for
other resources.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 33/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
and the core of your user-centric policies to guarantee least-privileged access. Azure AD's Conditional Access capabilities are the policy
decision point for access to resource
Reference:
https://www.microsoft.com/security/blog/2022/02/17/4-best-practices-to-implement-a-comprehensive-zero-trust-security-approach/
https://docs.microsoft.com/en-us/azure/active-directory/develop/refresh-tokens
and I assume
"The manual or automated investigation and remediation is completed and the threat is removed. Defender for Endpoint sees that there's no risk
on the device and Intune assesses the device to be in a compliant state. Azure AD applies the policy, which allows access to applications."
Source: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/conditional-access?view=o365-worldwide
upvoted 1 times
Option A In the given scenario, the conditions mentioned were focused on verifying the cleanliness and compliance of the endpoints after malware
removal. So, while refreshing client access tokens can be beneficial for security, it is not one of the two specific conditions required in this scenario.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 34/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
Gurulee 2 months, 2 weeks ago
Selected Answer: AB
Best answers are A, B; my decision is based on MS guideline: "Next, we can configure device-based Conditional Access policies in Intune to enforce
restrictions based on device health and compliance. This will allow us to enforce more granular access decisions and fine-tune the Conditional
Access policies based on your organization’s risk appetite. For example, we might want to exclude certain device platforms from accessing specific
apps."
https://www.microsoft.com/en-us/security/blog/2020/05/26/zero-trust-deployment-guide-for-devices/
upvoted 1 times
Microsoft Intune reports the endpoints as compliant. This means that the endpoints meet the compliance requirements set by the organization.
Microsoft Defender for Endpoint reports the endpoints as compliant. This means that the endpoints have been scanned and no threats have been
detected.
upvoted 2 times
A. The client access tokens are refreshed: When access is denied due to malware infection, the client access tokens become invalid. The tokens
must be refreshed after malware removal to enable access again.
D. Microsoft Defender for Endpoint reports the endpoints as compliant: As the endpoints were infected with malware, they should be scanned by
an endpoint protection solution like Microsoft Defender for Endpoint. The security team should ensure that the endpoints are reported as
compliant by the endpoint protection solution before allowing access again.
On the other hand, Microsoft Defender for Endpoint is a unified endpoint protection platform that provides advanced threat protection and
endpoint detection and response (EDR) capabilities. It can help detect and respond to threats, as well as prevent future attacks by providing
security insights and recommendations.
upvoted 4 times
Therefore, in this scenario, the customer needs to ensure that both Microsoft Intune and Microsoft Defender for Endpoint report the endpoints
as compliant before allowing access to corporate applications again, as they serve complementary roles in endpoint security.
upvoted 1 times
The device is infected so a new token to be generated as previous token is already exposed. a refresh token can be used to generate a new access
token. So A is correct.
1. Assume Breach
2. Verify Explicitly
3. Principles of Least Privilege
Azure AD conditional access policy is already in place as it’s a mandatory to verify the user explicitly, moreover question confirms this stating that
user explicitly verifies the devices, so we don’t need a new one.
What’s required here is to connect the device to intune and defender for endpoint and perform a scan for vulnerabilities, this will help to measure
the device compliance against the known vulnerabilities if it’s fixed.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 35/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You said "connect the device to intune (Answer A) and defender for endpoint (Answer D) and perform a scan". So why did choose answer A and
not D?
Intune requires more setup and configuration than Defender for endpoint.
upvoted 2 times
B. Microsoft Intune reports the endpoints as compliant, meaning that the endpoint management solution has verified that the endpoint is secure
and meets the required security standards.
D. Microsoft Defender for Endpoint reports the endpoints as compliant, meaning that the endpoint security solution has verified that the endpoint
is free of malware and any other security threats.
Once both of these conditions are met, the customer can restore access to the corporate applications from the endpoints.
upvoted 3 times
Similarly, while creating a new Azure AD Conditional Access policy (option C) may be useful in other scenarios, it is not directly related to the
issue of infected endpoints. The customer needs to ensure that the endpoints are clean and meet the compliance requirements set by Microsoft
Intune and Microsoft Defender for Endpoint before allowing access to corporate applications again.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 36/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 37/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT -
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains a Microsoft Sentinel workspace. Microsoft Sentinel data connectors are configured for Microsoft 365, Microsoft
365 Defender,
Defender for Cloud, and Azure.
You plan to deploy Azure virtual machines that will run Windows Server.
You need to enable extended detection and response (EDR) and security orchestration, automation, and response (SOAR) capabilities for
Microsoft Sentinel.
How should you recommend enabling each capability? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 38/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Endpoint detection and response (EDR) and eXtended detection and response (XDR) are both part of Microsoft Defender.
https://docs.microsoft.com/en-us/microsoft-365/security/defender/eval-overview?view=o365-worldwide
upvoted 20 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers
https://learn.microsoft.com/en-us/azure/sentinel/automate-responses-with-playbooks
A playbook is a collection of these remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help automate and
orchestrate your threat response; it can be run manually on-demand on entities (in preview - see below) and alerts, or set to run automatically in
response to specific alerts or incidents, when triggered by an automation rule.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/integration-defender-for-endpoint?tabs=windows
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 39/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 40/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a customer that has a Microsoft 365 subscription and uses the Free edition of Azure Active Directory (Azure AD).
The customer plans to obtain an Azure subscription and provision several Azure resources.
You need to evaluate the customer's security environment.
What will necessitate an upgrade from the Azure AD Free edition to the Premium edition?
B. role-based authorization
C. resource-based authorization
Correct Answer: D
Multifactor authentication (MFA), an important component of the Zero Trust Model, is missing in Azure AD Free edition.
Reference:
https://www.microsoft.com/en-us/security/business/identity-access/azure-active-directory-pricing
https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure#license-requirements
Using this feature requires Azure AD Premium P2 licenses.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/active-directory/authentication/multi-factor-authentication-faq
https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/subscription-requirements
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 41/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Option B (role-based authorization) and Option C (resource-based authorization) are both supported in the Free edition of Azure AD, so they do
not require an upgrade to the Premium edition.
Option D (Azure AD Multi-Factor Authentication) is a feature that is available in both the Free and Premium editions of Azure AD, so it does not
necessitate an upgrade in this scenario.
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 42/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You are designing the security standards for a new Azure environment.
You need to design a privileged identity strategy based on the Zero Trust model.
Which framework should you follow to create the design?
Correct Answer: C
RaMP initiatives for Zero Trust.
To rapidly adopt Zero Trust in your organization, RaMP offers technical deployment guidance organized in these initiatives.
In particular, meet these deployment objectives to protect your privileged identities with Zero Trust.
1. Deploy secured privileged access to protect administrative user accounts.
2. Deploy Azure AD Privileged Identity Management (PIM) for a time-bound, just-in-time approval process for the use of privileged user
accounts.
Note 1: RaMP guidance takes a project management and checklist approach:
* User access and productivity
1. Explicitly validate trust for all access requests
Identities -
Endpoints (devices)
Apps -
Network -
* Data, compliance, and governance
2. Ransomware recovery readiness
3. Data
* Modernize security operations
4. Streamline response
5. Unify visibility
6. Reduce manual effort
Note 2: As an alternative to deployment guidance that provides detailed configuration steps for each of the technology pillars being protected
by Zero Trust principles, Rapid Modernization Plan (RaMP) guidance is based on initiatives and gives you a set of deployment paths to more
quickly implement key layers of protection.
By providing a suggested mapping of key stakeholders, implementers, and their accountabilities, you can more quickly organize an internal
project and define the tasks and owners to drive them to conclusion.
By providing a checklist of deployment objectives and implementation steps, you can see the bigger picture of infrastructure requirements and
track your progress.
Incorrect:
Not B: Enhanced Security Admin Environment (ESAE)
The Enhanced Security Admin Environment (ESAE) architecture (often referred to as red forest, admin forest, or hardened forest) is an approach
to provide a secure environment for Windows Server Active Directory (AD) administrators.
Microsoft's recommendation to use this architectural pattern has been replaced by the modern privileged access strategy and rapid
modernization plan (RAMP) guidance as the default recommended approach for securing privileged users. The ESAE hardened administrative
forest pattern (on-prem or cloud-based) is now considered a custom configuration suitable only for exception cases listed below.
What are the valid ESAE use cases?
While not a mainstream recommendation, this architectural pattern is valid in a limited set of scenarios.
In these exception cases, the organization must accept the increased technical complexity and operational costs of the solution. The
organization must have a sophisticated security program to measure risk, monitor risk, and apply consistent operational rigor to the usage and
maintenance of the ESAE implementation.
Example scenarios include:
Isolated on-premises environments - where cloud services are unavailable such as offline research laboratories, critical infrastructure or
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 43/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
utilities, disconnected operational technology (OT) environments such as Supervisory control and data acquisition (SCADA) / Industrial Control
Systems (ICS), and public sector customers that are fully reliant on on-premises technology.
Highly regulated environments ג€" industry or government regulation may specifically require an administrative forest configuration.
High level security assurance is mandated - organizations with low risk tolerance that are willing to accept the increased complexity and
operational cost of the solution.
Reference:
https://docs.microsoft.com/en-us/security/zero-trust/zero-trust-ramp-overview https://docs.microsoft.com/en-us/security/zero-trust/user-
access-productivity-validate-trust#identities https://docs.microsoft.com/en-us/security/compass/esae-retirement
https://docs.microsoft.com/en-us/security/compass/security-rapid-modernization-plan
This rapid modernization plan (RAMP) will help you quickly adopt Microsoft's recommended privileged access strategy.
upvoted 10 times
https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-ramp-overview
As an alternative to deployment guidance that provides detailed configuration steps for each of the technology pillars being protected by Zero
Trust principles, Rapid Modernization Plan (RaMP) guidance is based on initiatives and gives you a set of deployment paths to more quickly
implement key layers of protection.
upvoted 1 times
Rapid Modernization Plan (RaMP) is a framework developed by Microsoft to help organizations quickly implement key layers of protection based
on Zero Trust principles. Unlike traditional deployment guidance, RaMP guidance takes a project management and checklist approach to provide a
set of deployment paths and a checklist of deployment objectives and implementation steps. The framework provides a suggested mapping of key
stakeholders, implementers, and their accountabilities to help organizations organize internal projects and define tasks and owners to drive them
to completion. RaMP guidance helps organizations see the bigger picture of infrastructure requirements and track progress.
upvoted 2 times
https://learn.microsoft.com/en-us/security/zero-trust/user-access-productivity-validate-trust#identities
upvoted 2 times
tester18128075 9 months, 4 weeks ago
RaMP is correct
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 45/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription.
All on-premises servers in the perimeter network are prevented from connecting directly to the internet.
The customer recently recovered from a ransomware attack.
The customer plans to deploy Microsoft Sentinel.
You need to recommend solutions to meet the following requirements:
✑ Ensure that the security operations team can access the security logs and the operation logs.
✑ Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network.
Which two solutions should you include in the recommendation? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Correct Answer: BC
A: You can collect data in custom log formats to Microsoft Sentinel with the Log Analytics agent.
Note: You can use the Log Analytics agent to collect data in text files of nonstandard formats from both Windows and Linux computers. Once
collected, you can either parse the data into individual fields in your queries or extract the data during collection to individual fields.
You can connect your data sources to Microsoft Sentinel using custom log formats.
C: Microsoft Sentinel uses Azure role-based access control (Azure RBAC) to provide built-in roles that can be assigned to users, groups, and
services in Azure.
Use Azure RBAC to create and assign roles within your security operations team to grant appropriate access to Microsoft Sentinel. The different
roles give you fine-grained control over what Microsoft Sentinel users can see and do. Azure roles can be assigned in the Microsoft Sentinel
workspace directly (see note below), or in a subscription or resource group that the workspace belongs to, which Microsoft Sentinel inherits.
Incorrect:
A: You can collect data in custom log formats to Microsoft Sentinel with the Log Analytics agent.
Note: You can use the Log Analytics agent to collect data in text files of nonstandard formats from both Windows and Linux computers. Once
collected, you can either parse the data into individual fields in your queries or extract the data during collection to individual fields.
You can connect your data sources to Microsoft Sentinel using custom log formats.
Reference:
https://docs.microsoft.com/en-us/azure/azure-monitor/agents/agents-overview https://docs.microsoft.com/en-us/azure/sentinel/connect-
custom-logs?tabs=DCG https://docs.microsoft.com/en-us/azure/sentinel/roles
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 46/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
The link for B also states this Servers do not connect to the internet, Use the Log Analytics gateway Configuring a proxy to your agent
requires extra firewall rules to allow the Gateway to work.
upvoted 3 times
https://learn.microsoft.com/en-us/azure/sentinel/connect-data-sources#custom-logs
For some data sources, you can collect logs as files on Windows or Linux computers using the Log Analytics custom log collection agent.
https://learn.microsoft.com/en-us/azure/sentinel/resource-context-rbac
Typically, users who have access to a Microsoft Sentinel workspace also have access to all the workspace data, including security content.
Administrators can use Azure roles to configure access to specific features in Microsoft Sentinel, depending on the access requirements in their
team.
upvoted 1 times
A. A custom collector that uses the Log Analytics agent - this will allow you to collect security logs and operation logs from on-premises servers
and Microsoft 365, and send the logs to Microsoft Sentinel.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 47/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
C. Resource-based role-based access control (RBAC) - this will allow you to assign specific access permissions to different teams based on the
resources they need to access. For example, you can assign the security operations team access to both the security logs and the operation logs,
and assign the IT operations team access only to the operation logs, including the event logs of the servers in the perimeter network.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 48/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit.
You need to recommend a solution to isolate the compute components on an Azure virtual network.
What should you include in the recommendation?
Correct Answer: B
The Azure App Service Environment v2 is an Azure App Service feature that provides a fully isolated and dedicated environment for securely
running App Service apps at high scale. This capability can host your:
Docker containers -
Mobile apps -
Functions -
App Service environments (ASEs) are appropriate for application workloads that require:
Very high scale.
Isolation and secure network access.
High memory utilization.
Customers can create multiple ASEs within a single Azure region or across multiple Azure regions. This flexibility makes ASEs ideal for
horizontally scaling stateless application tiers in support of high requests per second (RPS) workloads.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/environment/intro
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 49/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: B
Answer is correct.
https://docs.microsoft.com/en-us/azure/app-service/environment/overview
upvoted 6 times
https://learn.microsoft.com/en-us/azure/app-service/environment/intro#overview
The Azure App Service Environment v2 is an Azure App Service feature that provides a fully isolated and dedicated environment for securely
running App Service apps at high scale.
upvoted 1 times
Azure Active Directory (Azure AD) enterprise applications, an Azure App Service Environment (ASE), and an Azure Active Directory (Azure AD)
application proxy are all valid solutions for different scenarios, but they do not address the specific requirement of isolating compute components
on an Azure virtual network.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 50/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
ASE is correct, webapps on this are hosted in your VNET in a dedicated subnet.
upvoted 4 times
The Azure App Service Environment (ASE) is a Premium feature offering of the Azure App Service. It gives a single-tenant instance of the Azure App
Service that runs right in your own Azure virtual network (VNet), providing network isolation and improved scaling capabilities.
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 51/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT
-
You are planning the security levels for a security access strategy.
You need to identify which job roles to configure at which security levels. The solution must meet security best practices of the Microsoft
Cybersecurity Reference Architectures (MCRA).
Which security level should you configure for each job role? To answer, select the appropriate options in the answer area.
Correct Answer:
https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-security-levels#specialized
Specialized security provides increased security controls for roles with an elevated business impact (if compromised by an attacker or malicious
insider).
Specialized roles typically include:
- Developers of business critical systems.
https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-security-levels#enterprise
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 52/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Enterprise security is suitable for all enterprise users and productivity scenarios. In the progression of the rapid modernization plan, enterprise also
serves as the starting point for specialized and privileged access as they progressively build on the security controls in enterprise security.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 53/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company plans to apply the Zero Trust Rapid Modernization Plan (RaMP) to its IT environment.
You need to recommend the top three modernization areas to prioritize as part of the plan.
Which three areas should you recommend based on RaMP? Each correct answer presents part of the solution.
https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-ramp-overview#ramp-initiatives-for-zero-trust
Top priority
- User access and productivity
- Data, compliance, and governance
- Modernize security operations
upvoted 1 times
As needed:
OT and Industrial IoT
Datacenter & DevOps Security
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 54/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 55/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT
-
For a Microsoft cloud environment, you are designing a security architecture based on the Microsoft Cybersecurity Reference Architectures
(MCRA).
You need to protect against the following external threats of an attack chain:
What should you include in the recommendation for each threat? To answer, select the appropriate options in the answer area.
Correct Answer:
https://learn.microsoft.com/en-us/defender-for-identity/what-is
Microsoft Defender for Identity (formerly Azure Advanced Threat Protection, also known as Azure ATP) is a cloud-based security solution that
leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious
insider actions directed at your organization.
upvoted 2 times
To protect against an attacker attempting lateral movement across domain-joined computers, the best solution would be to use Microsoft
Defender for Identity. It provides continuous monitoring of user activities, behavior analytics, and machine learning-based detection capabilities
to identify and block suspicious activities. It can also help identify and remediate weak passwords, and enforce multi-factor authentication (MFA)
policies to prevent unauthorized access. Microsoft Defender for Identity can also integrate with other security solutions, such as Azure Sentinel,
to provide a comprehensive security solution.
upvoted 1 times
However, if an attacker is attempting to exfiltrate data from a device or a network that is not connected to a cloud application, Microsoft
Defender for Cloud Apps may not be effective. In this case, Microsoft Defender for Office 365, which provides advanced threat protection
and data loss prevention policies, would be a better solution.
So, for protecting against an attacker attempting to exfiltrate data to external websites, the best solution would be to use Microsoft
Defender for Office 365, which is specifically designed for this purpose.
upvoted 1 times
Also, I am not even sure if Microsoft Defender for O365 can do DLP anymore, I believe that functionality has been shifted to Microsoft
Purview.
MDCA is designed for data exfiltration/tracking for websites, and CAN still perform DLP through its action portal (it has separate
functionality from Purview) on a variety of policy-types.
upvoted 1 times
For Box 2:
The recommendation should be MS Defender for Identity, as it can protect against lateral movement by detecting and blocking suspicious
activities across domain-joined computers. It can also identify and remediate misconfigurations and vulnerabilities in the identity infrastructure that
attackers could exploit to move laterally.
upvoted 5 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 57/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 58/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
For an Azure deployment, you are designing a security architecture based on the Microsoft Cloud Security Benchmark.
You need to recommend a best practice for implementing service accounts for Azure API management.
Correct Answer: B
AND
managed identity for the "to allow your API Management instance to easily and securely access other Azure AD-protected resources, such as Azure
Key Vault instead of using service principals." --> Managed Identity
Its poorly worded question but I would choose A since key consideration for an API gateway in general is authentication of developers which
warrants app registration.
upvoted 10 times
https://learn.microsoft.com/en-us/azure/api-management/api-management-howto-use-managed-service-identity
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 59/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
A managed identity generated by Azure Active Directory (Azure AD) allows your API Management instance to easily and securely access other
Azure AD-protected resources, such as Azure Key Vault. Azure manages this identity, so you don't have to provision or rotate any secrets.
upvoted 1 times
Tictactoe 1 month, 4 weeks ago
B right
upvoted 1 times
The recommended best practice for implementing service accounts for Azure API management based on the Microsoft Cloud Security Benchmark
is to use application registrations in Azure AD or managed identities in Azure.
Application registrations provide a way to define a set of permissions for a service account that can be used to authenticate and authorize access
to Azure API Management. They can also be used to configure Azure AD to issue tokens that can be used to access the API management service.
Managed identities in Azure provide a way to give Azure services an automatically managed identity in Azure AD. This identity can be used to
authenticate and authorize access to Azure resources, including Azure API management.
Using Azure service principals with usernames and passwords or certificate credentials is not recommended as they can be vulnerable to
compromise and misuse. Similarly, device registrations in Azure AD are not recommended for implementing service accounts for Azure API
management as they are intended for managing devices, not service accounts.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 60/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: B
https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-identity-management#im-3-manage-application-identities-securely-and-
automatically
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 61/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have an Azure AD tenant that syncs with an Active Directory Domain Services (AD DS) domain. Client computers run Windows and are hybrid-
joined to Azure AD.
You are designing a strategy to protect endpoints against ransomware. The strategy follows Microsoft Security Best Practices.
You plan to remove all the domain accounts from the Administrators groups on the Windows computers.
You need to recommend a solution that will provide users with administrative access to the Windows computers only when access is required.
The solution must minimize the lateral movement of ransomware attacks if an administrator account on a computer is compromised.
Correct Answer: A
https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview
Windows Local Administrator Password Solution (Windows LAPS) is a Windows feature that automatically manages and backs up the password of a
local administrator account on your Azure Active Directory-joined or Windows Server Active Directory-joined devices. You also can use Windows
LAPS to automatically manage and back up the Directory Services Restore Mode (DSRM) account password on your Windows Server Active
Directory domain controllers. An authorized administrator can retrieve the DSRM password and use it.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 62/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
PAW and Identity protection are not relevant so will reluctantly go with A.
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 63/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
29 DRAG DROP
For a Microsoft cloud environment, you need to recommend a security architecture that follows the Zero Trust principles of the Microsoft
Cybersecurity Reference Architectures (MCRA).
Which security methodologies should you include in the recommendation? To answer, drag the appropriate methodologies to the correct
principles. Each methodology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.
Correct Answer:
https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-overview#guiding-principles-of-zero-trust
- Assume breach
Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve
defenses.
- Verify explicitly
Always authenticate and authorize based on all available data points.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 64/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Finally JIT is providing access based on time period, Enforcing the 3rd in the list, Principles of Least Previlage
upvoted 3 times
Assume breach
Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve
defenses.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 65/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have legacy operational technology (OT) devices and IoT devices.
You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity
Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.
Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.
A. active scanning
B. threat monitoring
C. software patching
Correct Answer: BC
Slide 17 -
OT - Safety/Integrity/Availability
Hardware Age: 50-100 years (mechanical + electronic overlay)
Warranty length: up to 30-50 years
Protocols: Industry Specific (often bridged to IP networks)
Security Hygiene: Isolation, threat monitoring, managing vendor access risk, (patching rarely)
upvoted 6 times
OT Security hygiene is different because these systems frequently weren’t built with modern threats and protocols in mind (and often rely on ‘end
of life’ software). Many well-established IT security best practices like software patching aren’t practical or fully effective in an OT environment, so
they can only be selectively applied (or have a limited security effect). Basic security hygiene for OT starts with network isolation (including good
maintenance/monitoring of that isolation boundaries), threat monitoring, and carefully managing vendor access risk.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 66/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
B. Threat monitoring: Continuous monitoring and analysis of network traffic, system logs, and other data sources can help detect and respond to
threats and attacks targeting OT and IoT devices. Threat monitoring can help identify indicators of compromise (IoCs) and provide early warning of
potential security incidents.
D. Passive traffic monitoring: Passive traffic monitoring involves monitoring network traffic without actively sending packets or generating traffic.
This approach can help minimize the risk of disrupting business operations while still providing visibility into network activity and potential security
incidents. Passive traffic monitoring can also help identify anomalies and suspicious activity that may indicate a security threat.
upvoted 3 times
https://learn.microsoft.com/en-us/training/modules/use-microsoft-cybersecurity-reference-architecture-azure-security-benchmarks/3-
recommend-for-protecting-from-insider-external-attacks
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 67/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Which two security controls should you include as part of the Zero Trust solution? Each correct answer presents part of the solution.
Correct Answer: CD
https://learn.microsoft.com/en-us/security/zero-trust/deploy/identity#v-user-device-location-and-behavior-is-analyzed-in-real-time-to-determine-
risk-and-deliver-ongoing-protection
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 68/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #1 Topic 2
A. Deny
B. Modify
C. Append
D. Disabled
Correct Answer: D
This effect is useful for testing situations or for when the policy definition has parameterized the effect. This flexibility makes it possible to
disable a single assignment instead of disabling all of that policy's assignments.
An alternative to the Disabled effect is enforcementMode, which is set on the policy assignment. When enforcementMode is Disabled,
resources are still evaluated.
Incorrect:
Not A: Deny is used to prevent a resource request that doesn't match defined standards through a policy definition and fails the request.
Not B: Modify evaluates before the request gets processed by a Resource Provider during the creation or updating of a resource. The Modify
operations are applied to the request content when the if condition of the policy rule is met. Each Modify operation can specify a condition that
determines when it's applied.
Operations with conditions that are evaluated to false are skipped.
Not C: Append is used to add additional fields to the requested resource during creation or update.
Reference:
https://docs.microsoft.com/en-us/azure/governance/policy/concepts/effects
However, "Disabled" and "Enabled" are the two Azure Policy "enforcement" setting options. If an Azure Policy's "enforcement" is set to "Disabled",
any "effect" set on this Azure Policy will report but will not make changes.
"Disabled" is the best answer available, although technically incorrect because "Disabled" isn't an Azure Policy "effect".
upvoted 9 times
https://learn.microsoft.com/en-us/azure/governance/policy/concepts/effects#disabled
This effect is useful for testing situations or for when the policy definition has parameterized the effect. This flexibility makes it possible to disable a
single assignment instead of disabling all of that policy's assignments.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 69/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
alifrancos 2 months, 2 weeks ago
Selected Answer: D
the Deny effect, prevent ressources from creation if that not match the policy, but if it match it will be created or modified, i think that'is clear
upvoted 1 times
The Deny effect is a more appropriate and specific choice for evaluating compliance without changing any resources in an Azure environment, as it
explicitly blocks non-compliant resources from being created or modified while not modifying any existing resources. This can help ensure that the
environment remains in compliance and does not drift away from the desired state.
upvoted 2 times
This step gives you a chance to evaluate the compliance results of the new policy on existing resources without impacting workflow.
https://learn.microsoft.com/en-us/training/modules/evaluate-regulatory-compliance-strategy/5-design-validate-implementation-of-azure-policy
upvoted 2 times
https://brainscale.com/understanding-azure-policy/
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 71/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 2
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You are evaluating the Azure Security Benchmark V3 report as shown in the following exhibit.
You need to verify whether Microsoft Defender for servers is installed on all the virtual machines that run Windows.
Which compliance control should you evaluate?
A. Asset Management
C. Data Protection
D. Endpoint Security
E. Incident Response
Correct Answer: D
Microsoft Defender for servers compliance control installed on Windows
Defender for clout "Endpoint Security" azure security benchmark v3
Endpoint Security covers controls in endpoint detection and response, including use of endpoint detection and response (EDR) and anti-
malware service for endpoints in Azure environments.
Security Principle: Enable Endpoint Detection and Response (EDR) capabilities for VMs and integrate with SIEM and security operations
processes.
Azure Guidance: Azure Defender for servers (with Microsoft Defender for Endpoint integrated) provides EDR capability to prevent, detect,
investigate, and respond to advanced threats.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 72/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Use Microsoft Defender for Cloud to deploy Azure Defender for servers for your endpoint and integrate the alerts to your SIEM solution such as
Azure Sentinel.
Incorrect:
Not A: Asset Management covers controls to ensure security visibility and governance over Azure resources, including recommendations on
permissions for security personnel, security access to asset inventory, and managing approvals for services and resources (inventory, track, and
correct).
Not B: Posture and Vulnerability Management focuses on controls for assessing and improving Azure security posture, including vulnerability
scanning, penetration testing and remediation, as well as security configuration tracking, reporting, and correction in Azure resources.
Not C: Data Protection covers control of data protection at rest, in transit, and via authorized access mechanisms, including discover, classify,
protect, and monitor sensitive data assets using access control, encryption, key and certificate management in Azure.
Not E: Incident Response covers controls in incident response life cycle - preparation, detection and analysis, containment, and post-incident
activities, including using Azure services such as Microsoft Defender for Cloud and Sentinel to automate the incident response process.
Reference:
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-endpoint-security
https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-endpoint-security
upvoted 1 times
upvoted 4 times
Alex_Burlachenko 10 months, 1 week ago
great, and yes correct
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 74/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 2
HOTSPOT -
You have a Microsoft 365 E5 subscription and an Azure subscription.
You need to evaluate the existing environment to increase the overall security posture for the following components:
✑ Windows 11 devices managed by Microsoft Intune
✑ Azure Storage accounts
✑ Azure virtual machines
What should you use to evaluate the components? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Android -
iOS/iPadOS
Windows 10 -
Windows 11 -
Box 2: Microsoft Defender for Cloud
Microsoft Defender for Cloud currently protects Azure Blobs, Azure Files and Azure Data Lake Storage Gen2 resources. Microsoft Defender for
SQL on Azure price applies to SQL servers on Azure SQL Database, Azure SQL Managed Instance and Azure Virtual Machines.
Box 3: Microsoft 365 Compliance Center
Azure Storage Security Assessment: Microsoft 365 Compliance Center monitors and recommends encryption for Azure Storage, and within a
few clicks customers can enable built-in encryption for their Azure Storage Accounts.
Note: Microsoft 365 compliance is now called Microsoft Purview and the solutions within the compliance area have been rebranded.
Microsoft Purview can be setup to manage policies for one or more Azure Storage accounts.
Reference:
https://docs.microsoft.com/en-us/azure/purview/tutorial-data-owner-policies-storage https://docs.microsoft.com/en-us/microsoft-
365/security/defender/microsoft-365-defender
?
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint https://azure.microsoft.com/en-
gb/pricing/details/defender-for-cloud/
https://learn.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide
"Here's a list of the different Microsoft 365 Defender products and solutions:
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Microsoft Defender Vulnerability Management
Azure Active Directory Identity Protection
Microsoft Data Loss Prevention
App Governance
Microsoft Defender for Cloud"
upvoted 1 times
upvoted 2 times
zellck 1 month, 2 weeks ago
1. Microsoft 365 Defender
2. Microsoft Defender for Cloud.
3. Microsoft Defender for Cloud
https://learn.microsoft.com/en-us/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide#microsoft-365-defender-
protection
Microsoft 365 Defender services protect:
- Endpoints with Defender for Endpoint - Defender for Endpoint is a unified endpoint platform for preventative protection, post-breach detection,
automated investigation, and response.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-storage-introduction
Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects potential threats to your storage accounts.
It helps prevent the three major impacts on your data and workload: malicious file uploads, sensitive data exfiltration, and data corruption.
upvoted 1 times
Microsoft 365 Defender is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation,
and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 77/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 2
Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.
The company signs a contract with the United States government.
You need to review the current subscription for NIST 800-53 compliance.
What should you do first?
A. From Azure Policy, assign a built-in initiative that has a scope of the subscription.
B. From Microsoft Sentinel, configure the Microsoft Defender for Cloud data connector.
C. From Defender for Cloud, review the Azure security baseline for audit report.
D. From Microsoft Defender for Cloud Apps, create an access policy for cloud applications.
Correct Answer: A
The Azure Policy Regulatory Compliance built-in initiative definition maps to compliance domains and controls in NIST SP 800-53 Rev. 5.
The following mappings are to the NIST SP 800-53 Rev. 5 controls. Use the navigation on the right to jump directly to a specific compliance
domain. Many of the controls are implemented with an Azure Policy initiative definition. To review the complete initiative definition, open Policy
in the Azure portal and select the
Definitions page. Then, find and select the NIST SP 800-53 Rev. 5 Regulatory Compliance built-in initiative definition.
Reference:
https://docs.microsoft.com/en-us/azure/governance/policy/samples/gov-nist-sp-800-53-r5
https://learn.microsoft.com/en-us/azure/governance/policy/samples/nist-sp-800-53-r5
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 78/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: A
A, built in policy to comply with that regulation
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 79/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #5 Topic 2
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You have an Amazon Web Services (AWS) implementation.
You plan to extend the Azure security strategy to the AWS implementation. The solution will NOT use Azure Arc.
Which three services can you use to provide security for the AWS resources? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
E. Azure Policy
Azure Arc is a separate Azure service that enables you to manage servers, Kubernetes clusters, and applications on-premises, at the edge,
and in multi-cloud environments from a single control plane. It provides a centralized management experience and enables you to apply
policies, update servers, and deploy applications across your hybrid cloud environment.
However, if you want to use Azure Arc to manage your servers running on AWS, you can do so by using the Azure Arc enabled servers
feature. This feature allows you to onboard your AWS instances to Azure Arc and manage them through the Azure portal or Azure APIs. In
this case, you can also use Microsoft Defender for servers to extend protection to those AWS instances.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 80/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You can expand PIM to any delegated permission by controlling access to custom groups, such as the ones you created for access to AWS roles.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/architecture/guide/aws/aws-azure-security-solutions#workflow
Azure AD provides centralized single sign-on (SSO) and strong authentication through multifactor authentication and the conditional access
feature. Azure AD supports AWS role-based identities and authorization for access to AWS resources.
https://learn.microsoft.com/en-us/azure/architecture/guide/aws/aws-azure-security-solutions#defender-for-cloud-for-cspm-and-cwp-platforms-
cwpp
Microsoft Defender for Containers brings threat detection and advanced defenses to supported Amazon EKS clusters.
upvoted 2 times
You can expand PIM to any delegated permission by controlling access to custom groups, such as the ones you created for access to AWS roles
upvoted 1 times
and of course
- Microsoft defender for container because it doesn't need azure arc but the Microsoft defender for server does
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 81/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
1.) Defender for Servers does not need Azure Arc for AWS/GCP if using CSPM foundational (free) settings.
2.) Defender for Containers is in Preview for AWS/GCP accounts.
To add even more confusion, if these were onboarded with Defender for Endpoint, you do not even need Azure Arc anymore via Direct
Onboarding!
Granted that there's so much on the table being edited in the last few months and upcoming around Arc, wouldn't be surprised if this question
is scrapped soon.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-enable?tabs=aks-deploy-portal%2Ck8s-deploy-
asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-eks
upvoted 1 times
B. Microsoft Defender for servers - Microsoft Defender for servers can be used to provide endpoint protection for servers running in AWS.
C. Azure Active Directory (Azure AD) Conditional Access - Azure AD Conditional Access can be used to enforce policies for accessing AWS
resources, such as requiring multi-factor authentication (MFA) or blocking access from certain locations.
E. Azure Policy - Azure Policy can be used to enforce compliance policies for AWS resources, such as requiring encryption of storage accounts or
prohibiting the use of certain virtual machine sizes.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 82/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Option A (Microsoft Defender for Containers) and Option D (Azure AD Privileged Identity Management) are not applicable to securing AWS
resources.
upvoted 2 times
You can onboard the Azure Arc agent to your AWS or GCP servers automatically with the AWS or GCP multicloud connector. "
upvoted 1 times
C. Azure Active Directory (Azure AD) Conditional Access - Azure AD Conditional Access can be used to enforce access policies for cloud apps and
services, including those hosted on AWS.
E. Azure Policy - Azure Policy can be used to enforce compliance requirements and security policies for resources running on AWS.
upvoted 2 times
Option D, Azure Active Directory (Azure AD) Privileged Identity Management (PIM), is also not applicable in this scenario since it provides access
management for Azure resources and not AWS resources.
upvoted 2 times
Azure AD easily integrates with other Microsoft security solutions, like Microsoft Defender for Cloud Apps and Microsoft Sentinel. For more
information, see :
https://learn.microsoft.com/en-us/azure/architecture/reference-architectures/aws/aws-azure-ad-security
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 83/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #6 Topic 2
Your company has on-premises network in Seattle and an Azure subscription. The on-premises network contains a Remote Desktop server.
The company contracts a third-party development firm from France to develop and deploy resources to the virtual machines hosted in the Azure
subscription.
Currently, the firm establishes an RDP connection to the Remote Desktop server. From the Remote Desktop connection, the firm can access the
virtual machines hosted in Azure by using custom administrative tools installed on the Remote Desktop server. All the traffic to the Remote
Desktop server is captured by a firewall, and the firewall only allows specific connections from France to the server.
You need to recommend a modern security solution based on the Zero Trust model. The solution must minimize latency for developers.
Which three actions should you recommend? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Configure network security groups (NSGs) to allow access from only specific logical groupings of IP address ranges.
E. Configure Azure Active Directory (Azure AD) Conditional Access with multi-factor authentication (MFA) and named locations.
CDE.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/firewall/protect-azure-virtual-desktop?tabs=azure
Azure Virtual Desktop is a desktop and app virtualization service that runs on Azure. When an end user connects to an Azure Virtual Desktop
environment, their session is run by a host pool. A host pool is a collection of Azure virtual machines that register to Azure Virtual Desktop as
session hosts. These virtual machines run in your virtual network and are subject to the virtual network security controls. They need outbound
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 84/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Internet access to the Azure Virtual Desktop service to operate properly and might also need outbound Internet access for end users. Azure
Firewall can help you lock down your environment and filter outbound traffic.
upvoted 1 times
B. Deploy a Remote Desktop server to an Azure region located in France: This action will help reduce latency for developers by ensuring that they
have a closer connection to the Remote Desktop server. This can be achieved by deploying the Remote Desktop server in an Azure region located
in France.
E. Configure Azure Active Directory (Azure AD) Conditional Access with multi-factor authentication (MFA) and named locations: This action will help
ensure that only authorized users are allowed to access the resources. Azure AD Conditional Access can be used to enforce MFA and restrict access
based on named locations. This helps ensure that only authorized users are accessing the resources.
upvoted 1 times
Migrate from the Remote Desktop server to Azure Virtual Desktop: Azure Virtual Desktop is a modern solution that allows users to securely access
their virtual desktops and applications from any device, anywhere. By migrating from the on-premises Remote Desktop server to Azure Virtual
Desktop, you can provide secure remote access to the virtual machines hosted in Azure without compromising on security.
upvoted 1 times
A. Configure network security groups (NSGs) to allow access from only specific logical groupings of IP address ranges.
B. Deploy a Remote Desktop server to an Azure region located in France.
E. Configure Azure Active Directory (Azure AD) Conditional Access with multi-factor authentication (MFA) and named locations.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 85/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 86/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #7 Topic 2
HOTSPOT -
Your company has a multi-cloud environment that contains a Microsoft 365 subscription, an Azure subscription, and Amazon Web Services (AWS)
implementation.
You need to recommend a security posture management solution for the following components:
✑ Azure IoT Edge devices
Which services should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
alerts.
Box 2: Microsoft Defender for Cloud and Azure Arc
Microsoft Defender for Cloud provides the following features in the CSPM (Cloud Security Posture Management) category in the multi-cloud
scenario for AWS.
Take into account that some of them require Defender plan to be enabled (such as Regulatory Compliance):
* Detection of security misconfigurations
* Single view showing Security Center recommendations and AWS Security Hub findings
* Incorporation of AWS resources into Security Center's secure score calculations
* Regulatory compliance assessments of AWS resources
Security Center uses Azure Arc to deploy the Log Analytics agent to AWS instances.
Incorrect:
AWS EC2 Microsoft Defender for Cloud Apps
Amazon Web Services is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the
benefits of leveraging infrastructure in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include
storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and
virtual private networks that enable access to your organization.
Connecting AWS to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in
activities, notifying on possible brute force attacks, malicious use of a privileged user account, unusual deletions of VMs, and publicly exposed
storage buckets.
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-iot/device-builders/security-edge-architecture
https://samilamppu.com/2021/11/04/multi-cloud-security-posture-management-in-microsoft-defender-for-cloud/
https://learn.microsoft.com/en-us/azure/defender-for-iot/organizations/overview
Microsoft Defender for IoT is a unified security solution built specifically to identify IoT and OT devices, vulnerabilities, and threats. Use Defender
for IoT to secure your entire IoT/OT environment, including existing devices that may not have built-in security agents.
https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-aws?pivots=env-settings
With cloud workloads commonly spanning multiple cloud platforms, cloud security services must do the same. Microsoft Defender for Cloud
protects workloads in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), GitHub and Azure DevOps (ADO).
upvoted 1 times
SAMSH 9 months, 2 weeks ago
was in 20Sep2020 exam
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 89/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #8 Topic 2
A. Deploy Azure Virtual Desktop, Azure Active Directory (Azure AD) Conditional Access, and Microsoft Defender for Cloud Apps.
C. Deploy Microsoft Endpoint Manager and Azure Active Directory (Azure AD) Conditional Access.
Correct Answer: A
You can connect an Azure Virtual Desktop to an on-premises network using a virtual private network (VPN), or use Azure ExpressRoute to
extend the on- premises network into the Azure cloud over a private connection.
* Azure AD: Azure Virtual Desktop uses Azure AD for identity and access management. Azure AD integration applies Azure AD security features
like conditional access, multi-factor authentication, and the Intelligent Security Graph, and helps maintain app compatibility in domain-joined
VMs.
* Azure Virtual Desktop, enable Microsoft Defender for Cloud.
We recommend enabling Microsoft Defender for Cloud's enhanced security features to:
Manage vulnerabilities.
Assess compliance with common frameworks like PCI.
* Microsoft Defender for Cloud Apps, formerly known as Microsoft Cloud App Security, is a comprehensive solution for security and compliance
teams enabling users in the organization, local and remote, to safely adopt business applications without compromising productivity.
Reference:
https://docs.microsoft.com/en-us/azure/architecture/example-scenario/wvd/windows-virtual-desktop https://docs.microsoft.com/en-
us/azure/virtual-desktop/security-guide https://techcommunity.microsoft.com/t5/security-compliance-and-identity/announcing-microsoft-
defender-for-cloud-apps/ba-p/2835842
https://learn.microsoft.com/en-us/azure/virtual-desktop/overview
https://learn.microsoft.com/en-us/azure/virtual-desktop/set-up-mfa
Users can sign into Azure Virtual Desktop from anywhere using different devices and clients. However, there are certain measures you should take
to help keep yourself and your users safe. Using Azure Active Directory (Azure AD) Multi-Factor Authentication (MFA) with Azure Virtual Desktop
prompts users during the sign-in process for another form of identification in addition to their username and password. You can enforce MFA for
Azure Virtual Desktop using Conditional Access, and can also configure whether it applies to the web client, mobile apps, desktop clients, or all
clients.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 90/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
This solution also provides a single console for managing devices and applications across all platforms including Windows, Android, iOS, and
macOS.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 91/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 2
C. Microsoft Sentinel
D. Azure Firewall
Correct Answer: BC
B: Azure identity and access for landing zones, Privileged Identity Management (PIM)
Use Azure AD Privileged Identity Management (PIM) to establish zero-trust and least privilege access. Map your organization's roles to the
minimum access levels needed. Azure AD PIM can use Azure native tools, extend current tools and processes, or use both current and native
tools as needed.
Azure identity and access for landing zones, Design recommendations include:
* (B) Use Azure AD managed identities for Azure resources to avoid credential-based authentication. Many security breaches of public cloud
resources originate with credential theft embedded in code or other text. Enforcing managed identities for programmatic access greatly
reduces the risk of credential theft.
* Etc.
C: Improve landing zone security, onboard Microsoft Sentinel
You can enable Microsoft Sentinel, and then set up data connectors to monitor and protect your environment. After you connect your data
sources using data connectors, you choose from a gallery of expertly created workbooks that surface insights based on your data. These
workbooks can be easily customized to your needs.
Note: Landing zone security best practices
The following list of reference architectures and best practices provides examples of ways to improve landing zone security:
Microsoft Defender for Cloud: Onboard a subscription to Defender for Cloud.
Microsoft Sentinel: Onboard to Microsoft Sentinel to provide a security information event management (SIEM) and security orchestration
automated response
(SOAR) solution.
Secure network architecture: Reference architecture for implementing a perimeter network and secure network architecture.
Identity management and access control: Series of best practices for implementing identity and access to secure a landing zone in Azure.
Network security practices: Provides additional best practices for securing the network.
Operational security provides best practices for increasing operational security in Azure.
The Security Baseline discipline: Example of developing a governance-driven security baseline to enforce security requirements.
Incorrect:
Not E: Implementing alerts is not a preventive measure.
Reference:
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/ready/landing-zone/design-area/identity-access-landing-zones
https://docs.microsoft.com/en-us/azure/sentinel/quickstart-onboard
Well, disagree. This is about landing zones and if you scroll down here, I'd say PIM would definitely be an answer.
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/landing-zone/design-area/security
upvoted 5 times
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/landing-zone/design-area/identity-access-landing-
zones#privileged-identity-management-pim
upvoted 1 times
Both Azure WAF and Azure Firewall help increase the secure score by providing essential security controls to protect your Azure landing zones.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls#security-controls-and-their-recommendations
- Restrict unauthorized network access
Azure offers a suite of tools designed to ensure accesses across your network meet the highest security standards.
Use these recommendations to manage Defender for Cloud's adaptive network hardening settings, ensure you’ve configured Azure Private Link for
all relevant PaaS services, enable Azure Firewall on your virtual networks, and more.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 93/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
D. Cortafuegos de Azure - Ayuda a proteger los recursos de Azure en la nube de tráfico de red no deseado. Se puede configurar para permitir o
denegar el tráfico de red basado en origen y destino, dirección IP y puerto de origen y destino.
B, C y E también son soluciones de seguridad importantes, pero no son específicas para los controles preventivos en las zonas de aterrizaje de
Azure.
upvoted 1 times
D. Azure Firewall: It provides network-level protection to the resources deployed in Azure. It can be used to enforce network security policies and
filtering rules to control access to network resources.
B. Azure Active Directory (Azure AD) Privileged Identity Management (PIM): It is used to manage, control, and monitor access to resources in Azure.
It allows you to grant just-in-time access to the resources that need to be accessed and monitor access to resources to prevent misuse.
upvoted 4 times
Preventive controls are proactive security measures that aim to prevent security incidents from occurring in the first place. Examples of
preventive controls include Azure Firewall, Azure AD PIM, and Microsoft Defender for Cloud alerts, as they help to prevent unauthorized access,
mitigate security risks, and improve overall security posture. (ChatGPT)
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 94/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
buguinha 4 months, 3 weeks ago
BE Defender for Cloud and PIM
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 95/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
A. Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed keys.
B. Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.
C. Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM.
D. Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HSM.
Correct Answer: CD
C: Azure Key Vault Managed HSM (Hardware Security Module) is a fully managed, highly available, single-tenant, standards-compliant cloud
service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs.
D: You can generate HSM-protected keys in your on-premise HSM and import them securely into Managed HSM.
Incorrect:
Not A: The company must manage the keys, not Microsoft.
Reference:
https://docs.microsoft.com/en-us/azure/key-vault/managed-hsm/overview
https://learn.microsoft.com/en-us/azure/azure-sql/database/transparent-data-encryption-byok-overview?view=azuresql
Azure SQL transparent data encryption (TDE) with customer-managed key (CMK) enables Bring Your Own Key (BYOK) scenario for data protection
at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed TDE, the
customer is responsible for and in a full control of a key lifecycle management (key creation, upload, rotation, deletion), key usage permissions, and
auditing of operations on keys.
upvoted 1 times
managed keys are suitable for encrypting cardholder data as per compliance requirements.
B. Storing insurance claim data in Azure Blob storage encrypted with customer-provided keys allows for encryption of the data. By using on-
premises keys, the company maintains control over the encryption keys and meets the requirement for encrypting insurance claim files.
upvoted 1 times
Tictactoe 1 month, 4 weeks ago
AB is right
upvoted 1 times
La opción B (Almacene los datos de reclamaciones de seguros en Azure Blob Storage cifrados mediante claves proporcionadas por el cliente)
cumple con el requisito de cifrar los archivos de reclamos de seguros mediante el uso de claves de cifrado alojadas en las instalaciones del cliente.
La opción C (Almacenar los datos del titular de la tarjeta en una base de datos de Azure SQL cifrada mediante el uso de claves almacenadas en
Azure Key Vault Managed HSM) cumple con el requisito de cifrar los datos del titular de la tarjeta mediante el uso de claves de cifrado
administradas por la empresa. Azure Key Vault Managed HSM proporciona una solución segura y gestionada para el almacenamiento de claves.
upvoted 2 times
- B:Encrypt insurance - "key hosted on prem" - only customer-provided key is store in customer store in on-prem, (HYOK). Take a look at table
under link and read article.
https://learn.microsoft.com/en-us/azure/storage/common/storage-service-encryption#about-encryption-key-management
https://azure.microsoft.com/en-us/blog/customer-provided-keys-with-azure-storage-service-encryption/
Keys "hosted on-premises" doesn't fit answer "D" ("...encrypted using Azure Key Vault HSM"). If the files are "encrypted uisng Azure Key Vault
HSM", the keys are not "hosted on-premises".
The best matching answer for the insurance claim files is "B" -- encrypted using "customer provided keys".
upvoted 5 times
https://azure.microsoft.com/en-us/blog/customer-provided-keys-with-azure-storage-service-encryption/
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 98/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You need to enforce ISO 27001:2013 standards for the subscription. The solution must ensure that noncompliant resources are remediated
automatically.
What should you use?
A. Azure Policy
B. Azure Blueprints
Correct Answer: A
Control mapping of the ISO 27001 Shared Services blueprint sample
The following mappings are to the ISO 27001:2013 controls. Use the navigation on the right to jump directly to a specific control mapping. Many
of the mapped controls are implemented with an Azure Policy initiative.
Open Policy in the Azure portal and select the Definitions page. Then, find and select the [Preview] Audit ISO 27001:2013 controls and deploy
specific VM
Extensions to support audit requirements built-in policy initiative.
Note: Security Center can now auto provision the Azure Policy's Guest Configuration extension (in preview)
Azure Policy can audit settings inside a machine, both for machines running in Azure and Arc connected machines. The validation is performed
by the Guest
Configuration extension and client.
With this update, you can now set Security Center to automatically provision this extension to all supported machines.
Enforcing a secure configuration, based on a specific recommendation, is offered in two modes:
Using the Deny effect of Azure Policy, you can stop unhealthy resources from being created
Using the Enforce option, you can take advantage of Azure Policy's DeployIfNotExist effect and automatically remediate non-compliant
resources upon creation
Reference:
https://docs.microsoft.com/en-us/azure/governance/blueprints/samples/iso27001-shared/control-mapping https://docs.microsoft.com/en-
us/azure/defender-for-cloud/release-notes-archive https://docs.microsoft.com/en-us/azure/defender-for-cloud/prevent-misconfigurations
https://learn.microsoft.com/en-us/azure/governance/policy/overview
Azure Policy helps to enforce organizational standards and to assess compliance at-scale. Through its compliance dashboard, it provides an
aggregated view to evaluate the overall state of the environment, with the ability to drill down to the per-resource, per-policy granularity. It also
helps to bring your resources to compliance through bulk remediation for existing resources and automatic remediation for new resources.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 99/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Automatic remediation was the key requirement here for me and it aligns directly with Azure Policy
upvoted 1 times
KrishnaSK1 5 months ago
Selected Answer: A
https://learn.microsoft.com/en-us/azure/governance/policy/how-to/remediate-resources?tabs=azure-portal
upvoted 1 times
yep, correct
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 101/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
DRAG DROP -
You have a Microsoft 365 subscription.
You need to recommend a security solution to monitor the following activities:
✑ User accounts that were potentially compromised
✑ Users performing bulk file downloads from Microsoft SharePoint Online
What should you include in the recommendation for each activity? To answer, drag the appropriate components to the correct activities. Each
component may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 102/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks#nonpremium-user-risk-detections
https://learn.microsoft.com/en-us/defender-cloud-apps/policies-threat-protection#detect-mass-download-data-exfiltration
Detect when a certain user accesses or downloads a massive number of files in a short period of time.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 103/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud.
You receive the following recommendations in Defender for Cloud
✑ Access to storage accounts with firewall and virtual network configurations should be restricted.
✑ Storage accounts should restrict network access using virtual network rules.
✑ Storage account should use a private link connection.
✑ Storage account public access should be disallowed.
You need to recommend a service to mitigate identified risks that relate to the recommendations.
What should you recommend?
A. Azure Policy
D. Microsoft Sentinel
Correct Answer: A
An Azure Policy definition, created in Azure Policy, is a rule about specific security conditions that you want controlled. Built in definitions
include things like controlling what type of resources can be deployed or enforcing the use of tags on all resources. You can also create your
own custom policy definitions.
Note: Azure security baseline for Azure Storage
This security baseline applies guidance from the Azure Security Benchmark version 1.0 to Azure Storage. The Azure Security Benchmark
provides recommendations on how you can secure your cloud solutions on Azure. The content is grouped by the security controls defined by
the Azure Security
Benchmark and the related guidance applicable to Azure Storage.
You can monitor this security baseline and its recommendations using Microsoft Defender for Cloud. Azure Policy definitions will be listed in
the Regulatory
Compliance section of the Microsoft Defender for Cloud dashboard.
For example:
* 1.1: Protect Azure resources within virtual networks
Guidance: Configure your storage account's firewall by restricting access to clients from specific public IP address ranges, select virtual
networks, or specific
Azure resources. You can also configure Private Endpoints so traffic to the storage service from your enterprise travels exclusively over private
networks.
* 1.8: Minimize complexity and administrative overhead of network security rules
Guidance: For resource in Virtual Networks that need access to your Storage account, use Virtual Network Service tags for the configured
Virtual Network to define network access controls on network security groups or Azure Firewall. You can use service tags in place of specific IP
addresses when creating security rules.
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/security-policy-concept https://docs.microsoft.com/en-
us/security/benchmark/azure/baselines/storage-security-baseline
https://learn.microsoft.com/en-us/azure/governance/policy/overview
Azure Policy helps to enforce organizational standards and to assess compliance at-scale. Through its compliance dashboard, it provides an
aggregated view to evaluate the overall state of the environment, with the ability to drill down to the per-resource, per-policy granularity. It also
helps to bring your resources to compliance through bulk remediation for existing resources and automatic remediation for new resources.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 104/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
TJ001 6 months, 1 week ago
Policy however it needs to have the right effect set 'deployifnotexists' to remediate existing workloads..
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 105/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.)
After remediating the threat, which policy definition should you assign to prevent the threat from reoccurring?
B. Azure Key Vault Managed HSM should have purge protection enabled
Correct Answer: A
Anonymous public read access to containers and blobs in Azure Storage is a convenient way to share data, but may also present a security risk.
It's important to manage anonymous access judiciously and to understand how to evaluate anonymous access to your data. Operational
complexity, human error, or malicious attack against data that is publicly accessible can result in costly data breaches. Microsoft recommends
that you enable anonymous access only when necessary for your application scenario.
Note: Attackers have been crawling for public containers using tools such as MicroBurst.
Exploiting Anonymous Blob Access
Now, there are thousands of articles explaining how this can be abused and how to search for insecure storage in Azure. One of the easiest way
is to use
MicroBurst, provide the storage account name to search for, and it'll check if the containers exists based on a wordlist saved in the
Misc/permutations.txt
Reference:
https://docs.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent https://hackingthe.cloud/azure/anonymous-blob-
access/
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 106/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
C is the correct answer. You should read Microburst toolkit - it is an open-source tool. Find Get-AZStorageKeysREST.ps1 it tries to enumerate all
storage accounts then the respective storage keys. There is nothing to do with anonymous access here. Even if a storage account allows public
acces you can't get the key without being authenticated and authorized.
https://learn.microsoft.com/en-us/azure/storage/common/shared-key-authorization-prevent?tabs=portal
Every secure request to an Azure Storage account must be authorized. By default, requests can be authorized with either Azure Active Directory
(Azure AD) credentials, or by using the account access key for Shared Key authorization. Of these two types of authorization, Azure AD provides
superior security and ease of use over Shared Key, and is recommended by Microsoft. To require clients to use Azure AD to authorize requests, you
can disallow requests to the storage account that are authorized with Shared Key.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 107/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
C is the only answer that makes sense. Alert was triggered by an authenticated user "Sample user", data was found in Azure Activity Logs and
Resource Managment Operations. For this reason I think C is the answer. Alert and question has nothing to do with public or anonymous access.
upvoted 3 times
threshclo 6 months, 2 weeks ago
Selected Answer: C
C is the only answer that makes sense
upvoted 3 times
Source: https://learn.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent?tabs=portal
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 108/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: AF
An Azure Management group is logical containers that allow Azure Administrators to manage access, policy, and compliance across multiple
Azure Subscriptions en masse.
If your organization has many Azure subscriptions, you may need a way to efficiently manage access, policies, and compliance for those
subscriptions.
Management groups provide a governance scope above subscriptions. You organize subscriptions into management groups the governance
conditions you apply cascade by inheritance to all associated subscriptions.
F: Blueprint definition locations
When creating a blueprint definition, you'll define where the blueprint is saved. Blueprints can be saved to a management group or subscription
that you have
Contributor access to. If the location is a management group, the blueprint is available to assign to any child subscription of that management
group.
A: Create and assign an initiative definition
With an initiative definition, you can group several policy definitions to achieve one overarching goal. An initiative evaluates resources within
scope of the assignment for compliance to the included policies.
Note: The Azure Policy Regulatory Compliance built-in initiative definition maps to compliance domains and controls in ISO 27001:2013.
The Azure Policy control mapping provides details on policy definitions included within this blueprint and how these policy definitions map to
the compliance domains and controls in ISO 27001. When assigned to an architecture, resources are evaluated by Azure Policy for non-
compliance with assigned policy definitions.
Incorrect:
Not B, D, E: If you plan to apply this policy definition to multiple subscriptions, the location must be a management group that contains the
subscriptions you assign the policy to. The same is true for an initiative definition.
Reference:
https://docs.microsoft.com/en-us/azure/governance/management-groups/overview https://docs.microsoft.com/en-
us/azure/governance/blueprints/overview https://docs.microsoft.com/en-us/azure/governance/policy/samples/iso-27001
https://docs.microsoft.com/en-us/azure/governance/policy/tutorials/create-and-manage
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 109/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: AF
AF is the answer.
https://learn.microsoft.com/en-us/azure/governance/blueprints/samples/iso-27001-2013
https://learn.microsoft.com/en-us/azure/governance/policy/samples/iso-27001
upvoted 1 times
Initiative - collection of policy definitions that are tailored towards achieving a singular overarching goal
Blueprint - Enables the creation of fully governed environments in a repetitive manner using policies & initiatives.
A -> Ensures compliance of existing resources in the environment
F-> Ensures compliance for any resources getting created in the environment
upvoted 4 times
https://learn.microsoft.com/en-us/azure/governance/blueprints/overview
upvoted 1 times
https://learn.microsoft.com/en-us/azure/governance/blueprints/overview
upvoted 2 times
upvoted 1 times
EmmanuelDan 8 months ago
yes you can I just finished watching Azure Fridays on Blueprint, and the architects for blueprints mentioned that you can assign blueprints to
management groups
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 111/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT -
You open Microsoft Defender for Cloud as shown in the following exhibit.
Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 112/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls#security-controls-and-their-recommendations
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 113/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
NSG + MDfS
upvoted 1 times
- Enable endpoint protection = Defender for Cloud checks your organization’s endpoints for active threat detection and response solutions such as
[list], [list] shows Defender for Servers and/or Defender for Containers.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 114/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
NSG definetley...
https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/security-control-restrict-unauthorized-network-access/ba-p/1593833
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 115/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You are evaluating the Azure Security Benchmark V3 report.
In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.
You need to recommend configurations to increase the score of the Secure management ports controls.
Solution: You recommend enabling the VMAccess extension on all virtual machines.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead: You recommend enabling just-in-time (JIT) VM access on all virtual machines.
Note:
Secure management ports - Brute force attacks often target management ports. Use these recommendations to reduce your exposure with
tools like just-in-time
VM access and network security groups.
Recommendations:
- Internet-facing virtual machines should be protected with network security groups
- Management ports of virtual machines should be protected with just-in-time network access control
- Management ports should be closed on your virtual machines
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls
JIT: https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-2-avoid-standing-access-for-user-
accounts-and-permissions
https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls#security-controls-and-their-recommendations
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 116/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 117/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You are evaluating the Azure Security Benchmark V3 report.
In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.
You need to recommend configurations to increase the score of the Secure management ports controls.
Solution: You recommend enabling adaptive network hardening.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead: You recommend enabling just-in-time (JIT) VM access on all virtual machines.
Note:
Secure management ports - Brute force attacks often target management ports. Use these recommendations to reduce your exposure with
tools like just-in-time
VM access and network security groups.
Recommendations:
- Internet-facing virtual machines should be protected with network security groups
- Management ports of virtual machines should be protected with just-in-time network access control
- Management ports should be closed on your virtual machines
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls
JIT: https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-2-avoid-standing-access-for-user-
accounts-and-permissions
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 118/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
100%. Adaptive network hardening is to address "Restrict Unauthorized Network Access", and not management ports.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls#security-controls-and-their-recommendations
- Internet-facing virtual machines should be protected with network security groups
- Management ports of virtual machines should be protected with just-in-time network access control
- Management ports should be closed on your virtual machines
upvoted 1 times
Enabling adaptive network hardening in Microsoft Defender for Cloud can help improve the security posture of your network by providing
recommendations for network security group (NSG) rules. However, it does not directly impact the score of the Secure management ports controls
in the Azure Security Benchmark V3 report.
To increase the score for the Secure management ports controls, you should focus on implementing recommendations specific to securing
management ports, such as restricting access to management ports, enabling just-in-time VM access, and using Azure Bastion for secure access to
your virtual machines.
upvoted 1 times
"Secure management ports - Brute force attacks often target management ports. Use these recommendations to reduce your exposure with tools
like just-in-time VM access and network security groups."
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 119/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
Learing 8 months, 1 week ago
Selected Answer: B
https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls#security-controls-and-their-recommendations
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 120/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You are evaluating the Azure Security Benchmark V3 report.
In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.
You need to recommend configurations to increase the score of the Secure management ports controls.
Solution: You recommend enabling just-in-time (JIT) VM access on all virtual machines.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Secure management ports - Brute force attacks often target management ports. Use these recommendations to reduce your exposure with
tools like just-in-time
VM access and network security groups.
Recommendations:
- Internet-facing virtual machines should be protected with network security groups
- Management ports of virtual machines should be protected with just-in-time network access control
- Management ports should be closed on your virtual machines
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls
JIT: https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-2-avoid-standing-access-for-user-
accounts-and-permissions
https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls#security-controls-and-their-recommendations
- Internet-facing virtual machines should be protected with network security groups
- Management ports of virtual machines should be protected with just-in-time network access control
- Management ports should be closed on your virtual machines
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 121/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
[Removed] 6 months, 1 week ago
There are 3 recommendations, at this link. JIT is one of the 3.
https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/security-control-secure-management-ports/ba-p/1505770
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 122/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your on-premises network contains an e-commerce web app that was developed in Angular and Node,js. The web app uses a MongoDB database.
You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.
You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust
model.
Solution: You recommend creating private endpoints for the web app and the database layer.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
How to Use Azure Private Endpoints to Restrict Public Access to WebApps.
As an Azure administrator or architect, you are sometimes asked the question: ג€How can we safely deploy internal business applications to
Azure App Services?ג€
These applications characteristically are:
Not accessible from the public internet.
Accessible from within the on-premises corporate network
Accessible via an authorized VPN client from outside the corporate network.
For such scenarios, we can use Azure Private Links, which enables private and secure access to Azure PaaS services over Azure Private
Endpoints, along with the Site-to-Site VPN, Point-to-Site VPN, or the Express Route. Azure Private Endpoint is a read-only network interface
service associated with the Azure PAAS
Services. It allows you to bring deployed sites into your virtual network, limiting access to them at the network level.
It uses one of the private IP addresses from your Azure VNet and associates it with the Azure App Services. These services are called Private
Link resources.
They can be Azure Storage, Azure Cosmos DB, SQL, App Services Web App, your own / partner owned services, Azure Backups, Event Grids,
Azure Service
Bus, or Azure Automations.
Reference:
https://www.varonis.com/blog/securing-access-azure-webapps
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 123/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/app-service/networking/private-endpoint
You can use private endpoint for your App Service apps to allow clients located in your private network to securely access the app over Azure
Private Link. The private endpoint uses an IP address from your Azure virtual network address space. Network traffic between a client on your
private network and the app traverses over the virtual network and a Private Link on the Microsoft backbone network, eliminating exposure from
the public Internet.
upvoted 1 times
Private endpoints allow you to access your Azure PaaS services over a private IP address within your virtual network. By creating private endpoints
for both the web app and the MongoDB database, traffic between them can be routed through the private network, making it more secure by
preventing access from the public internet.
This approach is recommended because it limits access to only the virtual network where the web app and database are deployed, and it helps to
minimize the surface area of potential attacks. By implementing private endpoints, you can ensure that data is transmitted securely between the
two layers and reduce the risk of data breaches.
Therefore, creating private endpoints for the web app and the database layer meets the goal of securing the connection between the two layers
and follows the Zero Trust model.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 124/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 125/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your on-premises network contains an e-commerce web app that was developed in Angular and Node,js. The web app uses a MongoDB database.
You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.
You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust
model.
Solution: You recommend implementing Azure Key Vault to store credentials.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead use solution: You recommend creating private endpoints for the web app and the database layer.
Note:
How to Use Azure Private Endpoints to Restrict Public Access to WebApps.
As an Azure administrator or architect, you are sometimes asked the question: ג€How can we safely deploy internal business applications to
Azure App Services?ג€
These applications characteristically are:
Not accessible from the public internet.
Accessible from within the on-premises corporate network
Accessible via an authorized VPN client from outside the corporate network.
For such scenarios, we can use Azure Private Links, which enables private and secure access to Azure PaaS services over Azure Private
Endpoints, along with the Site-to-Site VPN, Point-to-Site VPN, or the Express Route. Azure Private Endpoint is a read-only network interface
service associated with the Azure PAAS
Services. It allows you to bring deployed sites into your virtual network, limiting access to them at the network level.
It uses one of the private IP addresses from your Azure VNet and associates it with the Azure App Services. These services are called Private
Link resources.
They can be Azure Storage, Azure Cosmos DB, SQL, App Services Web App, your own / partner owned services, Azure Backups, Event Grids,
Azure Service
Bus, or Azure Automations.
Reference:
https://www.varonis.com/blog/securing-access-azure-webapps
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 126/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
MrsSunshine 5 months, 3 weeks ago
You have ro aecure the connection...For this question, it is networking only...
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 127/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
walkaway 5 months, 1 week ago
Selected Answer: B
No for sure. You don't need Key Vault in this case. You can use managed identity.
upvoted 2 times
System Assigned Managed Identity is the recommended method to access Azure Cosmos DB. Managed Identities do not require or use Key Vaults.
An App Service can use a Managed Identity to connect to Cosmos DB.
Key Vaults are used if the Azure Cosmos DB is being accessed using an SDK, the API endpoint and either the primary or secondary key. Keys and
Key Vaults are recommended ONLY as a fallback method to connect to Cosmos DB, if the service connecting to Cosmos DB can't use a Managed
Identity or certificate based authentication. An App Service can connect to the Cosmos DB using a Managed Identity.
https://learn.microsoft.com/en-us/azure/cosmos-db/store-credentials-key-vault
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 128/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your on-premises network contains an e-commerce web app that was developed in Angular and Node,js. The web app uses a MongoDB database.
You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.
You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust
model.
Solution: You recommend implementing Azure Application Gateway with Azure Web Application Firewall (WAF).
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead use solution: You recommend creating private endpoints for the web app and the database layer.
Note:
How to Use Azure Private Endpoints to Restrict Public Access to WebApps.
As an Azure administrator or architect, you are sometimes asked the question: ג€How can we safely deploy internal business applications to
Azure App Services?ג€
These applications characteristically are:
Not accessible from the public internet.
Accessible from within the on-premises corporate network
Accessible via an authorized VPN client from outside the corporate network.
For such scenarios, we can use Azure Private Links, which enables private and secure access to Azure PaaS services over Azure Private
Endpoints, along with the Site-to-Site VPN, Point-to-Site VPN, or the Express Route. Azure Private Endpoint is a read-only network interface
service associated with the Azure PAAS
Services. It allows you to bring deployed sites into your virtual network, limiting access to them at the network level.
It uses one of the private IP addresses from your Azure VNet and associates it with the Azure App Services. These services are called Private
Link resources.
They can be Azure Storage, Azure Cosmos DB, SQL, App Services Web App, your own / partner owned services, Azure Backups, Event Grids,
Azure Service
Bus, or Azure Automations.
Reference:
https://www.varonis.com/blog/securing-access-azure-webapps
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 129/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 130/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application
attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
Which security control should you recommend?
C. app discovery anomaly detection policies in Microsoft Defender for Cloud Apps
Correct Answer: A
Adaptive application controls are an intelligent and automated solution for defining allowlists of known-safe applications for your machines.
Often, organizations have collections of machines that routinely run the same processes. Microsoft Defender for Cloud uses machine learning
to analyze the applications running on your machines and create a list of the known-safe software. Allowlists are based on your specific Azure
workloads, and you can further customize the recommendations using the instructions below.
When you've enabled and configured adaptive application controls, you'll get security alerts if any application runs other than the ones you've
defined as safe.
Incorrect:
Not B: App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a
rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the
user is inside the app. A managed app is an app that has app protection policies applied to it, and can be managed by Intune.
Not C: Cloud Discovery anomaly detection policy reference. A Cloud Discovery anomaly detection policy enables you to set up and configure
continuous monitoring of unusual increases in cloud application usage. Increases in downloaded data, uploaded data, transactions, and users
are considered for each cloud application.
Not D: The Azure Security Benchmark (ASB) provides prescriptive best practices and recommendations to help improve the security of
workloads, data, and services on Azure. This benchmark is part of a set of holistic security guidance.
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/adaptive-application-controls https://docs.microsoft.com/en-
us/mem/intune/apps/app-protection-policy https://docs.microsoft.com/en-us/defender-cloud-apps/cloud-discovery-anomaly-detection-policy
https://docs.microsoft.com/en-us/security/benchmark/azure/overview
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 131/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/defender-for-cloud/adaptive-application-controls
Adaptive application controls are an intelligent and automated solution for defining allowlists of known-safe applications for your machines.
Often, organizations have collections of machines that routinely run the same processes. Microsoft Defender for Cloud uses machine learning to
analyze the applications running on your machines and create a list of the known-safe software. Allowlists are based on your specific Azure
workloads, and you can further customize the recommendations using the following instructions.
When you've enabled and configured adaptive application controls, you'll get security alerts if any application runs other than the ones you've
defined as safe.
upvoted 1 times
The question is mentioning to block the application from running, and the adaptive application controls don't have this capability available, so the
answer shouldn't be correct.
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 132/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 133/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your on-premises network contains an e-commerce web app that was developed in Angular and Node,js. The web app uses a MongoDB database.
You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.
You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust
model.
Solution: You recommend implementing Azure Front Door with Azure Web Application Firewall (WAF).
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead use solution: You recommend creating private endpoints for the web app and the database layer.
Note:
How to Use Azure Private Endpoints to Restrict Public Access to WebApps.
As an Azure administrator or architect, you are sometimes asked the question: ג€How can we safely deploy internal business applications to
Azure App Services?ג€
These applications characteristically are:
Not accessible from the public internet.
Accessible from within the on-premises corporate network
Accessible via an authorized VPN client from outside the corporate network.
For such scenarios, we can use Azure Private Links, which enables private and secure access to Azure PaaS services over Azure Private
Endpoints, along with the Site-to-Site VPN, Point-to-Site VPN, or the Express Route. Azure Private Endpoint is a read-only network interface
service associated with the Azure PAAS
Services. It allows you to bring deployed sites into your virtual network, limiting access to them at the network level.
It uses one of the private IP addresses from your Azure VNet and associates it with the Azure App Services. These services are called Private
Link resources.
They can be Azure Storage, Azure Cosmos DB, SQL, App Services Web App, your own / partner owned services, Azure Backups, Event Grids,
Azure Service
Bus, or Azure Automations.
Reference:
https://www.varonis.com/blog/securing-access-azure-webapps
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 134/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 135/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a customer that has a Microsoft 365 subscription and an Azure subscription.
The customer has devices that run either Windows, iOS, Android, or macOS. The Windows devices are deployed on-premises and in Azure.
You need to design a security solution to assess whether all the devices meet the customer's compliance rules.
What should you include in the solution?
D. Microsoft Sentinel
Correct Answer: B
Microsoft Endpoint Manager includes Microsoft Intune.
Device compliance policies are a key feature when using Intune to protect your organization's resources. In Intune, you can create rules and
settings that devices must meet to be considered compliant, such as a minimum OS version.
Microsoft Endpoint Manager helps deliver the modern workplace and modern management to keep your data secure, in the cloud and on-
premises. Endpoint
Manager includes the services and tools you use to manage and monitor mobile devices, desktop computers, virtual machines, embedded
devices, and servers.
Endpoint Manager combines services you may know and already be using, including Microsoft Intune, Configuration Manager, Desktop
Analytics, co- management, and Windows Autopilot. These services are part of the Microsoft 365 stack to help secure access, protect data,
respond to risk, and manage risk.
Note: Microsoft Defender for Endpoint Plan 2 protects your Windows and Linux machines whether they're hosted in Azure, hybrid clouds (on-
premises), or multicloud.
Microsoft Defender for Endpoint on iOS offers protection against phishing and unsafe network connections from websites, emails, and apps.
Microsoft Defender for Endpoint on Android supports installation on both modes of enrolled devices - the legacy Device Administrator and
Android Enterprise modes. Currently, Personally-owned devices with work profile and Corporate-owned fully managed user device enrollments
are supported in Android Enterprise.
Reference:
https://docs.microsoft.com/en-us/mem/endpoint-manager-overview https://docs.microsoft.com/en-us/azure/defender-for-cloud/integration-
defender-for-endpoint
It's important to note that the explanation given is outdated. Microsoft Defender for Endpoint is not part of Microsoft Endpoint Manager, but
integrating Defender for Endpoint with Intune allows Intune (and thus Endpoint Manager) to be the best answer.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 136/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 3 times
Sec_Arch_Chn 7 months, 1 week ago
Correct answer. Covers all of the below running devices
Android device administrator
Android (AOSP) (preview)
Android Enterprise
iOS/iPadOS
Linux - Ubuntu Desktop, version 20.04 LTS and 22.04 LTS
macOS
Windows 10 and later
Source: https://learn.microsoft.com/en-us/mem/intune/protect/compliance-policy-monitor#open-the-compliance-dashboard
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 137/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You are evaluating the Azure Security Benchmark V3 report.
In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.
You need to recommend configurations to increase the score of the Secure management ports controls.
Solution: You recommend onboarding all virtual machines to Microsoft Defender for Endpoint.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Note: Secure management ports - Brute force attacks often target management ports. Use these recommendations to reduce your exposure
with tools like just-in- time VM access and network security groups.
Recommendations:
- Internet-facing virtual machines should be protected with network security groups
- Management ports of virtual machines should be protected with just-in-time network access control
- Management ports should be closed on your virtual machines
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls
https://learn.microsoft.com/en-us/azure/defender-for-cloud/secure-score-security-controls#security-controls-and-their-recommendations
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 138/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.
The company signs a contract with the United States government.
You need to review the current subscription for NIST 800-53 compliance.
What should you do first?
B. From Microsoft Sentinel, configure the Microsoft Defender for Cloud data connector.
C. From Defender for Cloud, review the Azure security baseline for audit report.
Correct Answer: D
Add a regulatory standard to your dashboard
The following steps explain how to add a package to monitor your compliance with one of the supported regulatory standards.
Add a standard to your Azure resources
1. From Defender for Cloud's menu, select Regulatory compliance to open the regulatory compliance dashboard. Here you can see the
compliance standards currently assigned to the currently selected subscriptions.
2. From the top of the page, select Manage compliance policies. The Policy Management page appears.
3. Select the subscription or management group for which you want to manage the regulatory compliance posture.
4. To add the standards relevant to your organization, expand the Industry & regulatory standards section and select Add more standards.
5. From the Add regulatory compliance standards page, you can search for any of the available standards:
6. Select Add and enter all the necessary details for the specific initiative such as scope, parameters, and remediation.
7. From Defender for Cloud's menu, select Regulatory compliance again to go back to the regulatory compliance dashboard.
Your new standard appears in your list of Industry & regulatory standards.
Note: Customize the set of standards in your regulatory compliance dashboard.
Microsoft Defender for Cloud continually compares the configuration of your resources with requirements in industry standards, regulations,
and benchmarks. The regulatory compliance dashboard provides insights into your compliance posture based on how you're meeting specific
compliance requirements.
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 139/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages
Microsoft Defender for Cloud continually compares the configuration of your resources with requirements in industry standards, regulations, and
benchmarks. The regulatory compliance dashboard provides insights into your compliance posture based on how you're meeting specific
compliance requirements.
upvoted 1 times
The first step in reviewing the Azure subscription for NIST 800-53 compliance is to add the NIST 800-53 regulatory compliance standard in
Defender for Cloud. This will allow you to see if your subscription meets the requirements for the NIST 800-53 standard. After adding the standard,
you can review the compliance status and take appropriate actions to address any issues found.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 140/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has devices that run either Windows 10, Windows 11, or Windows Server.
You are in the process of improving the security posture of the devices.
You plan to use security baselines from the Microsoft Security Compliance Toolkit.
What should you recommend using to compare the baselines to the current device configurations?
A. Microsoft Intune
C. Windows Autopilot
D. Policy Analyzer
Correct Answer: D
Microsoft Security Compliance Toolkit 1.0, Policy Analyzer.
The Policy Analyzer is a utility for analyzing and comparing sets of Group Policy Objects (GPOs). Its main features include:
Highlight when a set of Group Policies has redundant settings or internal inconsistencies.
Highlight the differences between versions or sets of Group Policies.
Compare GPOs against current local policy and local registry settings
Export results to a Microsoft Excel spreadsheet
Policy Analyzer lets you treat a set of GPOs as a single unit. This treatment makes it easy to determine whether particular settings are
duplicated across the
GPOs or are set to conflicting values. Policy Analyzer also lets you capture a baseline and then compare it to a snapshot taken at a later time to
identify changes anywhere across the set.
Note: The Security Compliance Toolkit (SCT) is a set of tools that allows enterprise security administrators to download, analyze, test, edit, and
store Microsoft- recommended security configuration baselines for Windows and other Microsoft products.
The SCT enables administrators to effectively manage their enterprise's Group Policy Objects (GPOs). Using the toolkit, administrators can
compare their current
GPOs with Microsoft-recommended GPO baselines or other baselines, edit them, store them in GPO backup file format, and apply them broadly
through Active
Directory or individually through local policy.
Security Compliance Toolkit Tools:
Policy Analyzer -
Local Group Policy Object (LGPO)
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 141/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/security-compliance-toolkit-
10#what-is-the-policy-analyzer-tool
The Policy Analyzer is a utility for analyzing and comparing sets of Group Policy Objects (GPOs). Its main features include:
- Compare GPOs against current local policy and local registry settings
upvoted 1 times
The LGPO tool is a Microsoft-supported command line tool that provides the ability to manage local group policies on Windows devices, including
Windows 10, Windows 11, and Windows Server.
The Policy Analyzer tool is a Microsoft-supported graphical tool that provides the ability to compare and analyze different versions of Group Policy
Objects (GPOs), including GPOs on Windows 10, Windows 11, and Windows Server.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 142/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have an Azure subscription that is used as an Azure landing zone for an application.
You need to evaluate the security posture of all the workloads in the landing zone.
D. Enable the Defender plan for all resource types in Microsoft Defender for Cloud.
Correct Answer: D
https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction#improve-your-security-posture
The security of your cloud and on-premises resources depends on proper configuration and deployment. Defender for Cloud recommendations
identify the steps that you can take to secure your environment.
Defender for Cloud includes Foundational CSPM capabilities for free. You can also enable advanced CSPM capabilities by enabling paid Defender
plans.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 143/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.
You need to review the current subscription for NIST 800-53 compliance.
A. From Azure Policy, assign a built-in initiative that has a scope of the subscription.
B. From Azure Policy, assign a built-in policy definition that has a scope of the subscription.
C. From Defender for Cloud, review the Azure security baseline for audit report.
D. From Microsoft Defender for Cloud Apps, create an access policy for cloud applications.
Correct Answer: A
https://learn.microsoft.com/en-us/azure/governance/policy/samples/nist-sp-800-53-r5
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 144/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an Azure subscription that uses Microsoft Defender for Cloud.
You need to review the current subscription for NIST 800-53 compliance.
A. From Defender for Cloud, review the Azure security baseline for audit report.
B. From Microsoft Defender for Cloud Apps, create an access policy for cloud applications.
D. From Azure Policy, assign a built-in initiative that has a scope of the subscription.
Correct Answer: D
https://learn.microsoft.com/en-us/azure/governance/policy/samples/nist-sp-800-53-r5
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 145/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an Azure subscription that uses Microsoft Defender for Cloud.
You need to review the current subscription for NIST 800-53 compliance.
A. From Microsoft Sentinel, configure the Microsoft Defender for Cloud data connector.
B. From Microsoft Defender for Cloud Apps, create an access policy for cloud applications.
Correct Answer: D
https://learn.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages
Microsoft Defender for Cloud continually compares the configuration of your resources with requirements in industry standards, regulations, and
benchmarks. The regulatory compliance dashboard provides insights into your compliance posture based on how you're meeting specific
compliance requirements.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 146/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an Azure subscription that uses Microsoft Defender for Cloud.
You need to review the current subscription for NIST 800-53 compliance.
B. From Defender for Cloud, review the Azure security baseline for audit report.
D. From Microsoft Defender for Cloud Apps, create an access policy for cloud applications.
Correct Answer: C
https://learn.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages
Microsoft Defender for Cloud continually compares the configuration of your resources with requirements in industry standards, regulations, and
benchmarks. The regulatory compliance dashboard provides insights into your compliance posture based on how you're meeting specific
compliance requirements.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 147/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.
You need to review the current subscription for NIST 800-53 compliance.
B. From Azure Policy, assign a built-in initiative that has a scope of the subscription.
D. From Microsoft Defender for Cloud Apps, create an access policy for cloud applications.
Correct Answer: B
https://learn.microsoft.com/en-us/azure/governance/policy/samples/nist-sp-800-53-r5
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 148/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.
You need to review the current subscription for NIST 800-53 compliance.
B. From Azure Policy, assign a built-in initiative that has a scope of the subscription.
C. From Microsoft Defender for Cloud Apps, create an access policy for cloud applications.
D. From Azure Policy, assign a built-in policy definition that has a scope of the subscription.
Correct Answer: B
https://learn.microsoft.com/en-us/azure/governance/policy/samples/nist-sp-800-53-r5
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 149/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has a governance requirement that resources must be created in the West Europe or North Europe Azure regions.
Correct Answer: C
https://learn.microsoft.com/en-us/azure/governance/policy/overview
Azure Policy helps to enforce organizational standards and to assess compliance at-scale. Through its compliance dashboard, it provides an
aggregated view to evaluate the overall state of the environment, with the ability to drill down to the per-resource, per-policy granularity. It also
helps to bring your resources to compliance through bulk remediation for existing resources and automatic remediation for new resources.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 150/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #1 Topic 3
You have Microsoft Defender for Cloud assigned to Azure management groups.
You have a Microsoft Sentinel deployment.
During the triage of alerts, you require additional information about the security events, including suggestions for remediation.
Which two components can you use to achieve the goal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
Correct Answer: AC
A: Workbooks provide insights about your threat intelligence
Workbooks provide powerful interactive dashboards that give you insights into all aspects of Microsoft Sentinel, and threat intelligence is no
exception. You can use the built-in Threat Intelligence workbook to visualize key information about your threat intelligence, and you can easily
customize the workbook according to your business needs. You can even create new dashboards combining many different data sources so
you can visualize your data in unique ways. Since
Microsoft Sentinel workbooks are based on Azure Monitor workbooks, there is already extensive documentation available, and many more
templates.
C: What is a threat intelligence report?
Defender for Cloud's threat protection works by monitoring security information from your Azure resources, the network, and connected partner
solutions. It analyzes this information, often correlating information from multiple sources, to identify threats.
Defender for Cloud has three types of threat reports, which can vary according to the attack. The reports available are:
Activity Group Report: provides deep dives into attackers, their objectives, and tactics.
Campaign Report: focuses on details of specific attack campaigns.
Threat Summary Report: covers all of the items in the previous two reports.
This type of information is useful during the incident response process, where there's an ongoing investigation to understand the source of the
attack, the attacker's motivations, and what to do to mitigate this issue in the future.
Incorrect:
Not B: When to use Jupyter notebooks
While many common tasks can be carried out in the portal, Jupyter extends the scope of what you can do with this data.
For example, use notebooks to:
Perform analytics that aren't provided out-of-the box in Microsoft Sentinel, such as some Python machine learning features
Create data visualizations that aren't provided out-of-the box in Microsoft Sentinel, such as custom timelines and process trees
Integrate data sources outside of Microsoft Sentinel, such as an on-premises data set.
Not D: Defender for Cloud offers security alerts that are powered by Microsoft Threat Intelligence. It also includes a range of advanced,
intelligent, protections for your workloads. The workload protections are provided through Microsoft Defender plans specific to the types of
resources in your subscriptions. For example, you can enable Microsoft Defender for Storage to get alerted about suspicious activities related
to your Azure Storage accounts.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence https://docs.microsoft.com/en-us/azure/defender-for-
cloud/defender-for-cloud-introduction https://docs.microsoft.com/en-us/azure/defender-for-cloud/threat-intelligence-reports
https://docs.microsoft.com/en-us/azure/sentinel/notebooks
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 151/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence#add-threat-indicators-to-microsoft-sentinel-with-the-microsoft-
defender-threat-intelligence-data-connector
Bring high fidelity indicators of compromise (IOC) generated by Microsoft Defender Threat Intelligence (MDTI) into your Microsoft Sentinel
workspace. The MDTI data connector ingests these IOCs with a simple one-click setup. Then monitor, alert and hunt based on the threat
intelligence in the same way you utilize other feeds.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 152/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 3
A customer is deploying Docker images to 10 Azure Kubernetes Service (AKS) resources across four Azure subscriptions.
You are evaluating the security posture of the customer.
You discover that the AKS resources are excluded from the secure score recommendations.
You need to produce accurate recommendations and update the secure score.
Which two actions should you recommend in Microsoft Defender for Cloud? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Correct Answer: BD
D: How are regulatory compliance standards represented in Defender for Cloud?
Industry standards, regulatory standards, and benchmarks are represented in Defender for Cloud's regulatory compliance dashboard. Each
standard is an initiative defined in Azure Policy.
To see compliance data mapped as assessments in your dashboard, add a compliance standard to your management group or subscription
from within the
Security policy page.
When you've assigned a standard or benchmark to your selected scope, the standard appears in your regulatory compliance dashboard with all
associated compliance data mapped as assessments.
B: Configure Defender for Containers components
If you disabled any of the default protections when you enabled Microsoft Defender for Containers, you can change the configurations and
reenable them via auto provisioning.
1. To configure the Defender for Containers components:
2. Sign in to the Azure portal.
3. Navigate to Microsoft Defender for Cloud > Environment settings.
4. Select the relevant subscription.
5. From the left side tool bar, select Auto provisioning.
6. Ensure that Microsoft Defenders for Containers components (preview) is toggled to On.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 153/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Incorrect:
Not A: When you enable Microsoft Defender for Containers, Azure Kubernetes Service clusters, and Azure Arc enabled Kubernetes clusters
(Preview) protection are both enabled by default.
To upgrade to Microsoft Defender for Containers, open the Defender plans page in the portal and enable the new plan:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 154/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
By enabling Defender plans and reviewing the inventory, you can ensure that the AKS resources are properly evaluated, and their security posture
is reflected in the secure score.
upvoted 1 times
MS_ExamsRule 3 weeks, 3 days ago
Although by default Enabling the Defender plan also configures auto-provisioning, to align with CAF you would then configure auto-provisioning
to use a centralised rather than the default log analytics workspace.
So its A&B
upvoted 1 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-enable
upvoted 1 times
A. Habilitar los planes de Defender para la suscripción de Azure que contiene los recursos de AKS. Esto permitirá que Microsoft Defender para la
nube recolecte datos de seguridad de los recursos y proporcionará recomendaciones específicas de seguridad.
E. Revisar el inventario de recursos de AKS en cada suscripción de Azure y asegurarse de que se están siguiendo las mejores prácticas de seguridad.
Esto ayudará a identificar cualquier problema de seguridad que pueda existir y tomar medidas para abordarlos.
upvoted 1 times
A. Enable Defender plans: Enabling Defender plans for Azure Kubernetes Service will enable the Defender for Kubernetes solution to collect and
analyze security events and provide recommendations for improving the security posture of the AKS resources. Defender for Kubernetes integrates
with Azure Security Center and Azure Monitor to provide a unified view of security posture and insights.
E. Review the inventory: Reviewing the inventory in Microsoft Defender for Cloud will enable you to identify all the AKS resources and Docker
images deployed across the four Azure subscriptions. This will help you assess the security posture of the resources, identify potential
vulnerabilities and misconfigurations, and prioritize remediation actions.
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 155/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Option B (Configure auto provisioning), option C (Add a workflow automation), and option D (Assign regulatory compliance policies) are not
directly related to addressing the issue of excluded AKS resources from secure score recommendations. These options may be helpful in other
scenarios, such as automating remediation actions or ensuring compliance with specific regulations. However, for the given scenario, enabling
Defender plans and reviewing the inventory are the most relevant actions.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 156/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 3
Correct Answer: AC
Azure Bastion is deployed to a virtual network and supports virtual network peering. Specifically, Azure Bastion manages RDP/SSH connectivity
to VMs created in the local or peered virtual networks.
Note: Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal. The Azure
Bastion service is a fully platform-managed PaaS service that you provision inside your virtual network. It provides secure and seamless
RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS. When you connect via Azure Bastion, your virtual
machines don't need a public IP address, agent, or special client software.
Incorrect:
Not B: Two Azure Bastions would increase the cost.
Reference:
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview
https://learn.microsoft.com/en-us/azure/bastion/vnet-peering
Azure Bastion and VNet peering can be used together. When VNet peering is configured, you don't have to deploy Azure Bastion in each peered
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 157/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
VNet. This means if you have an Azure Bastion host configured in one virtual network (VNet), it can be used to connect to VMs deployed in a
peered VNet without deploying an additional bastion host.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 158/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 3
HOTSPOT -
You are designing security for a runbook in an Azure Automation account. The runbook will copy data to Azure Data Lake Storage Gen2.
You need to recommend a solution to secure the components of the copy process.
What should you include in the recommendation for each component? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 159/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
"Azure Private Link with network service tags" doesn't mean anything. Network Service Tags can be used in NSG rules, and in routing rules, if either
were specified, but they aren't.
upvoted 5 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 160/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://docs.microsoft.com/en-us/azure/automation/automation-security-guidelines#data-security
upvoted 15 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 161/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #5 Topic 3
A. Compliance Manager
Correct Answer: D
Web content filtering is part of the Web protection capabilities in Microsoft Defender for Endpoint. It enables your organization to track and
regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of
compliance regulations, bandwidth usage, or other concerns.
Note: Turn on web content filtering
From the left-hand navigation in Microsoft 365 Defender portal, select Settings > Endpoints > General > Advanced Features. Scroll down until
you see the entry for Web content filtering. Switch the toggle to On and Save preferences.
Configure web content filtering policies
Web content filtering policies specify which site categories are blocked on which device groups. To manage the policies, go to Settings >
Endpoints > Web content filtering (under Rules).
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-content-filtering
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/web-content-filtering?view=o365-worldwide#what-is-web-content-
filtering
Web content filtering is part of the Web protection capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web
content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites
(even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.
upvoted 1 times
Microsoft Defender for Cloud Apps is a cloud-native security solution that helps protect your organization from cyber threats across cloud
applications and services, including web browsing. It includes web content filtering capabilities that allow you to block access to websites that
contain adult content, such as gambling sites, and other categories of websites that you want to block.
To implement this solution, you can configure web content filtering policies in Microsoft Defender for Cloud Apps and apply them to your
Windows 11 devices. This will prevent users from accessing websites that are not allowed by the policy.
Compliance Manager is a solution that helps you manage regulatory compliance requirements for Microsoft cloud services, and Microsoft Endpoint
Manager and Microsoft Defender for Endpoint are solutions for securing and managing endpoint devices, but neither of these solutions specifically
provide web content filtering capabilities.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 162/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 163/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #6 Topic 3
A. Implement Automated investigation and Remediation (AIR) in Microsoft Defender for Endpoint.
B. Onboard the kiosks to Microsoft intune and Microsoft Defender for Endpoint.
Correct Answer: BE
Onboard devices and configure Microsoft Defender for Endpoint capabilities.
Deploying Microsoft Defender for Endpoint is a two-step process.
* Onboard devices to the service
* Configure capabilities of the service
B: Depending on the device, follow the configuration steps provided in the onboarding section of the Defender for Endpoint portal.
E: A Privileged workstation provides a hardened workstation that has clear application control and application guard. The workstation uses
credential guard, device guard, app guard, and exploit guard to protect the host from malicious behavior. All local disks are encrypted with
BitLocker and web traffic is restricted to a limit set of permitted destinations (Deny all).
Note: Privileged Access Workstation (PAW) ג€" This is the highest security configuration designed for extremely sensitive roles that would have
a significant or material impact on the organization if their account was compromised. The PAW configuration includes security controls and
policies that restrict local administrative access and productivity tools to minimize the attack surface to only what is absolutely required for
performing sensitive job tasks. This makes the
PAW device difficult for attackers to compromise because it blocks the most common vector for phishing attacks: email and web browsing. To
provide productivity to these users, separate accounts and workstations must be provided for productivity applications and web browsing.
While inconvenient, this is a necessary control to protect users whose account could inflict damage to most or all resources in the organization.
Incorrect:
Not A: What is automated investigation and remediation?
Automated investigation and response capabilities help your security operations team by: Determining whether a threat requires action. Taking
(or recommending) any necessary remediation actions. Determining whether and what other investigations should occur. Repeating the process
as necessary for other alerts.
Not C: Threat & Vulnerability Management is a component of Microsoft Defender for Endpoint, and provides both security administrators and
security operations teams with unique value, including:
- Real-time endpoint detection and response (EDR) insights correlated with endpoint vulnerabilities.
- Invaluable device vulnerability context during incident investigations.
- Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager.
Note: Microsoft's threat and vulnerability management is a built-in module in Microsoft Defender for Endpoint that can:
Discover vulnerabilities and misconfigurations in near real time.
Prioritize vulnerabilities based on the threat landscape and detections in your organization.
If you've enabled the integration with Microsoft Defender for Endpoint, you'll automatically get the threat and vulnerability management findings
without the need for additional agents.
As it's a built-in module for Microsoft Defender for Endpoint, threat and vulnerability management doesn't require periodic scans.
Not D: You do not use Azure Monitor for onboarding.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/onboard-configure https://docs.microsoft.com/en-
us/security/compass/privileged-access-devices https://docs.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-
tvm
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 164/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
C. Implement threat and vulnerability management in Microsoft Defender for Endpoint to provide a centralized view of the security posture of the
kiosks. This feature identifies potential vulnerabilities and provides guidance on how to mitigate them, allowing for regular hardening of the kiosks
against new threats.
Option E (Implement Privileged Access Workstation (PAW) for the kiosks) is not a suitable recommendation for securing the mobile self-service
kiosks. PAWs are typically used for highly privileged users who need access to sensitive information or systems, and not for standard kiosks.
Instead, implementing Microsoft Intune and Microsoft Defender for Endpoint as suggested in option B would provide better security measures for
the kiosks.
upvoted 2 times
E: PAW
A Privileged workstation provides a hardened workstation that has clear application control and application guard. The workstation uses credential
guard, device guard, app guard, and exploit guard to protect the host from malicious behavior. All local disks are encrypted with BitLocker and web
traffic is restricted to a limit set of permitted destinations (Deny all).
https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-devices
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 165/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
B & C 100%
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 166/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #7 Topic 3
D. Azure Purview
Correct Answer: A
Microsoft Defender for Cloud Apps File policies.
File Policies allow you to enforce a wide range of automated processes using the cloud provider's APIs. Policies can be set to provide
continuous compliance scans, legal eDiscovery tasks, DLP for sensitive content shared publicly, and many more use cases. Defender for Cloud
Apps can monitor any file type based on more than 20 metadata filters (for example, access level, file type).
Reference:
https://docs.microsoft.com/en-us/defender-cloud-apps/data-protection-policies
Provide protection settings that include encryption and content markings. For example, apply a "Confidential" label to a document or email, and
that label encrypts the content and applies a "Confidential" watermark. Content markings include headers and footers as well as watermarks, and
encryption can also restrict what actions authorized people can take on the content.
Protect content in Office apps across different platforms and devices. Supported by Word, Excel, PowerPoint, and Outlook on the Office desktop
apps and Office on the web. Supported on Windows, macOS, iOS, and Android.
Protect content in third-party apps and services by using Microsoft Defender for Cloud Apps. With Defender for Cloud Apps, you can detect,
classify, label, and protect content in third-party apps and services, such as SalesForce, Box, or DropBox, even if the third-party app or service does
not read or support sensitivity labels.
upvoted 33 times
https://learn.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
Sensitivity labels from Microsoft Purview Information Protection let you classify and protect your organization's data, while making sure that user
productivity and their ability to collaborate isn't hindered.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 167/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
oscarmh 3 months, 3 weeks ago
I would chose AIP always for watermarks
upvoted 1 times
Provide protection settings that include encryption and content markings. For example, apply a "Confidential" label to a document or email, and
that label encrypts the content and applies a "Confidential" watermark. Content markings include headers and footers as well as watermarks, and
encryption can also restrict what actions authorized people can take on the content.
upvoted 2 times
https://learn.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 168/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 169/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #8 Topic 3
Your company plans to deploy several Azure App Service web apps. The web apps will be deployed to the West Europe Azure region. The web apps
will be accessed only by customers in Europe and the United States.
You need to recommend a solution to prevent malicious bots from scanning the web apps for vulnerabilities. The solution must minimize the
attack surface.
What should you include in the recommendation?
Correct Answer: B
* Application security groups enable you to configure network security as a natural extension of an application's structure, allowing you to group
virtual machines and define network security policies based on those groups. You can reuse your security policy at scale without manual
maintenance of explicit IP addresses. The platform handles the complexity of explicit IP addresses and multiple rule sets, allowing you to focus
on your business logic.
* Azure Traffic Manager is a DNS-based traffic load balancer. This service allows you to distribute traffic to your public facing applications
across the global Azure regions. Traffic Manager also provides your public endpoints with high availability and quick responsiveness.
Traffic Manager uses DNS to direct the client requests to the appropriate service endpoint based on a traffic-routing method. Traffic manager
also provides health monitoring for every endpoint.
Incorrect:
Not C: Azure Application Gateway Web Application Firewall is too small a scale solution in this scenario.
Note: Attacks against a web application can be monitored by using a real-time Application Gateway that has Web Application Firewall, enabled
with integrated logging from Azure Monitor to track Web Application Firewall alerts and easily monitor trends.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/application-security-groups https://docs.microsoft.com/en-us/azure/traffic-
manager/traffic-manager-overview https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/app-service-security-baseline
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 170/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: C
C is the answer.
https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/ag-overview
Azure Web Application Firewall (WAF) on Azure Application Gateway provides centralized protection of your web applications from common
exploits and vulnerabilities. Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. SQL
injection and cross-site scripting are among the most common attacks.
upvoted 1 times
Ref: https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/bot-protection-overview
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 171/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 3
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing the encryption standards for data at rest for an Azure resource.
You need to provide recommendations to ensure that the data at rest is encrypted by using AES-256 keys. The solution must support rotating the
encryption keys monthly.
Solution: For blob containers in Azure Storage, you recommend encryption that uses Microsoft-managed keys within an encryption scope.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Need to use customer-managed keys instead.
Note: Automated key rotation in Key Vault allows users to configure Key Vault to automatically generate a new key version at a specified
frequency. You can use rotation policy to configure rotation for each individual key. Our recommendation is to rotate encryption keys at least
every two years to meet cryptographic best practices.
This feature enables end-to-end zero-touch rotation for encryption at rest for Azure services with customer-managed key (CMK) stored in Azure
Key Vault. Please refer to specific Azure service documentation to see if the service covers end-to-end rotation.
Reference:
https://docs.microsoft.com/en-us/azure/key-vault/keys/how-to-configure-key-rotation
https://learn.microsoft.com/en-us/azure/storage/common/customer-managed-keys-overview#update-the-key-version
Following cryptographic best practices means rotating the key that is protecting your storage account on a regular schedule, typically at least every
two years. Azure Storage never modifies the key in the key vault, but you can configure a key rotation policy to rotate the key according to your
compliance requirements.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 172/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 173/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing the encryption standards for data at rest for an Azure resource.
You need to provide recommendations to ensure that the data at rest is encrypted by using AES-256 keys. The solution must support rotating the
encryption keys monthly.
Solution: For Azure SQL databases, you recommend Transparent Data Encryption (TDE) that uses Microsoft-managed keys.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Need to use customer-managed keys instead.
Note: Automated key rotation in Key Vault allows users to configure Key Vault to automatically generate a new key version at a specified
frequency. You can use rotation policy to configure rotation for each individual key. Our recommendation is to rotate encryption keys at least
every two years to meet cryptographic best practices.
This feature enables end-to-end zero-touch rotation for encryption at rest for Azure services with customer-managed key (CMK) stored in Azure
Key Vault. Please refer to specific Azure service documentation to see if the service covers end-to-end rotation.
Reference:
https://docs.microsoft.com/en-us/azure/key-vault/keys/how-to-configure-key-rotation
https://learn.microsoft.com/en-us/azure/azure-sql/database/transparent-data-encryption-byok-overview?view=azuresql
Azure SQL transparent data encryption (TDE) with customer-managed key (CMK) enables Bring Your Own Key (BYOK) scenario for data protection
at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed TDE, the
customer is responsible for and in a full control of a key lifecycle management (key creation, upload, rotation, deletion), key usage permissions, and
auditing of operations on keys.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 174/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing the encryption standards for data at rest for an Azure resource.
You need to provide recommendations to ensure that the data at rest is encrypted by using AES-256 keys. The solution must support rotating the
encryption keys monthly.
Solution: For blob containers in Azure Storage, you recommend encryption that uses customer-managed keys (CMKs).
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
We need to use customer-managed keys.
Azure Storage encryption for data at rest.
Azure Storage uses service-side encryption (SSE) to automatically encrypt your data when it is persisted to the cloud. Azure Storage encryption
protects your data and to help you to meet your organizational security and compliance commitments.
Data in Azure Storage is encrypted and decrypted transparently using 256-bit AES encryption.
Data in a new storage account is encrypted with Microsoft-managed keys by default. You can continue to rely on Microsoft-managed keys for
the encryption of your data, or you can manage encryption with your own keys. If you choose to manage encryption with your own keys, you
have two options. You can use either type of key management, or both:
* You can specify a customer-managed key to use for encrypting and decrypting data in Blob Storage and in Azure Files.
* You can specify a customer-provided key on Blob Storage operations. A client making a read or write request against Blob Storage can include
an encryption key on the request for granular control over how blob data is encrypted and decrypted.
Note: Automated key rotation in Key Vault allows users to configure Key Vault to automatically generate a new key version at a specified
frequency. You can use rotation policy to configure rotation for each individual key. Our recommendation is to rotate encryption keys at least
every two years to meet cryptographic best practices.
This feature enables end-to-end zero-touch rotation for encryption at rest for Azure services with customer-managed key (CMK) stored in Azure
Key Vault. Please refer to specific Azure service documentation to see if the service covers end-to-end rotation.
Reference:
https://docs.microsoft.com/en-us/azure/storage/common/storage-service-encryption https://docs.microsoft.com/en-us/azure/key-
vault/keys/how-to-configure-key-rotation
https://learn.microsoft.com/en-us/azure/storage/common/customer-managed-keys-overview#update-the-key-version
Following cryptographic best practices means rotating the key that is protecting your storage account on a regular schedule, typically at least every
two years. Azure Storage never modifies the key in the key vault, but you can configure a key rotation policy to rotate the key according to your
compliance requirements.
upvoted 1 times
Finally: Microsoft-managed keys are rotated appropriately per compliance requirements. If you have specific key rotation requirements, Microsoft
recommends that you move to customer-managed keys so that you can manage and audit the rotation yourself.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 175/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 176/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.
You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend access restrictions to allow traffic from the backend IP address of the Front Door instance.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Correct Solution: You recommend access restrictions based on HTTP headers that have the Front Door ID.
Restrict access to a specific Azure Front Door instance.
Traffic from Azure Front Door to your application originates from a well-known set of IP ranges defined in the AzureFrontDoor.Backend service
tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from
your specific instance, you will need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#managing-access-restriction-rules
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 177/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
so this particular question is correct using the frontdoor backend IP or the service tag or the HTTP header, ALL ARE CORRECT
Below are the front door IP range provided by Microsoft support
147.243.0.0/16
2a01:111:2050::/44
upvoted 6 times
https://learn.microsoft.com/en-us/azure/app-service/overview-access-restrictions#restrict-access-to-a-specific-azure-front-door-instance
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag.
Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your
specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends called X-Azure-
FDID. You can find the Front Door ID in the portal.
upvoted 1 times
"IP address filtering alone isn't sufficient to secure traffic to your origin, because other Azure customers use the same IP addresses. You should also
configure your origin to ensure that traffic has originated from your Front Door profile.
Azure generates a unique identifier for each Front Door profile. You can find the identifier in the Azure portal, by looking for the Front Door ID
value in the Overview page of your profile.
When Front Door makes a request to your origin, it adds the X-Azure-FDID request header. Your origin should inspect the header on incoming
requests, and reject requests where the value doesn't match your Front Door profile's identifier."
https://learn.microsoft.com/en-us/azure/frontdoor/origin-security?pivots=front-door-standard-premium&tabs=app-service-functions#front-door-
identifier
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 178/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.
You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend access restrictions that allow traffic from the Front Door service tags.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Correct Solution: You recommend access restrictions based on HTTP headers that have the Front Door ID.
Restrict access to a specific Azure Front Door instance.
Traffic from Azure Front Door to your application originates from a well-known set of IP ranges defined in the AzureFrontDoor.Backend service
tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from
your specific instance, you will need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#managing-access-restriction-rules
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 179/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/app-service/overview-access-restrictions#restrict-access-to-a-specific-azure-front-door-instance
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag.
Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your
specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends called X-Azure-
FDID. You can find the Front Door ID in the portal.
upvoted 1 times
Restricting access to Azure App Service web apps to only allow traffic from the Front Door instance is a good security practice to ensure that the
web apps are only accessible through the Front Door instance. One way to achieve this is by using access restrictions that allow traffic from the
Front Door service tags.
Azure Front Door service tags represent the IP addresses of the Front Door edge nodes, which can be used to restrict access to the web apps. By
configuring access restrictions that only allow traffic from the Front Door service tags, you can ensure that the web apps are only accessible
through the Front Door instance.
Therefore, the recommended solution to ensure that the web apps only allow access through the Front Door instance by using access restrictions
that allow traffic from the Front Door service tags meets the goal.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 180/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
Bouncy 4 months ago
Selected Answer: B
Following the arguments that point out that the question is about a specific instance, not the service itself. Hence B
upvoted 3 times
A service tag represents a group of IP address prefixes from a given Azure service. To say that service tag is used to access the front door does not
state clearly which IP addresses are used/allowed, and it does not restrict anything.
https://learn.microsoft.com/en-us/azure/virtual-network/service-tags-overview
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 181/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.
You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend access restrictions based on HTTP headers that have the Front Door ID.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Restrict access to a specific Azure Front Door instance.
Traffic from Azure Front Door to your application originates from a well-known set of IP ranges defined in the AzureFrontDoor.Backend service
tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from
your specific instance, you will need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#managing-access-restriction-rules
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 182/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: A
The answer is correct you can also use FDID on the headers.
upvoted 9 times
https://learn.microsoft.com/en-us/azure/app-service/overview-access-restrictions#restrict-access-to-a-specific-azure-front-door-instance
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag.
Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your
specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends called X-Azure-
FDID. You can find the Front Door ID in the portal.
upvoted 1 times
"IP address filtering alone isn't sufficient to secure traffic to your origin, because other Azure customers use the same IP addresses. You should also
configure your origin to ensure that traffic has originated from your Front Door profile.
Azure generates a unique identifier for each Front Door profile. You can find the identifier in the Azure portal, by looking for the Front Door ID
value in the Overview page of your profile.
When Front Door makes a request to your origin, it adds the X-Azure-FDID request header. Your origin should inspect the header on incoming
requests, and reject requests where the value doesn't match your Front Door profile's identifier."
https://learn.microsoft.com/en-us/azure/frontdoor/origin-security?pivots=front-door-standard-premium&tabs=app-service-functions#front-door-
identifier
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 183/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You need to recommend a solution to ensure that the web apps only allow access through the Front Door (INSTANCE) this is important!
Restrict access to a specific Azure Front Door instance with X-Azure-FDID header restriction
upvoted 3 times
IP address filtering alone isn't sufficient to secure traffic to your origin, because other Azure customers use the same IP addresses. You
should also configure your origin to ensure that traffic has originated from your Front Door profile.
Azure generates a unique identifier for each Front Door profile. You can find the identifier in the Azure portal, by looking for the Front Door
ID value in the Overview page of your profile.
When Front Door makes a request to your origin, it adds the X-Azure-FDID request header. Your origin should inspect the header on
incoming requests, and reject requests where the value doesn't match your Front Door profile's identifier.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 184/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company is designing an application architecture for Azure App Service Environment (ASE) web apps as shown in the exhibit. (Click the
Exhibit tab.)
Communication between the on-premises network and Azure uses an ExpressRoute connection.
You need to recommend a solution to ensure that the web apps can communicate with the on-premises application server. The solution must
minimize the number of public IP addresses that are allowed to access the on-premises network.
What should you include in the recommendation?
Correct Answer: C
Azure Web Application Firewall (WAF) on Azure Front Door provides centralized protection for your web applications. WAF defends your web
services against common exploits and vulnerabilities. It keeps your service highly available for your users and helps you meet compliance
requirements.
WAF on Front Door is a global and centralized solution. It's deployed on Azure network edge locations around the globe. WAF enabled web
applications inspect every incoming request delivered by Front Door at the network edge.
WAF prevents malicious attacks close to the attack sources, before they enter your virtual network.
Incorrect:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 185/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Not D: Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications.
You could use Azure Application Gateway with the Azure Web Application Firewall (WAF).
Reference:
https://docs.microsoft.com/en-us/azure/web-application-firewall/afds/afds-overview
https://learn.microsoft.com/en-us/azure/app-service/environment/firewall-integration#configuring-azure-firewall-with-your-ase
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 186/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: B
For me correct answer is B:
For inbound non-HTTP(S) connections, traffic should be targeting the public IP address of the Azure Firewall (if coming from the public Internet), or
it will be sent through the Azure Firewall by UDRs (if coming from other Azure VNets or on-premises networks). All outbound flows from Azure
VMs will be forwarded to the Azure Firewall by UDRs.
Ref: https://learn.microsoft.com/en-us/azure/architecture/example-scenario/gateway/firewall-application-gateway#firewall-and-application-
gateway-in-parallel
upvoted 4 times
Azure Firewall is a cloud-based network security service that protects your Azure virtual network resources. You can use Azure Firewall to filter
traffic to and from the on-premises network and the web apps in Azure. By using policy rule sets, you can define rules that specify which public IP
addresses are allowed to access the on-premises network. This will help minimize the number of public IP addresses that are allowed to access the
on-premises network.
Other options, such as Azure Traffic Manager with priority traffic-routing methods, Azure Front Door with Azure Web Application Firewall (WAF),
and Azure Application Gateway v2 with user-defined routes (UDRs), may not be as suitable for this scenario because they do not provide the same
level of control over access to the on-premises network.
I go for answer B.
upvoted 3 times
The solution must minimize the number of public IP addresses that are allowed to access the on-premises network (public IP's shouldn't be able to
access the on prem network unless allowed and this questions is directed at on prem network not the Apps, with this in mind the answer is leaning
towards Azure firewall.)
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 187/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts.
You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts.
Which two configurations should you include in the recommendation? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.
Correct Answer: AD
A: LT-2: Enable threat detection for Azure identity and access management
Guidance: Azure Active Directory (Azure AD) provides the following user logs, which can be viewed in Azure AD reporting or integrated with
Azure Monitor,
Microsoft Sentinel, or other SIEM/monitoring tools for more sophisticated monitoring and analytics use cases:
Sign-ins - The sign-ins report provides information about the usage of managed applications and user sign-in activities.
Audit logs - Provides traceability through logs for all changes done by various features within Azure AD. Examples of audit logs include changes
made to any resources within Azure AD, like adding or removing users, apps, groups, roles, and policies.
D: Disable local authentication methods so that your Cosmos DB database accounts exclusively require Azure Active Directory identities for
authentication.
Enforcing RBAC as the only authentication method
In situations where you want to force clients to connect to Azure Cosmos DB through RBAC exclusively, you have the option to disable the
account's primary/ secondary keys. When doing so, any incoming request using either a primary/secondary key or a resource token will be
actively rejected.
Incorrect:
Not C: We use the Azure Active Directory (Azure AD) sign-in logs, not the Azure Cosmos db logs.
Not E: Microsoft Defender for Cosmos DB, though useful from a security perspective, does not help with auditing the users.
Note: Logging and Threat Detection, LT-1: Enable threat detection for Azure resources
Guidance: Use the Microsoft Defender for Cloud built-in threat detection capability and enable Microsoft Defender for your Cosmos DB
resources. Microsoft
Defender for Cosmos DB provides an additional layer of security intelligence that detects unusual and potentially harmful attempts to access or
exploit your
Cosmos DB resources.
Reference:
https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/cosmos-db-security-baseline https://docs.microsoft.com/en-
us/azure/cosmos-db/policy-reference https://docs.microsoft.com/en-us/azure/cosmos-db/how-to-setup-rbac#disable-local-auth
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 188/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
This additional information flows in the DataPlaneRequests log category and consists of two extra columns:
aadPrincipalId_g shows the principal ID of the Azure AD identity that was used to authenticate the request.
aadAppliedRoleAssignmentId_g shows the role assignment that was honored when authorizing the request.
Reference link: --> https://learn.microsoft.com/en-us/azure/cosmos-db/how-to-setup-rbac#disable-local-auth
upvoted 8 times
https://learn.microsoft.com/en-us/azure/cosmos-db/monitor-resource-logs?tabs=azure-portal
Diagnostic settings in Azure are used to collect resource logs. Resources emit Azure resource Logs and provide rich, frequent data about the
operation of that resource. These logs are captured per request and they're also referred to as "data plane logs". Some examples of the data plane
operations include delete, insert, and readFeed. The content of these logs varies by resource type.
upvoted 1 times
A. Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace: This will enable logging of all sign-in activities, including
successful and failed attempts, by all users accessing the Cosmos DB account. This will provide insight into who is accessing the data and when.
C. Send the Azure Cosmos DB logs to a Log Analytics workspace: This will enable logging of all activities within the Cosmos DB account, including
queries, modifications, and deletions. This will provide insight into what data is being accessed and how it is being used.
upvoted 3 times
Option B refers to Microsoft Defender for Identity, which is a security solution for on-premises Active Directory environments.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 189/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Option D refers to disabling local authentication, which is not a necessary step for auditing user access.
Option E refers to Microsoft Defender for Cosmos DB, which is a security solution for protecting Cosmos DB from cyber-attacks and data
breaches but does not provide auditing functionality.
upvoted 2 times
God2029 4 months, 1 week ago
Purpose is Audit - So sending logs to Log analytics is the action. Question does not say to restrict access to only AD users, it just say audit. So why
do you need to disable to local authentication? you just need the logs to see who accessed and what acctions perfomed in the DB, So I would
choose A and C
upvoted 1 times
Reference
Azure Cosmos DB—Database account auditing
https://azure.microsoft.com/en-us/updates/azure-cosmos-db-database-account-auditing/
Now generally available, Azure diagnostics logs for Azure Cosmos DB will enable users to see logs for all requests made to their respective
database account at the individual request level. The diagnostics logs help track how and when your databases are accessed. This feature will also
provide a convenient method for configuring the destination of the logs for the customer. Users will be able to choose the destination to either
Storage Account, Event Hub or Operation Management Suite Log Analytics.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 190/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
in this case not control plane but data plane. So the Diagnostic setting has both these log types (data and control plane)
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 191/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are
authenticated by using access keys.
You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts. The solution must
minimize the impact on the legacy applications.
What should you include in the recommendation?
Correct Answer: B
A read-only lock on a storage account prevents users from listing the account keys. A POST request handles the Azure Storage List Keys
operation to protect access to the account keys. The account keys provide complete access to data in the storage account.
Incorrect:
Not A:
If any clients are currently accessing data in your storage account with Shared Key, then Microsoft recommends that you migrate those clients
to Azure AD before disallowing Shared Key access to the storage account.
However, in this scenario we cannot migrate to Azure AD due to the legacy applications.
https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources?tabs=json#considerations-before-applying-your-
locks
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 192/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
A read-only lock on a storage account prevents users from listing the account keys. A POST request handles the Azure Storage List Keys operation
to protect access to the account keys. The account keys provide complete access to data in the storage account. When a read-only lock is
configured for a storage account, users who don't have the account keys need to use Azure AD credentials to access blob or queue data. A read-
only lock also prevents the assignment of Azure RBAC roles that are scoped to the storage account or to a data container (blob container or
queue).
upvoted 1 times
smudo1965 3 months, 2 weeks ago
Selected Answer: B
When a read-only lock is configured for a storage account, users who don't have the account keys need to use Azure AD credentials to access blob
or queue data. A read-only lock also prevents the assignment of Azure RBAC roles that are scoped to the storage account or to a data container
(blob container or queue).
upvoted 3 times
Option B (Apply read-only locks on the storage accounts) is not a valid solution because it would prevent any application from modifying the
storage accounts, including the legacy applications that require write access.
Option C (Set the AllowBlobPublicAccess property to false) is not a valid solution because this property is used to enable or disable public
access to blobs in a storage account. Disabling public access would not prevent new applications from obtaining the access keys.
Other options, such as applying read-only locks on the storage accounts, setting the AllowBlobPublicAccess property to false, or configuring
automated key rotation, may not be as effective at preventing new applications from obtaining the access keys of the storage accounts, or may
have a greater impact on the legacy applications.
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 193/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
emiliocb4 9 months, 2 weeks ago
Selected Answer: B
B is the correct one... preventing the user list the keys
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 194/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You are designing the security standards for containerized applications onboarded to Azure.
You are evaluating the use of Microsoft Defender for Containers.
In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete
solution.
NOTE: Each correct selection is worth one point.
Correct Answer: CD
The new plan merges the capabilities of the two existing Microsoft Defender for Cloud plans, Microsoft Defender for Kubernetes and Microsoft
Defender for container registries.
Azure container registries can include both Windows and Linux images.
You can use Defender for Containers to scan the container images stored in your Azure Resource Manager-based Azure Container Registry, as
part of the protections provided within Microsoft Defender for Cloud.
To enable scanning of vulnerabilities in containers, you have to enable Defender for Containers. When the scanner, powered by Qualys, reports
vulnerabilities,
Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information
such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or
for a specific registry.
Note: Defender for Containers includes an integrated vulnerability scanner for scanning images in Azure Container Registry registries. The
vulnerability scanner runs on an image:
When you push the image to your registry
Weekly on any image that was pulled within the last 30
When you import the image to your Azure Container Registry
Continuously in specific situations
View vulnerabilities for running images
The recommendation Running container images should have vulnerability findings resolved shows vulnerabilities for running images by using
the scan results from ACR registries and information on running images from the Defender security profile/extension.
Incorrect:
Not A: The new plan merges the capabilities of the two existing Microsoft Defender for Cloud plans, Microsoft Defender for Kubernetes and
Microsoft Defender for container registries
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-usage
https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/introducing-microsoft-defender-for-containers/ba-p/2952317
https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-introduction
https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-introduction#view-vulnerabilities-for-running-images
upvoted 15 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 195/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
OS Packages Supported
• Alpine Linux 3.12-3.15
• Red Hat Enterprise Linux 6, 7, 8
• CentOS 6, 7
• Oracle Linux 6,6,7,8
• Amazon Linux 1,2
• openSUSE Leap 42, 15
• SUSE Enterprise Linux 11,12, 15
• Debian GNU/Linux wheezy, jessie, stretch, buster, bullseye
• Ubuntu 10.10-22.04
• FreeBSD 11.1-13.1
• Fedora 32, 33, 34, 35
upvoted 7 times
zellck Most Recent 1 month, 2 weeks ago
Selected Answer: DE
DE is the answer.
https://learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-containers?tabs=azure-aks#azure-aks
https://learn.microsoft.com/en-us/azure/defender-for-cloud/support-matrix-defender-for-containers?tabs=azure-aks#registries-and-images-
support-aks
upvoted 1 times
Microsoft Defender for Containers is compatible with Docker containers running on Linux operating systems, so it can scan for known
vulnerabilities in Linux containers deployed to Azure Container Instances and Azure Container Registry.
However, it cannot scan for known vulnerabilities in Windows containers deployed to Azure Kubernetes Service or Azure Container Registry, as
Microsoft Defender for Containers currently only supports Linux operating systems.
upvoted 1 times
Option A: This is correct as Microsoft Defender for Containers can scan Linux containers deployed to Azure Container Instances.
Option B: This is not correct as Microsoft Defender for Containers can only scan Windows containers if they are deployed to a Windows
Server 2019 node in an AKS cluster.
Option C: This is not correct as Azure Container Registry is a container registry service, and Microsoft Defender for Containers does not scan
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 196/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
container registries.
Option D: This is not correct as Microsoft Defender for Containers cannot scan Linux containers deployed to Azure Container Registry.
Option E: This is not correct as Microsoft Defender for Containers can only scan Linux containers deployed to AKS if they are deployed to a
Linux node pool.
upvoted 1 times
awssecuritynewbie 4 months, 1 week ago
Selected Answer: DE
Vulnerability assessment: Vulnerability assessment and management tools for images stored in ACR registries and running in Azure Kubernetes
Service. Learn more in Vulnerability assessment.
upvoted 2 times
Reference
What's new in Microsoft Defender for Cloud?
https://learn.microsoft.com/en-us/azure/defender-for-cloud/release-notes
August 2022
Updates in August include:
• Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
• Azure Monitor Agent integration now in preview
• Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
Defender for Containers now shows vulnerabilities for running Windows containers.
When vulnerabilities are detected, Defender for Cloud generates the following security recommendation listing the detected issues: Running
container images should have vulnerability findings resolved
upvoted 6 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-container-registries-introduction
upvoted 1 times
https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure
upvoted 1 times
Linux containers deployed to Azure Kubernetes Service (AKS): Microsoft Defender for Containers is a security solution that provides vulnerability
scanning for container images in Azure Kubernetes Service (AKS). It uses the Azure Container Registry Vulnerability Scanning feature to scan
container images for known vulnerabilities before they are deployed to AKS. This can help you identify and remediate vulnerabilities in your
container images, and improve the security of your containerized applications.
Windows containers deployed to Azure Kubernetes Service (AKS): Similar to Linux containers, Microsoft Defender for Containers can also be used
to scan for known vulnerabilities in Windows containers deployed to AKS. By using this solution, you can ensure that your Windows containers are
secure and compliant before they are deployed to production.
Other environments, such as Linux or Windows containers deployed to Azure Container Instances or Azure Container Registry, may not be
supported by Microsoft Defender for Containers.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 197/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 198/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft 365
subscription, and an Azure subscription.
The company's on-premises network contains internal web apps that use Kerberos authentication. Currently, the web apps are accessible only
from the network.
You have remote users who have personal devices that run Windows 11.
You need to recommend a solution to provide the remote users with the ability to access the web apps. The solution must meet the following
requirements:
✑ Prevent the remote users from accessing any other resources on the network.
✑ Support Azure Active Directory (Azure AD) Conditional Access.
✑ Simplify the end-user experience.
What should you include in the recommendation?
C. Microsoft Tunnel
Correct Answer: A
Azure Active Directory's Application Proxy provides secure remote access to on-premises web applications. After a single sign-on to Azure AD,
users can access both cloud and on-premises applications through an external URL or an internal application portal.
Azure AD Application Proxy is:
Secure. On-premises applications can use Azure's authorization controls and security analytics. For example, on-premises applications can use
Conditional
Access and two-step verification. Application Proxy doesn't require you to open inbound connections through your firewall.
Simple to use. Users can access your on-premises applications the same way they access Microsoft 365 and other SaaS apps integrated with
Azure AD. You don't need to change or update your applications to work with Application Proxy.
Incorrect:
https://learn.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy
Azure Active Directory's Application Proxy provides secure remote access to on-premises web applications. After a single sign-on to Azure AD,
users can access both cloud and on-premises applications through an external URL or an internal application portal. For example, Application Proxy
can provide remote access and single sign-on to Remote Desktop, SharePoint, Teams, Tableau, Qlik, and line of business (LOB) applications.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 199/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: A
The rest of them do not offer simple and also Conditional access because Azure AD is not being utilized.
upvoted 1 times
Azure AD Application Proxy also supports Azure AD Conditional Access, which allows you to set policies that determine when and how users can
access your applications. This can help you ensure that only authorized users are able to access the web apps, and that their access is secure.
Additionally, Azure AD Application Proxy simplifies the end-user experience by providing a single sign-on (SSO) experience for the users, which can
reduce the need for them to remember multiple usernames and passwords.
Other options, such as web content filtering in Microsoft Defender for Endpoint, Microsoft Tunnel, or Azure Virtual WAN, may not be as suitable for
this scenario because they do not provide the same level of control over access to the internal web apps or the same level of simplicity for the end-
user experience.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 200/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory
service.
You are migrating the on-premises infrastructure to a cloud-only infrastructure.
You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the
administrative effort to maintain the infrastructure.
Which identity service should you include in the recommendation?
Correct Answer: B
Lightweight Directory Access Protocol (LDAP) is an application protocol for working with various directory services. Directory services, such as
Active Directory, store user and account information, and security information like passwords. The service then allows the information to be
shared with other devices on the network. Enterprise applications such as email, customer relationship managers (CRMs), and Human
Resources (HR) software can use LDAP to authenticate, access, and find information.
Azure Active Directory (Azure AD) supports this pattern via Azure AD Domain Services (AD DS). It allows organizations that are adopting a
cloud-first strategy to modernize their environment by moving off their on-premises LDAP resources to the cloud. The immediate benefits will
be:
Integrated with Azure AD. Additions of users and groups, or attribute changes to their objects are automatically synchronized from your Azure
AD tenant to AD
DS. Changes to objects in on-premises Active Directory are synchronized to Azure AD, and then to AD DS.
Simplify operations. Reduces the need to manually keep and patch on-premises infrastructures.
Reliable. You get managed, highly available services
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/auth-ldap
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 201/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
maintain, and secure an on-premises domain controller. This can help reduce the administrative effort required to maintain the infrastructure and
ensure that the legacy applications continue to function as expected.
Other identity services, such as Azure Active Directory (Azure AD) or Azure Active Directory (Azure AD) B2C, may not be as suitable for this scenario
because they do not provide the same level of support for legacy applications that rely on LDAP and Kerberos-based authentication. Similarly,
using an on-premises Active Directory Domain Services (AD DS) instance would require maintaining additional infrastructure and may not be as
cost-effective or efficient as using a managed service like Azure AD DS.
upvoted 5 times
zellck Most Recent 1 month, 2 weeks ago
Selected Answer: B
B is the answer.
https://learn.microsoft.com/en-us/azure/active-directory-domain-services/overview
Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, lightweight directory
access protocol (LDAP), and Kerberos/NTLM authentication. You use these domain services without the need to deploy, manage, and patch domain
controllers (DCs) in the cloud.
An Azure AD DS managed domain lets you run legacy applications in the cloud that can't use modern authentication methods, or where you don't
want directory lookups to always go back to an on-premises AD DS environment. You can lift and shift those legacy applications from your on-
premises environment into a managed domain, without needing to manage the AD DS environment in the cloud.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 202/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT -
Your company has a Microsoft 365 ES subscription, an Azure subscription, on-premises applications, and Active Directory Domain Services (AD
DS).
You need to recommend an identity security strategy that meets the following requirements:
✑ Ensures that customers can use their Facebook credentials to authenticate to an Azure App Service website
✑ Ensures that partner companies can access Microsoft SharePoint Online sites for the project to which they are assigned
The solution must minimize the need to deploy additional infrastructure components.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 203/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/active-directory-b2c/overview
Azure Active Directory B2C provides business-to-customer identity as a service. Your customers use their preferred social, enterprise, or local
account identities to get single sign-on access to your applications and APIs.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 204/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
E. Enable Azure Active Directory (Azure AD) Privileged Identity Management (PIM) roles as virtual machine contributors.
Correct Answer: CD
C: Bastion provides secure remote access.
It uses RDP/SSH session is over TLS on port 443.
Note: Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal. The Azure
Bastion service is a fully platform-managed PaaS service that you provision inside your virtual network. It provides secure and seamless
RDP/SSH connectivity to your virtual machines directly from the Azure portal over TLS. When you connect via Azure Bastion, your virtual
machines don't need a public IP address, agent, or special client software.
D: Lock down inbound traffic to your Azure Virtual Machines with Microsoft Defender for Cloud's just-in-time (JIT) virtual machine (VM) access
feature. This reduces exposure to attacks while providing easy access when you need to connect to a VM.
Meets the requirement: Only provide permission to connect the virtual machines when required
Incorrect:
Not B: Does not address: Only provide permission to connect the virtual machines when required
Just Enough Administration (JEA) is a security technology that enables delegated administration for anything managed by PowerShell. With
JEA, you can:
Reduce the number of administrators on your machines using virtual accounts or group-managed service accounts to perform privileged
actions on behalf of regular users.
Limit what users can do by specifying which cmdlets, functions, and external commands they can run.
Better understand what your users are doing with transcripts and logs that show you exactly which commands a user executed during their
session.
Not E: Does not help with the remote access.
Note: Classic Virtual Machine Contributor: Lets you manage classic virtual machines, but not access to them, and not the virtual network or
storage account they're connected to.
Reference:
https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/jea/overview?view=powershell-7.2 https://docs.microsoft.com/en-
us/azure/defender-for-cloud/just-in-time-access-usage https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 205/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: CD
CD is the answer.
https://learn.microsoft.com/en-us/azure/architecture/solution-ideas/articles/multilayered-protection-azure-vm#components
Azure Bastion provides secure and seamless RDP and SSH connectivity to VMs in a network. In this solution, Azure Bastion connects users who use
Microsoft Edge or another internet browser for HTTPS, or secured traffic on port 443. Azure Bastion sets up the RDP connection to the VM. RDP
and SSH ports aren't exposed to the internet or the user's origin.
upvoted 1 times
Enable just-in-time (JIT) VM access: JIT VM access is a feature of Azure Security Center that allows you to control and monitor inbound traffic to
your virtual machines. By enabling JIT VM access, you can grant administrators access to the virtual machines only when required, and
automatically revoke the access when the session ends. This helps prevent unauthorized access to the virtual machines and ensures that access is
granted only to authorized administrators.
Other actions, such as configuring Azure VPN Gateway, enabling Just Enough Administration (JEA), or enabling Azure AD Privileged Identity
Management (PIM) roles as virtual machine contributors, may not be directly related to providing secure remote access to the virtual machines.
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 206/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 4 times
TheMCT 10 months ago
The given answer is correct: C & D
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 207/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: A
Azure SQL Managed Instance is the intelligent, scalable cloud database service that combines the broadest SQL Server database engine
compatibility with all the benefits of a fully managed and evergreen platform as a service. SQL Managed Instance has near 100% compatibility
with the latest SQL Server (Enterprise
Edition) database engine, providing a native virtual network (VNet) implementation that addresses common security concerns, and a business
model favorable for existing SQL Server customers. SQL Managed Instance allows existing SQL Server customers to lift and shift their on-
premises applications to the cloud with minimal application and database changes. At the same time, SQL Managed Instance preserves all
PaaS capabilities (automatic patching and version updates, automated backups, high availability) that drastically reduce management overhead
and TCO.
Note: Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics support dynamic data masking. Dynamic data masking
limits sensitive data exposure by masking it to non-privileged users.
Incorrect:
Not D: SQL Server does not support dynamic data masking.
Reference:
https://docs.microsoft.com/en-us/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview?view=azuresql
https://docs.microsoft.com/en-us/azure/azure-sql/database/dynamic-data-masking-overview?view=azuresql
Within Azure SQL Database, you have the option to deploy a managed instance. Azure SQL Database Managed Instance is a collection of system
and user databases with a shared set of resources. In addition to all the PaaS benefits of Azure SQL Database, this option provides a native virtual
network (VNet) and near 100 percent compatibility with on-premises SQL Server. Azure SQL Database Managed Instance provides you with full SQL
Server access and feature compatibility for migrating SQL Servers to Azure.
Recommendation: Choose Azure SQL Database for your modern cloud applications, or when you have time constraints in development and
marketing.
upvoted 21 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 208/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview?view=azuresql
https://learn.microsoft.com/en-us/azure/azure-sql/database/dynamic-data-masking-overview?view=azuresql
Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics support dynamic data masking. Dynamic data masking limits
sensitive data exposure by masking it to nonprivileged users.
upvoted 2 times
upvoted 5 times
Nico95 6 months ago
Selected Answer: C
Stop guessing A Vs. C
Just took the exam and there is no "Managed Instance" on the exam
Answer C
upvoted 10 times
Azure SQL Managed Instance provides built-in support for dynamic data masking, which is a security feature that allows you to mask sensitive data
in your databases to prevent unauthorized access. It also includes automated patching and maintenance, which can help reduce the operational
burden of maintaining your databases.
Other options, such as Azure Synapse Analytics dedicated SQL pools, Azure SQL Database, or SQL Server on Azure Virtual Machines, may not be as
suitable for this scenario because they may not provide the same level of manageability and security, or may be more costly to operate.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 210/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You need to recommend an Azure Bastion deployment to provide secure remote access to all the virtual machines.
Based on the virtual network design, how many Azure Bastion subnets are required?
A. 1
B. 2
C. 3
D. 4
E. 5
Correct Answer: C
The peering network Hub VNet, VNet1 and VNet2 requires one Bastion.
VNet3 also requires one Bastion.
Finally, VNet3 also requires one Bastion.
Note:
VNet peering -
Can I still deploy multiple Bastion hosts across peered virtual networks?
Yes. By default, a user sees the Bastion host that is deployed in the same virtual network in which VM resides. However, in the Connect menu, a
user can see multiple Bastion hosts detected across peered networks. They can select the Bastion host that they prefer to use to connect to the
VM deployed in the virtual network.
Make sure that you have set up an Azure Bastion host for the virtual network in which the virtual machine scale set resides.
Azure Bastion requires a dedicated subnet: AzureBastionSubnet. You must create this subnet in the same virtual network that you want to
deploy Azure Bastion to.
Can I deploy multiple Azure resources in my Azure Bastion subnet?
No. The Azure Bastion subnet (AzureBastionSubnet) is reserved only for the deployment of your Azure Bastion resource.
Reference:
https://docs.microsoft.com/en-us/azure/bastion/configuration-settings#subnet https://docs.microsoft.com/en-us/azure/bastion/bastion-
connect-vm-scale-set https://docs.microsoft.com/en-us/azure/bastion/bastion-faq
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 211/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/bastion/vnet-peering
Azure Bastion and VNet peering can be used together. When VNet peering is configured, you don't have to deploy Azure Bastion in each peered
VNet. This means if you have an Azure Bastion host configured in one virtual network (VNet), it can be used to connect to VMs deployed in a
peered VNet without deploying an additional bastion host.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 212/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
2 is the answer.
https://learn.microsoft.com/en-us/azure/bastion/vnet-peering
upvoted 2 times
KAG22 8 months, 2 weeks ago
Selected Answer: C
Can't see anything in the question that indicates that vnet3/vnet4 are paired, so vote for 3 bastions
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 213/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT -
Your company has an Azure App Service plan that is used to deploy containerized web apps.
You are designing a secure DevOps strategy for deploying the web apps to the App Service plan.
You need to recommend a strategy to integrate code scanning tools into a secure software development lifecycle. The code must be scanned
during the following two phases:
✑ Uploading the code to repositories
✑ Building containers
Where should you integrate code scanning for each phase? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 214/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 215/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing the encryption standards for data at rest for an Azure resource.
You need to provide recommendations to ensure that the data at rest is encrypted by using AES-256 keys. The solution must support rotating the
encryption keys monthly.
Solution: For Azure SQL databases, you recommend Transparent Data Encryption (TDE) that uses customer-managed keys (CMKs).
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
We need to use customer-managed keys.
Transparent data encryption (TDE) helps protect Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics against the
threat of malicious offline activity by encrypting data at rest. It performs real-time encryption and decryption of the database, associated
backups, and transaction log files at rest without requiring changes to the application.
In Azure, the default setting for TDE is that the Database Encryption Key (DEK) is protected by a built-in server certificate. The built-in server
certificate is unique for each server and the encryption algorithm used is AES 256.
TDE protector is either a service-managed certificate (service-managed transparent data encryption) or an asymmetric key stored in Azure Key
Vault (customer- managed transparent data encryption).
Note: Automated key rotation in Key Vault allows users to configure Key Vault to automatically generate a new key version at a specified
frequency. You can use rotation policy to configure rotation for each individual key. Our recommendation is to rotate encryption keys at least
every two years to meet cryptographic best practices.
This feature enables end-to-end zero-touch rotation for encryption at rest for Azure services with customer-managed key (CMK) stored in Azure
Key Vault. Please refer to specific Azure service documentation to see if the service covers end-to-end rotation.
Reference:
https://docs.microsoft.com/en-us/azure/azure-sql/database/transparent-data-encryption-tde-overview https://docs.microsoft.com/en-
us/azure/key-vault/keys/how-to-configure-key-rotation
https://learn.microsoft.com/en-us/azure/azure-sql/database/transparent-data-encryption-byok-overview?view=azuresql
Azure SQL transparent data encryption (TDE) with customer-managed key (CMK) enables Bring Your Own Key (BYOK) scenario for data protection
at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed TDE, the
customer is responsible for and in a full control of a key lifecycle management (key creation, upload, rotation, deletion), key usage permissions, and
auditing of operations on keys.
upvoted 1 times
Transparent Data Encryption (TDE) is a feature of Azure SQL that allows you to encrypt your databases and their backups with AES-256 keys. By
using TDE with customer-managed keys (CMKs), you can manage the encryption keys yourself, which means that you have full control over the
keys and can rotate them on a regular basis. This can help ensure that your data at rest is encrypted using AES-256 keys and that the encryption
keys are rotated regularly to enhance security.
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 216/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 4 times
JOKERO 8 months, 3 weeks ago
I would say no, because TDE is asymmetric key (can't be AES)
In this scenario, the key used for encryption of the Database Encryption Key (DEK), called TDE protector, is a customer-managed asymmetric key
stored in a customer-owned and customer-managed Azure Key Vault
To provide Azure SQL customers with two layers of encryption of data at rest, infrastructure encryption (using AES-256 encryption algorithm) with
platform managed keys is being rolled out.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 217/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
A customer uses Azure to develop a mobile app that will be consumed by external users as shown in the following exhibit.
You need to design an identity strategy for the app. The solution must meet the following requirements:
✑ Enable the usage of external IDs such as Google, Facebook, and Microsoft accounts.
✑ Use a customer identity store.
✑ Support fully customizable branding for the app.
Which service should you recommend to complete the design?
D. Azure AD Connect
Correct Answer: C
Azure Active Directory B2C (Azure AD B2C), an identity store, is an identity management service that enables custom control of how your
customers sign up, sign in, and manage their profiles when using your iOS, Android, .NET, single-page (SPA), and other applications.
You can set up sign-up and sign-in with a Facebook/Google account using Azure Active Directory B2C.
Branding -
Branding and customizing the user interface that Azure Active Directory B2C (Azure AD B2C) displays to your customers helps provide a
seamless user experience in your application. These experiences include signing up, signing in, profile editing, and password resetting. This
article introduces the methods of user interface (UI) customization.
Incorrect:
Not D: Azure AD Connect is a tool for connecting on-premises identity infrastructure to Microsoft Azure AD.
Reference:
https://docs.microsoft.com/en-us/azure/active-directory-b2c/
https://docs.microsoft.com/en-us/azure/active-directory-b2c/identity-provider-facebook?pivots=b2c-user-flow https://docs.microsoft.com/en-
us/azure/active-directory-b2c/customize-ui-with-html?pivots=b2c-user-flow
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 218/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
C is the answer.
https://learn.microsoft.com/en-us/azure/active-directory-b2c/overview
Azure Active Directory B2C provides business-to-customer identity as a service. Your customers use their preferred social, enterprise, or local
account identities to get single sign-on access to your applications and APIs.
upvoted 1 times
uffman 2 months, 1 week ago
Selected Answer: C
Correct.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 219/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You are designing security operations to support the hybrid cloud infrastructure. The solution must meet the following requirements:
✑ Govern virtual machines and servers across multiple environments.
✑ Enforce standards for all the resources across all the environments by using Azure Policy.
Which two components should you recommend for the on-premises network? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
D. Azure Arc
E. Azure Bastion
Correct Answer: CD
C: Azure Policy's guest configuration feature provides native capability to audit or configure operating system settings as code, both for
machines running in Azure and hybrid Arc-enabled machines. The feature can be used directly per-machine, or at-scale orchestrated by Azure
Policy.
Configuration resources in Azure are designed as an extension resource. You can imagine each configuration as an additional set of properties
for the machine.
Configurations can include settings such as:
Environment settings -
Configurations are distinct from policy definitions. Guest configuration utilizes Azure Policy to dynamically assign configurations to machines.
D: Azure Arc is a bridge that extends the Azure platform to help you build applications and services with the flexibility to run across datacenters,
at the edge, and in multicloud environments.
Microsoft recently [2019/2020] released Azure Arc, which unlocks new hybrid scenarios for organizations by bringing new Azure services and
management features to any infrastructure.
By the time of writing this post, the public preview supports the following operating systems:
Windows Server 2012 R2 and newer
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 220/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note that the resource providers are only registered in specific locations.
(Networking
During installation and runtime, the agent requires connectivity to Azure Arc service endpoints. If outbound connectivity is blocked by the
firewall, make sure that the following URLs are not blocked:
Required Azure service endpoints include:
Guest Configuration)
Incorrect:
Not A, Not B: Connect the on-premises machine to Azure Arc
To connect the on-premises machine to Azure Arc, we first need install the agent on the on-premises machine (not any Gateways).
Not E: Azure Bastion now supports connectivity to Azure virtual machines or on-premises resources via specified IP address.
Azure Bastion is a fully managed service that provides more secure and seamless Remote Desktop Protocol (RDP) and Secure Shell Protocol
(SSH) access to virtual machines (VMs) without any exposure through public IP addresses.
Reference:
https://techcommunity.microsoft.com/t5/azure-developer-community-blog/azure-arc-for-servers-getting-started/ba-p/1262062
https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/manage/hybrid/server/best-practices/arc-policies-mma
https://docs.microsoft.com/en-us/azure/governance/policy/concepts/guest-configuration
https://docs.microsoft.com/en-us/learn/modules/connect-on-premises-network-with-vpn-gateway/2-connect-on-premises-networks-to-azure-
using-site-to-site-vpn-gateways
upvoted 12 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 221/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Azure Policy Guest Configuration is now called Azure Automanage Machine Configuration
Ref: https://learn.microsoft.com/en-us/azure/governance/machine-configuration/overview
upvoted 6 times
https://learn.microsoft.com/en-us/azure/azure-arc/overview
Azure Arc simplifies governance and management by delivering a consistent multicloud and on-premises management platform.
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/manage/azure-server-management/guest-configuration-policy
You can use the Azure Policy guest configuration extension to audit the configuration settings in a virtual machine. Guest configuration supports
Azure VMs natively and non-Azure physical and virtual servers through Azure Arc-enabled servers.
upvoted 1 times
Azure Policy supports auditing the state of your Azure Arc-enabled server with guest configuration policies. Azure Policy's guest configuration
definitions can audit or apply settings inside the machine.
ARC is mandate for governing virtual machines both on-premises and cloud through Azure Connected Machine agent
https://learn.microsoft.com/en-us/azure/azure-arc/servers/agent-overview
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 222/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
D. Microsoft Sentinel
Correct Answer: D
Microsoft Sentinel is a scalable, cloud-native solution that provides:
Security information and event management (SIEM)
Security orchestration, automation, and response (SOAR)
Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise. With Microsoft Sentinel, you get a single
solution for attack detection, threat visibility, proactive hunting, and threat response.
Microsoft Sentinel is your bird's-eye view across the enterprise alleviating the stress of increasingly sophisticated attacks, increasing volumes
of alerts, and long resolution time frames.
Collect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds.
Detect previously undetected threats, and minimize false positives using Microsoft's analytics and unparalleled threat intelligence.
Investigate threats with artificial intelligence, and hunt for suspicious activities at scale, tapping into years of cyber security work at Microsoft.
Respond to incidents rapidly with built-in orchestration and automation of common tasks.
Microsoft Sentinel natively incorporates proven Azure services, like Log Analytics and Logic Apps. Microsoft Sentinel enriches your
investigation and detection with AI. It provides Microsoft's threat intelligence stream and enables you to bring your own threat intelligence.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/overview
https://learn.microsoft.com/en-us/azure/sentinel/overview
Microsoft Sentinel is a scalable, cloud-native solution that provides:
- Security information and event management (SIEM)
- Security orchestration, automation, and response (SOAR)
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 223/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT
-
Your company plans to follow DevSecOps best practices of the Microsoft Cloud Adoption Framework for Azure to integrate DevSecOps processes
into continuous integration and continuous deployment (CI/CD) DevOps pipelines.
You need to recommend which security-related tasks to integrate into each stage of the DevOps pipelines.
What should recommend? To answer, select the appropriate options in the answer area.
Correct Answer:
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#commit-the-code
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 224/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Typically, developers create, manage, and share their code in repositories such as GitHub or Azure Repos. This approach provides a central, version-
controlled library of code for developers to collaborate on easily. However, enabling many collaborators on a single codebase also runs the risk of
changes being introduced. That risk can lead to vulnerabilities or unintentionally including credentials or tokens in commits.
To address this risk, development teams should evaluate and implement a repository scanning capability. Repository scanning tools perform static
code analysis on source code within repositories. The tools look for vulnerabilities or credentials changes and flag any items found for remediation.
This capability acts to protect against human error and is a useful safeguard for distributed teams where many people are collaborating in the
same repository.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#static-application-security-testing
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 225/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
For a Microsoft cloud environment, you are designing a security architecture based on the Microsoft Cloud Security Benchmark.
What are three best practices for identity management based on the Azure Security Benchmark? Each correct answer presents a complete
solution.
https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-1-use-centralized-identity-and-
authentication-system
Security Principle: Use a centralized identity and authentication system to govern your organization's identities and authentications for cloud and
non-cloud resources.
https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-2-protect-identity-and-
authentication-systems
Security Principle: Secure your identity and authentication system as a high priority in your organization's cloud security practice.
upvoted 1 times
IM-1: Standardize Azure Active Directory as the central identity and authentication system
IM-2: Manage application identities securely and automatically
IM-3: Use Azure AD single sign-on (SSO) for application access
IM-4: Use strong authentication controls for all Azure Active Directory based access
IM-5: Monitor and alert on account anomalies
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 226/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 227/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company plans to follow DevSecOps best practices of the Microsoft Cloud Adoption Framework for Azure.
You need to perform threat modeling by using a top-down approach based on the Microsoft Cloud Adoption Framework for Azure.
Correct Answer: A
https://learn.microsoft.com/en-us/azure/security/develop/secure-design#use-threat-modeling-during-application-design
Modeling the application design and enumerating STRIDE threats-Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and
Elevation of Privilege-across all trust boundaries has proven an effective way to catch design errors early on.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 228/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive
data by using dynamic data masking. The solution must minimize costs.
Correct Answer: C
https://learn.microsoft.com/en-us/azure/azure-sql/database/sql-database-paas-overview?view=azuresql
Azure SQL Database is a fully managed platform as a service (PaaS) database engine that handles most of the database management functions
such as upgrading, patching, backups, and monitoring without user involvement. Azure SQL Database is always running on the latest stable version
of the SQL Server database engine and patched OS with 99.99% availability. PaaS capabilities built into Azure SQL Database enable you to focus on
the domain-specific database administration and optimization activities that are critical for your business.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 229/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You are designing a new Azure environment based on the security best practices of the Microsoft Cloud Adoption Framework for Azure. The
environment will contain one subscription for shared infrastructure components and three separate subscriptions for applications.
You need to recommend a deployment solution that includes network security groups (NSGs), Azure Firewall, Azure Key Vault, and Azure Bastion.
The solution must minimize deployment effort and follow security best practices of the Microsoft Cloud Adoption Framework for Azure.
D. Azure Advisor
Correct Answer: A
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/scenarios/app-platform/app-services/landing-zone-accelerator
The Azure App Service landing zone accelerator is an open-source collection of architectural guidance and reference implementation to accelerate
deployment of Azure App Service at scale. It can provide a specific architectural approach and reference implementation via infrastructure as code
templates to prepare your landing zones. The landing zones adhere to the architecture and best practices of the Cloud Adoption Framework.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 230/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company uses Azure Pipelines and Azure Repos to implement continuous integration and continuous deployment (CI/CD) workflows for the
deployment of applications to Azure.
You are updating the deployment process to align with DevSecOps controls guidance in the Microsoft Cloud Adoption Framework for Azure.
You need to recommend a solution to ensure that all code changes are submitted by using pull requests before being deployed by the CI/CD
workflow.
C. Azure policies
Correct Answer: B
https://learn.microsoft.com/en-us/azure/devops/repos/git/branch-policies-overview?view=azure-devops#adopt-a-git-branching-strategy
There are a few critical branches in your repo that the team relies on always being in good shape, such as your main branch.
Require pull requests to make any changes on these branches. Developers pushing changes directly to the protected branches will have their
pushes rejected.
upvoted 1 times
Branch policies in Azure Repos provide a way to enforce code review policies before a pull request can be completed and merged into a target
branch. This ensures that all code changes are submitted through a pull request and reviewed by other members of the team before being
deployed by the CI/CD workflow.
Branch policies can be configured to require specific reviewers, require a minimum number of approvals, and block direct pushes to the target
branch. This helps to ensure that code changes are thoroughly reviewed and meet the established standards before being merged into the target
branch.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 231/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #1 Topic 4
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application
attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
Which security control should you recommend?
Correct Answer: B
Microsoft Defender for Cloud Apps OAuth app policies.
OAuth app policies enable you to investigate which permissions each app requested and which users authorized them for Office 365, Google
Workspace, and
Salesforce. You're also able to mark these permissions as approved or banned. Marking them as banned will revoke permissions for each app
for each user who authorized it.
Incorrect:
Not D: Windows Defender Application cannot be used for virtual machines.
Reference:
https://docs.microsoft.com/en-us/defender-cloud-apps/app-permission-policy
Notice that only the wrong answers were changed. I'd vote D based on what I know about application control policies.
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-
create#windows-defender-application-control-policy-rules
upvoted 36 times
https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 232/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
prevents malicious code from running by ensuring that only approved code, that you know, can be run.
Application Control is a software-based security layer that enforces an explicit list of software that is allowed to run on a PC. On its own, Application
Control doesn't have any hardware or firmware prerequisites. Application Control policies deployed with Configuration Manager enable a policy on
devices in targeted collections that meet the minimum Windows version and SKU requirements outlined in this article. Optionally, hypervisor-based
protection of Application Control policies deployed through Configuration Manager can be enabled through group policy on capable hardware.
upvoted 1 times
https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager
upvoted 1 times
microsoft-defender-antivirus?view=o365-worldwide
The Microsoft Defender for Cloud Apps app permissions enable you to see which user-installed OAuth applications have access to Office 365 data,
Google Workspace data, and Salesforce data. Defender for Cloud Apps tells you what permissions the apps have and which users granted these
apps access to their Office 365, Google Workspace, and Salesforce accounts. App permissions help you decide which apps you allow your users to
access and which ones you want to ban.
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 234/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 4
Your company plans to provision blob storage by using an Azure Storage account. The blob storage will be accessible from 20 application servers
on the internet.
You need to recommend a solution to ensure that only the application servers can access the storage account.
What should you recommend using to secure the blob storage?
Correct Answer: C
Configure Azure Storage firewalls and virtual networks.
To secure your storage account, you should first configure a rule to deny access to traffic from all networks (including internet traffic) on the
public endpoint, by default. Then, you should configure rules that grant access to traffic from specific VNets. You can also configure rules to
grant access to traffic from selected public internet IP address ranges, enabling connections from specific internet or on-premises clients. This
configuration enables you to build a secure network boundary for your applications.
Storage firewall rules apply to the public endpoint of a storage account. You don't need any firewall access rules to allow traffic for private
endpoints of a storage account. The process of approving the creation of a private endpoint grants implicit access to traffic from the subnet
that hosts the private endpoint.
Incorrect:
Not B: You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network. A network
security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure
resources. For each rule, you can specify source and destination, port, and protocol.
Not E: A service tag represents a group of IP address prefixes from a given Azure service. Microsoft manages the address prefixes
encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent
updates to network security rules.
Reference:
https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security
https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security?tabs=azure-portal
Turning on firewall rules for your storage account blocks incoming requests for data by default, unless the requests originate from a service that
operates within an Azure virtual network or from allowed public IP addresses. Requests that are blocked include those from other Azure services,
from the Azure portal, and from logging and metrics services.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 235/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 236/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 4
Your company is developing a modern application that will un as an Azure App Service web app.
You plan to perform threat modeling to identity potential security issues by using the Microsoft Threat Modeling Tool.
Which type of diagram should you create?
A. system flow
B. data flow
C. process flow
D. network flow
Correct Answer: C
Process flow diagrams are the result of a maturing threat modeling discipline. They genuinely allow incorporation of developers in the threat
modeling process during the application design phase. This helps developers working within an Agile development methodology initially write
secure code.
Application threat models use process-flow diagrams, representing the architectural point of view. Operational threat models are created from
an attacker point of view based on DFDs. This approach allows for the integration of VAST into the organization's development and DevOps
lifecycles.
Incorrect:
Not B: Data-flow diagrams are graphical representations of your system and should specify each element, their interactions and helpful context.
Data-flow diagrams are made up of shapes that create graphical representations of your system. Each shape represents a unique function.
Each interaction is analyzed to help you identify potential threats and ways to reduce risk.
Using shapes correctly allows you to receive better input from colleagues and security teams. Everyone will then understand how the system
works. It can also help them avoid going through countless design documents and development plans to get them up and running.
Reference:
https://threatmodeler.com/data-flow-diagrams-process-flow-diagrams/ https://docs.microsoft.com/en-us/learn/modules/tm-create-a-threat-
model-using-foundational-data-flow-diagram-elements/1b-elements
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-getting-started
upvoted 1 times
Data flow diagram with data storage, data flows, function and interface
Data flow diagram with data storage, data flows, function and interface
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 237/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Reference
Getting started with the Threat Modeling Tool
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-getting-started
upvoted 3 times
These are used by agile teams to build application threat models (ATMs). Agile software development teams can analyse their applications and
features by critically examining the communication protocols used to connect the code’s building blocks together.
The question refers to applications
https://www.diagrams.net/blog/threat-modelling
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 238/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
ans is correct
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 239/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 4
B. hybrid connections
D. a private endpoint
Correct Answer: B
Hybrid Connections can connect Azure App Service Web Apps to on-premises resources that use a static TCP port. Supported resources
include Microsoft SQL
Server, MySQL, HTTP Web APIs, Mobile Services, and most custom Web Services.
Note: You can use an Azure App Service Hybrid Connections. To do this, you need to add and create Hybrid Connections in your app. You will
download and install an agent (the Hybrid Connection Manager) in the database server or another server which is in the same network as the
on-premise database.
You configure a logical connection on your app service or web app.
A small agent, the Hybrid Connection Manager, is downloaded and installed on a Windows Server (2012 or later) running in the remote network
(on-premises or anywhere) that you need to communicate with.
You log into your Azure subscription in the Hybrid Connection manager and select the logical connection in your app service.
The Hybrid Connection Manager will initiate a secure tunnel out (TCP 80/443) to your app service in Azure.
Your app service can now communicate with TCP-based services, on Windows or Linux, in the remote network via the Hybrid Connection
Manager.
You could get more details on how to Connect Azure Web Apps To On-Premises.
Incorrect:
Not A: NAT gateway provides outbound internet connectivity for one or more subnets of a virtual network. Once NAT gateway is associated to a
subnet, NAT provides source network address translation (SNAT) for that subnet. NAT gateway specifies which static IP addresses virtual
machines use when creating outbound flows.
However, we need an inbound connection.
Not C: You can Azure web app service VNet integration with Azure VPN gateway to securely access the resource in an Azure VNet or on-
premise network.
However, this would require a Site to Site VPN as in the picture below.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 240/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: Virtual network integration gives your app access to resources in your virtual network, but it doesn't grant inbound private access to your
app from the virtual network. Private site access refers to making an app accessible only from a private network, such as from within an Azure
virtual network. Virtual network integration is used only to make outbound calls from your app into your virtual network. The virtual network
integration feature behaves differently when it's used with virtual networks in the same region and with virtual networks in other regions. The
virtual network integration feature has two variations:
Regional virtual network integration: When you connect to virtual networks in the same region, you must have a dedicated subnet in the virtual
network you're integrating with.
Gateway-required virtual network integration: When you connect directly to virtual networks in other regions or to a classic virtual network in the
same region, you need an Azure Virtual Network gateway created in the target virtual network.
Reference:
https://github.com/uglide/azure-content/blob/master/articles/app-service-web/web-sites-hybrid-connection-connect-on-premises-sql-
server.md https://docs.microsoft.com/en-us/answers/questions/701793/connecting-to-azure-app-to-onprem-datbase.html
https://learn.microsoft.com/en-us/azure/app-service/app-service-hybrid-connections
Within App Service, Hybrid Connections can be used to access application resources in any network that can make outbound calls to Azure over
port 443. Hybrid Connections provides access from your app to a TCP endpoint and doesn't enable a new way to access your app. As used in App
Service, each Hybrid Connection correlates to a single TCP host and port combination. This enables your apps to access resources on any OS,
provided it's a TCP endpoint. The Hybrid Connections feature doesn't know or care what the application protocol is, or what you are accessing. It
simply provides network access.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 241/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Not possible, because there is no VPN between Azure and the local network.
upvoted 1 times
Private endpoints provide secure access to Azure Services over a private endpoint in your virtual network. Using a private endpoint, you can access
Azure services such as Azure Storage, Azure Cosmos DB, Azure SQL Database, and others over a private IP address in your virtual network. With a
private endpoint, traffic between your virtual network and the Azure service travels over the Microsoft backbone network, eliminating exposure
from the public internet.
In this scenario, using a private endpoint for the Microsoft SQL Server databases on the on-premises network would provide a secure connection
between the web apps and the databases without requiring a Site-to-Site VPN or an ExpressRoute connection. This would minimize the number of
open internet-accessible endpoints to the on-premises network, which would help enhance security.
upvoted 1 times
Hybrid connections allow you to connect your Azure App Service web apps to on-premises resources securely. A hybrid connection consists of
an Azure Relay service endpoint that is used to relay traffic between the App Service app and the on-premises resource.
upvoted 1 times
However, compared to private endpoints, hybrid connections can have some additional configuration overhead, require the installation of an
agent on the on-premises network, and could add some additional network hops. Therefore, private endpoints are generally considered to
be the preferred option for connecting Azure App Service web apps to on-premises resources.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/app-service/app-service-hybrid-connections#how-it-works
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 242/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #5 Topic 4
You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL).
You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application
design, development, and deployment.
What should you include during the application design phase?
Correct Answer: C
Threat modeling is a core element of the Microsoft Security Development Lifecycle (SDL). It's an engineering technique you can use to help you
identify threats, attacks, vulnerabilities, and countermeasures that could affect your application. You can use threat modeling to shape your
application's design, meet your company's security objectives, and reduce risk.
Incorrect:
Not B: Advantages of Veracode's DAST test solution
With a blackbox test tool from Veracode, you can:
Simulate the actions of an actual attacker to discover vulnerabilities not found by other testing techniques.
Run tests on applications developed in any language ג€" JAVA/JSP, PHP and other engine-driven web applications.
Provide development and QA teams with a report on critical vulnerabilities along with information that lets them recreate the flaws.
Fix issues more quickly with detailed remediation information.
Develop long-term strategies for improving application security across your software portfolio using guidance and proactive recommendations
from Veracode's expert.
Not D: SonarQube is a leading automatic code review tool to detect bugs, vulnerabilities and code smells in your code. Using Static Application
Security Testing
(SAST) you can do an analysis of vulnerabilities in your code, also known as white-box testing to find about 50% of likely issues.
Reference:
https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#plan-and-develop
Typically, modern development follows an agile development methodology. Scrum is one implementation of agile methodology that has every
sprint start with a planning activity. Introducing security into this part of the development process should focus on:
- Threat modeling to view the application through the lens of a potential attacker
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 243/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 244/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #6 Topic 4
DRAG DROP -
Your company has Microsoft 365 E5 licenses and Azure subscriptions.
The company plans to automatically label sensitive data stored in the following locations:
✑ Microsoft SharePoint Online
✑ Microsoft Exchange Online
✑ Microsoft Teams
You need to recommend a strategy to identify and protect sensitive data.
Which scope should you recommend for the sensitivity label policies? To answer, drag the appropriate scopes to the correct locations. Each scope
may only be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 245/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Reference:
https://docs.microsoft.com/en-us/azure/purview/create-sensitivity-label https://docs.microsoft.com/en-us/azure/active-directory/enterprise-
users/groups-assign-sensitivity-labels
https://learn.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide#what-sensitivity-labels-can-do
After a sensitivity label is applied to an email, meeting invite, or document, any configured protection settings for that label are enforced on the
content. You can configure a sensitivity label to:
- Protect content in containers such as sites and groups when you enable the capability to use sensitivity labels with Microsoft Teams, Microsoft
365 groups, and SharePoint sites.
upvoted 1 times
For Microsoft SharePoint Online and Microsoft Exchange Online, the scope should be "Files and emails".
For Microsoft Teams, the scope should be "Groups and sites".
upvoted 1 times
"Files and emails" scope is used for files and emails stored in SharePoint Online and Exchange Online, respectively. This scope will allow the
sensitivity label policies to automatically classify and protect sensitive data in files and emails stored in these locations.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 246/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
"Groups and sites" scope is used for Microsoft Teams. This scope will allow the sensitivity label policies to automatically classify and protect
sensitive data in Teams channels and sites.
Since the question is asking about identifying and protecting sensitive data, "Schematized data assets" scope is not relevant here as it is used
for identifying sensitive data based on structured data, such as columns in a database table or Azure Data Factory.
upvoted 1 times
https://learn.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels?view=o365-worldwide#label-scopes
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 247/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #7 Topic 4
Correct Answer: A
Dynamic application security testing (DAST) is a process of testing an application in an operating state to find security vulnerabilities. DAST
tools analyze programs while they are executing to find security vulnerabilities such as memory corruption, insecure server configuration, cross-
site scripting, user privilege issues, SQL injection, and other critical security concerns.
Incorrect:
Not B: SAST tools analyze source code or compiled versions of code when the code is not executing in order to find security flaws.
Not C: IAST (interactive application security testing) analyzes code for security vulnerabilities while the app is run by an automated test, human
tester, or any activity ג€interactingג€ with the application functionality.
IAST works inside the application, which makes it different from both static analysis (SAST) and dynamic analysis (DAST). This type of testing
also doesn't test the entire application or codebase, but only whatever is exercised by the functional test.
Not D: Runtime Application Self Protection (RASP) is a security solution designed to provide personalized protection to applications. It takes
advantage of insight into an application's internal data and state to enable it to identify threats at runtime that may have otherwise been
overlooked by other security solutions.
RASP's focused monitoring makes it capable of detecting a wide range of threats, including zero-day attacks. Since RASP has insight into the
internals of an application, it can detect behavioral changes that may have been caused by a novel attack. This enables it to respond to even
zero-day attacks based upon how they affect the target application.
Reference:
https://docs.microsoft.com/en-us/azure/security/develop/secure-develop
https://learn.microsoft.com/en-us/azure/security/develop/secure-develop#test-your-application-in-an-operating-state
Dynamic application security testing (DAST) is a process of testing an application in an operating state to find security vulnerabilities. DAST tools
analyze programs while they are executing to find security vulnerabilities such as memory corruption, insecure server configuration, cross-site
scripting, user privilege issues, SQL injection, and other critical security concerns.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 248/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #8 Topic 4
Your company develops several applications that are accessed as custom enterprise applications in Azure Active Directory (Azure AD).
You need to recommend a solution to prevent users on a specific list of countries from connecting to the applications.
What should you include in the recommendation?
Correct Answer: A
Microsoft Defender for Cloud Apps Activity policies.
Activity policies allow you to enforce a wide range of automated processes using the app provider's APIs. These policies enable you to monitor
specific activities carried out by various users, or follow unexpectedly high rates of one certain type of activity.
After you set an activity detection policy, it starts to generate alerts - alerts are only generated on activities that occur after you create the
policy.
Each policy is composed of the following parts:
Activity filters ג€" Enable you to create granular conditions based on metadata.
Activity match parameters ג€" Enable you to set a threshold for the number of times an activity repeats to be considered to match the policy.
Actions ג€" The policy provides a set of governance actions that can be automatically applied when violations are detected.
Incorrect:
Not C: Azure AD Conditional Access policies applies to users, not to applications.
Note: Blocking user logins by location can be an added layer of security to your environment. The following process will use Azure Active
Directory conditional access to block access based on geographical location. For example, you are positive that nobody in your organization
should be trying to login to select cloud applications from specific countries.
Reference:
https://docs.microsoft.com/en-us/defender-cloud-apps/user-activity-policies https://cloudcompanyapps.com/2019/04/18/block-users-by-
location-in-azure-o365/
https://docs.microsoft.com/en-us/power-platform/admin/restrict-access-online-trusted-ip-rules
upvoted 28 times
https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/overview#common-signals
Common signals that Conditional Access can take in to account when making a policy decision include the following signals:
IP Location information
- Organizations can create trusted IP address ranges that can be used when making policy decisions.
- Administrators can specify entire countries/regions IP ranges to block or allow traffic from.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 250/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
The description is wrong about “Azure AD Conditional Access policies applies to users, not to applications”. C is the correct answer. I’ve
implemented CA policies with named location restrict app access from designated countries many times.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 251/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 4
Correct Answer: D
A shared access signature (SAS) provides secure delegated access to resources in your storage account. With a SAS, you have granular control
over how a client can access your data. For example:
What resources the client may access.
What permissions they have to those resources.
How long the SAS is valid.
Types of shared access signatures
Azure Storage supports three types of shared access signatures:
Service SAS -
Account SAS -
Reference:
https://docs.microsoft.com/en-us/azure/storage/common/storage-sas-overview
https://learn.microsoft.com/en-us/azure/storage/common/storage-sas-overview
A shared access signature (SAS) provides secure delegated access to resources in your storage account. With a SAS, you have granular control over
how a client can access your data. For example:
- What resources the client may access.
- What permissions they have to those resources.
- How long the SAS is valid.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 252/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You can use private endpoints for your Azure Storage accounts to allow clients on a virtual network (VNet) to securely access data over a Private
Link. The private endpoint uses a separate IP address from the VNet address space for each storage account service. Network traffic between the
clients on the VNet and the storage account traverses over the VNet and a private link on the Microsoft backbone network, eliminating exposure
from the public internet.
upvoted 1 times
janesb 5 months ago
Answer is A , please check the word exposing the blobs publicly
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 253/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company is developing an invoicing application that will use Azure Active Directory (Azure AD) B2C. The application will be deployed as an
App Service web app.
You need to recommend a solution to the application development team to secure the application from identity-related attacks.
Which two configurations should you recommend? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
B. Azure AD Conditional Access integration with user flows and custom policies
Correct Answer: BD
B: Add Conditional Access to user flows in Azure Active Directory B2C
Conditional Access can be added to your Azure Active Directory B2C (Azure AD B2C) user flows or custom policies to manage risky sign-ins to
your applications.
Azure Active Directory (Azure AD) Conditional Access is the tool used by Azure AD B2C to bring signals together, make decisions, and enforce
organizational policies.
Not C: Credential attacks lead to unauthorized access to resources. Passwords that are set by users are required to be reasonably complex.
Azure AD B2C has mitigation techniques in place for credential attacks. Mitigation includes detection of brute-force credential attacks and
dictionary credential attacks. By using various signals, Azure Active Directory B2C (Azure AD B2C) analyzes the integrity of requests. Azure AD
B2C is designed to intelligently differentiate intended users from hackers and botnets.
Incorrect:
Not D: Identity Governance though useful, does not address this specific scenario: to secure the application from identity-related attack in an
Azure AD B2C environment.
Note: Identity Governance gives organizations the ability to do the following tasks across employees, business partners and vendors, and
across services and applications both on-premises and in clouds:
https://docs.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-user-flow?pivots=b2c-user-flow
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 254/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 12 times
CertShooter Highly Voted 6 months, 2 weeks ago
Selected Answer: BC
I recommend configuring Azure AD Conditional Access and using smart account lockout in Azure AD B2C.
Azure AD Conditional Access allows you to set policies that determine when and how users can access your application. By integrating Azure AD
Conditional Access with user flows and custom policies, you can define rules that ensure only authenticated users can access the application, and
you can also set up multifactor authentication for additional security.
Smart account lockout in Azure AD B2C is a feature that helps protect against brute-force attacks by temporarily locking out accounts after a
certain number of failed login attempts. This can help prevent unauthorized access to the application by preventing attackers from guessing login
credentials.
Options A, D, and E are not relevant to securing the application from identity-related attacks. Option A involves monitoring risk detections, which is
not directly related to securing the application. Option D involves access packages in Identity Governance, which is not related to the security of
the application. Option E involves custom ROPC flows, which are not relevant to securing the application from identity-related attacks.
upvoted 7 times
https://learn.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-user-flow?pivots=b2c-user-flow
Conditional Access can be added to your Azure Active Directory B2C (Azure AD B2C) user flows or custom policies to manage risky sign-ins to your
applications. Azure Active Directory (Azure AD) Conditional Access is the tool used by Azure AD B2C to bring signals together, make decisions, and
enforce organizational policies.
upvoted 1 times
Conditional Access in Azure Active Directory (Azure AD) is a feature that enables you to enforce security policies and control access to applications
based on specific conditions,
upvoted 2 times
upvoted 5 times
https://docs.microsoft.com/en-us/learn/modules/plan-implement-entitlement-management/2-define-access-packages
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 256/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
D. retention policies
Correct Answer: A
What sensitivity labels can do -
After a sensitivity label is applied to an email or document, any configured protection settings for that label are enforced on the content. You
can configure a sensitivity label to:
* Protect content in containers such as sites and groups when you enable the capability to use sensitivity labels with Microsoft Teams,
Microsoft 365 groups, and
SharePoint sites.
* Encrypt emails and documents to prevent unauthorized people from accessing this data. You can additionally choose which users or group
have permissions to perform which actions and for how long. For example, you can choose to allow all users in your organization to modify a
document while a specific group in another organization can only view it. Alternatively, instead of administrator-defined permissions, you can
allow your users to assign permissions to the content when they apply the label.
* Mark the content when you use Office apps, by adding watermarks, headers, or footers to email or documents that have the label applied.
Watermarks can be applied to documents but not email.
* Etc.
Note: Publish sensitivity labels by creating a label policy
1. From the Microsoft Purview compliance portal, select Solutions > Information protection > Label policies
2. On the Label policies page, select Publish label to start the Create policy configuration:
3. On the Choose sensitivity labels to publish page, select the Choose sensitivity labels to publish link. Select the labels that you want to make
available in apps and to services, and then select Add.
4. Etc.
Incorrect:
Not B: In this scenario the company itself has identified the sensitive information. This means that sensitive labels are enough, and there is no
need for Data loss prevention (DLP) polices.
Note: With DLP policies, you can identify, monitor, and automatically protect sensitive information across Office 365. Data loss prevention
policies can use sensitivity labels and sensitive information types to identify sensitive information.
Note: Microsoft 365 includes many sensitive information types that are ready for you to use in DLP policies and for automatic classification
with sensitivity and retention labels.
Reference:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 257/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels https://docs.microsoft.com/en-
us/security/compass/information-protection-and-storage-capabilities https://docs.microsoft.com/en-us/microsoft-365/compliance/create-
sensitivity-labels?view=o365-worldwide#publish-sensitivity-labels-by-creating-a-label-policy
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
Organizations have sensitive information under their control such as financial data, proprietary data, credit card numbers, health records, or social
security numbers. To help protect this sensitive data and reduce risk, they need a way to prevent their users from inappropriately sharing it with
people who shouldn't have it. This practice is called data loss prevention (DLP).
In Microsoft Purview, you implement data loss prevention by defining and applying DLP policies. With a DLP policy, you can identify, monitor, and
automatically protect sensitive items across:
- Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive accounts
upvoted 1 times
DLP policies in Microsoft 365 allow you to identify, monitor, and protect sensitive information, such as PHI, within your organization. You can create
DLP policies that identify PHI within stored documents and communications and then set rules to prevent the PHI from being shared outside the
company. For example, you can create a DLP policy that blocks emails containing PHI from being sent to external recipients, or that prevents
documents containing PHI from being shared outside the organization.
Sensitivity label policies allow you to classify and protect sensitive information, but they do not specifically prevent the information from being
shared outside the organization. Insider risk management policies are designed to detect and mitigate risks posed by insider threats, but they are
not directly related to preventing the sharing of sensitive information. Retention policies allow you to specify how long certain types of information
should be retained, but they do not prevent the sharing of sensitive information.
upvoted 4 times
because PREVENT ..
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 258/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
InformationOverload 9 months, 4 weeks ago
Selected Answer: B
DLP policies
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 259/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
C. eDiscovery
D. Information Governance
Correct Answer: B
Data loss prevention (DLP)
With DLP policies, you can identify, monitor, and automatically protect sensitive information across Office 365. Data loss prevention policies
can use sensitivity labels and sensitive information types to identify sensitive information.
Note: Microsoft 365 includes many sensitive information types that are ready for you to use in DLP policies and for automatic classification
with sensitivity and retention labels.
Incorrect:
Not A: Content explorer shows a current snapshot of the items that have a sensitivity label, a retention label or have been classified as a
sensitive information type in your organization.
Reference:
https://docs.microsoft.com/en-us/security/compass/information-protection-and-storage-capabilities https://docs.microsoft.com/en-
us/microsoft-365/compliance/data-classification-content-explorer
“Content explorer. This tab provides visibility into the amount and types of sensitive data in an organization. It also enables users to filter by label
or sensitivity type. Doing so displays a detailed view of locations where the sensitive data is stored. It provides admins with the ability to:
index the sensitive documents that are stored within supported Microsoft 365 workloads.
identify the sensitive information they're storing.”
upvoted 9 times
https://learn.microsoft.com/en-us/microsoft-365/compliance/data-classification-content-explorer?view=o365-worldwide#sensitive-information-
types
"If you know the name of the label, or the sensitive information type, you can type that into the filter box.
Alternately, you can browse for the item by expanding the label type and selecting the label from the list."
Selected Answer: A
A is the answer.
https://learn.microsoft.com/en-us/microsoft-365/compliance/data-classification-content-explorer?view=o365-worldwide#content-explorer
Content explorer shows a current snapshot of the items that have a sensitivity label, a retention label or have been classified as a sensitive
information type in your organization.
upvoted 1 times
DLP in Microsoft 365 allows you to create policies that identify and protect sensitive information types such as credit card numbers, social security
numbers, and other confidential data types. You can use DLP policies to scan content in Teams, SharePoint Online, and Exchange Online for
sensitive information types, and take appropriate actions to protect the information.
Therefore, the recommended solution to identify documents that contain sensitive information is to use Data Loss Prevention (DLP) in Microsoft
365.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 261/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
If I had to choose only one, I would recommend data loss prevention (DLP), as it provides a comprehensive set of tools for identifying, monitoring,
and protecting sensitive data across an organization's networks and cloud services, including Microsoft Teams, SharePoint Online, and Exchange
Online.
The requirement “identify documents that contain sensitive information.” Is related to Know your data, so IA would go for A. data classification
content explorer.
Data Classification Content explorer shows a current snapshot of the items that have a sensitivity label, a retention label or have been classified as a
sensitive information type in your organization.
Reference
Deploy an information protection solution with Microsoft Purview
https://learn.microsoft.com/en-us/microsoft-365/compliance/information-protection-solution
upvoted 5 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 262/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.
You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend configuring gateway-required virtual network integration.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead: You recommend access restrictions based on HTTP headers that have the Front Door ID.
Restrict access to a specific Azure Front Door instance
Traffic from Azure Front Door to your application originates from a well-known set of IP ranges defined in the AzureFrontDoor.Backend service
tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from
your specific instance, you will need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
Incorrect:
Virtual Network (VNet) integration for an Azure service enables you to lock down access to the service to only your virtual network
infrastructure. The VNet infrastructure also includes peered virtual networks and on-premises networks.
VNet integration provides Azure services the benefits of network isolation and can be accomplished by one or more of the following methods:
Deploying dedicated instances of the service into a virtual network. The services can then be privately accessed within the virtual network and
from on-premises networks.
Using Private Endpoint that connects you privately and securely to a service powered by Azure Private Link. Private Endpoint uses a private IP
address from your
VNet, effectively bringing the service into your virtual network.
Accessing the service using public endpoints by extending a virtual network to the service, through service endpoints. Service endpoints allow
service resources to be secured to the virtual network.
Using service tags to allow or deny traffic to your Azure resources to and from public IP endpoints.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions https://docs.microsoft.com/en-us/azure/virtual-network/vnet-
integration-for-azure-services
https://learn.microsoft.com/en-us/azure/app-service/overview-access-restrictions#restrict-access-to-a-specific-azure-front-door-instance
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag.
Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your
specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends called X-Azure-
FDID. You can find the Front Door ID in the portal.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 263/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.
You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend access restrictions that allow traffic from the Front Door service tags.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Instead: You recommend access restrictions based on HTTP headers that have the Front Door ID.
Restrict access to a specific Azure Front Door instance
Traffic from Azure Front Door to your application originates from a well-known set of IP ranges defined in the AzureFrontDoor.Backend service
tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from
your specific instance, you will need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions https://docs.microsoft.com/en-us/azure/virtual-network/vnet-
integration-for-azure-services
https://learn.microsoft.com/en-us/azure/app-service/overview-access-restrictions#restrict-access-to-a-specific-azure-front-door-instance
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag.
Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 264/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends called X-Azure-
FDID. You can find the Front Door ID in the portal.
upvoted 1 times
uffman 2 months, 1 week ago
Selected Answer: B
Restricting using service tag is not enough, see https://learn.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#restrict-access-to-
a-specific-azure-front-door-instance
upvoted 3 times
https://learn.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions#restrict-access-to-a-specific-azure-front-door-instance
upvoted 3 times
https://learn.microsoft.com/en-us/azure/frontdoor/front-door-faq#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 265/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
BillyB2022 10 months ago
Selected Answer: A
Service tag
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 266/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that
might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.
You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend access restrictions based on HTTP headers that have the Front Door ID.
Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Restrict access to a specific Azure Front Door instance
Traffic from Azure Front Door to your application originates from a well-known set of IP ranges defined in the AzureFrontDoor.Backend service
tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from
your specific instance, you will need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions
https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-
upvoted 9 times
https://learn.microsoft.com/en-us/azure/app-service/overview-access-restrictions#restrict-access-to-a-specific-azure-front-door-instance
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag.
Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your
specific instance, you need to further filter the incoming requests based on the unique http header that Azure Front Door sends called X-Azure-
FDID. You can find the Front Door ID in the portal.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/frontdoor/front-door-faq#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 267/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/frontdoor/front-door-faq#how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door-
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 268/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has an on-premises network, an Azure subscription, and a Microsoft 365 E5 subscription.
The company uses the following devices:
✑ Computers that run either Windows 10 or Windows 11
✑ Tablets and phones that run either Android or iOS
You need to recommend a solution to classify and encrypt sensitive Microsoft Office 365 data regardless of where the data is stored.
What should you include in the recommendation?
A. eDiscovery
C. Compliance Manager
D. retention policies
Correct Answer: B
Protect your sensitive data with Microsoft Purview.
Implement capabilities from Microsoft Purview Information Protection (formerly Microsoft Information Protection) to help you discover,
classify, and protect sensitive information wherever it lives or travels.
Note: You can use Microsoft Information Protection: Microsoft Purview for Auditing and Analytics in Outlook for iOS, Android, and Mac (DoD).
Incorrect:
Not A: Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in
legal cases. You can use eDiscovery tools in Microsoft Purview to search for content in Exchange Online, OneDrive for Business, SharePoint
Online, Microsoft Teams, Microsoft 365
Groups, and Yammer teams. You can search mailboxes and sites in the same eDiscovery search, and then export the search results. You can
use Microsoft
Purview eDiscovery (Standard) cases to identify, hold, and export content found in mailboxes and sites. If your organization has an Office 365
E5 or Microsoft 365
E5 subscription (or related E5 add-on subscriptions), you can further manage custodians and analyze content by using the feature-rich
Microsoft Purview eDiscovery (Premium) solution in Microsoft 365.
Not C: What does compliance Manager do?
Compliance managers ensure that a business, its employees and its projects comply with all relevant regulations and specifications. This could
include health and safety, environmental, legal or quality standards, as well as any ethical policies the company may have.
Not D: A retention policy (also called a 'schedule') is a key part of the lifecycle of a record. It describes how long a business needs to keep a
piece of information
(record), where it's stored and how to dispose of the record when its time.
Reference:
https://docs.microsoft.com/en-us/microsoft-365/compliance/information-protection https://docs.microsoft.com/en-us/microsoft-
365/compliance/ediscovery?view=o365-worldwide
https://learn.microsoft.com/en-us/microsoft-365/compliance/information-protection?view=o365-worldwide
Implement capabilities from Microsoft Purview Information Protection (formerly Microsoft Information Protection) to help you discover, classify,
and protect sensitive information wherever it lives or travels.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 269/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 270/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
C. eDiscovery cases
Correct Answer: AD
A: Data loss prevention in Office 365. Data loss prevention (DLP) helps you protect sensitive information and prevent its inadvertent disclosure.
Examples of sensitive information that you might want to prevent from leaking outside your organization include financial data or personally
identifiable information (PII) such as credit card numbers, social security numbers, or health records. With a data loss prevention (DLP) policy,
you can identify, monitor, and automatically protect sensitive information across Office 365.
D: Sensitivity labels -
Sensitivity labels from Microsoft Purview Information Protection let you classify and protect your organization's data without hindering the
productivity of users and their ability to collaborate.
Plan for integration into a broader information protection scheme. On top of coexistence with OME, sensitivity labels can be used along-side
capabilities like
Microsoft Purview Data Loss Prevention (DLP) and Microsoft Defender for Cloud Apps.
Incorrect:
Not B: Retention labels help you retain what you need and delete what you don't at the item level (document or email). They are also used to
declare an item as a record as part of a records management solution for your Microsoft 365 data.
Not C: eDiscovery cases in eDiscovery (Standard) and eDiscovery (Premium) let you associate specific searches and exports with a specific
investigation. You can also assign members to a case to control who can access the case and view the contents of the case. Place content
locations on legal hold.
Reference:
https://motionwave.com.au/keeping-your-confidential-data-secure-with-microsoft-office-365/ https://docs.microsoft.com/en-us/microsoft-
365/solutions/information-protection-deploy-protect-information?view=o365-worldwide#sensitivity-labels
https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide
Organizations have sensitive information under their control such as financial data, proprietary data, credit card numbers, health records, or social
security numbers. To help protect this sensitive data and reduce risk, they need a way to prevent their users from inappropriately sharing it with
people who shouldn't have it. This practice is called data loss prevention (DLP).
In Microsoft Purview, you implement data loss prevention by defining and applying DLP policies. With a DLP policy, you can identify, monitor, and
automatically protect sensitive items across:
- Microsoft 365 services such as Teams, Exchange, SharePoint, and OneDrive accounts
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 271/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
Aunehwet79 4 months, 3 weeks ago
Agree with given answers
upvoted 1 times
DLP policies are designed to detect, monitor, and protect sensitive information across SharePoint Online and other Microsoft 365 services. They can
be used to identify and block the sharing of confidential data such as Personally Identifiable Information (PII) by using rule-based detection,
reporting, and remediation.
Sensitivity label policies, on the other hand, are used to classify, protect, and monitor sensitive data within SharePoint Online. They can be used to
automatically label content based on specific conditions and to apply restrictions on how the content can be accessed or shared. These policies can
help prevent confidential information from being shared outside the organization or with unauthorized users.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 272/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company has the virtual machine infrastructure shown in the following table.
The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines to Azure.
You need to provide recommendations to increase the resiliency of the backup strategy to mitigate attacks such as ransomware.
What should you include in the recommendation?
Correct Answer: D
Azure Backup -
Checks have been added to make sure only valid users can perform various operations. These include adding an extra layer of authentication.
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN before modifying online
backups.
Authentication to perform critical operations
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN when you perform Stop
Protection with Delete data and Change Passphrase operations.
Reference:
https://docs.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware https://docs.microsoft.com/en-
us/azure/backup/backup-azure-security-feature#prevent-attacks
https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature#authentication-to-perform-critical-operations
As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN when you perform Stop Protection
with Delete data and Change Passphrase operations.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 273/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application
attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
D. Azure Active Directory (Azure AD) Conditional Access App Control policies
Correct Answer: A
https://learn.microsoft.com/en-us/azure/defender-for-cloud/adaptive-application-controls
Adaptive application controls are an intelligent and automated solution for defining allowlists of known-safe applications for your machines.
Often, organizations have collections of machines that routinely run the same processes. Microsoft Defender for Cloud uses machine learning to
analyze the applications running on your machines and create a list of the known-safe software. Allowlists are based on your specific Azure
workloads, and you can further customize the recommendations using the following instructions.
When you've enabled and configured adaptive application controls, you'll get security alerts if any application runs other than the ones you've
defined as safe.
upvoted 1 times
No enforcement options are currently available. Adaptive application controls are intended to provide security alerts if any application runs other
than the ones you've defined as safe.
Source - https://learn.microsoft.com/en-us/azure/defender-for-cloud/adaptive-application-controls#are-there-any-options-to-enforce-the-
application-controls
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 274/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 275/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT
-
You plan to deploy the Azure applications shown in the following table.
What should you use to meet the requirement of each app? To answer, select the appropriate options in the answer area.
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 276/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/web-application-firewall/ag/ag-overview
Azure Web Application Firewall (WAF) on Azure Application Gateway provides centralized protection of your web applications from common
exploits and vulnerabilities. Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. SQL
injection and cross-site scripting are among the most common attacks.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 277/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
DRAG DROP
-
You need to recommend a plan to investigate ransomware incidents based on the Microsoft Detection and Response Team (DART) approach.
Which three actions should you recommend performing in sequence in the plan? To answer, move the appropriate actions from the list of actions
to the answer area and arrange them in the correct order.
Correct Answer:
https://learn.microsoft.com/en-us/security/operations/incident-response-playbook-dart-ransomware-approach#the-dart-approach-to-conducting-
ransomware-incident-investigations
The following are three key steps in DART ransomware investigations:
1. Assess the current situation
2. Identify the affected line-of-business (LOB) apps
3. Determine the compromise recovery (CR) process
upvoted 1 times
Regarding the alternative sequence of 4, 1, and 2, while identifying the compromise recovery process is an important step, it may not be the most
urgent or critical one, especially if the scope of the incident and the impacted LOB applications are not yet known. Therefore, it is more effective to
prioritize identifying the scope and impacted LOB applications first, and then move on to identifying the compromise recovery process and
implementing measures to reduce the risk of privileged access compromise.
A comprehensive and proactive approach to cybersecurity is essential to prevent and mitigate the impact of cyber incidents. This includes adopting
best practices and following established incident response procedures, continuously monitoring systems and networks for potential threats, and
regularly reviewing and updating security policies and procedures to adapt to changing threats and circumstances
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 278/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Assess the current situation and identify the scope: This step involves identifying which systems have been impacted and the extent of the damage
caused by the ransomware attack.
Identify which line-of-business (LOB) apps are unavailable due to a ransomware process: This step involves identifying which LOB apps are affected
by the ransomware attack and determining the impact on business operations.
Implement a comprehensive strategy to reduce the risk of privileged access compromise: This step involves implementing security best practices to
prevent future ransomware attacks, such as limiting privileged access and enforcing multi-factor authentication.
upvoted 1 times
Option 2 and 5 are not mentioned in the DART approach for ransomware incident investigation, so they are not included in the plan.
upvoted 1 times
https://learn.microsoft.com/en-us/security/operations/incident-response-playbook-dart-ransomware-approach
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 279/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a Microsoft 365 subscription that syncs with Active Directory Domain Services (AD DS).
You need to define the recovery steps for a ransomware attack that encrypted data in the subscription. The solution must follow Microsoft
Security Best Practices.
Correct Answer: D
https://learn.microsoft.com/en-us/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-
worldwide#step-3-prevent-the-spread
Use this list to keep the attack from spreading to additional entities.
- Disable Exchange ActiveSync and OneDrive sync
Pausing OneDrive sync helps protect your cloud data from being updated by potentially infected devices.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 280/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application
attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
D. app discovery anomaly detection policies in Microsoft Defender for Cloud Apps
Correct Answer: A
https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager
prevents malicious code from running by ensuring that only approved code, that you know, can be run.
Application Control is a software-based security layer that enforces an explicit list of software that is allowed to run on a PC. On its own, Application
Control doesn't have any hardware or firmware prerequisites. Application Control policies deployed with Configuration Manager enable a policy on
devices in targeted collections that meet the minimum Windows version and SKU requirements outlined in this article. Optionally, hypervisor-based
protection of Application Control policies deployed through Configuration Manager can be enabled through group policy on capable hardware.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 281/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
buguinha 4 months, 2 weeks ago
Selected Answer: C
C is the correct. MDCA does not control the servers. Microsoft Defender does
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 282/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company is developing an invoicing application that will use Azure AD B2C. The application will be deployed as an App Service web app.
You need to recommend a solution to the application development team to secure the application from identity-related attacks.
Which two configurations should you recommend? Each correct answer presents part of the solution.
A. Azure AD Conditional Access integration with user flows and custom policies
Correct Answer: AB
https://learn.microsoft.com/en-us/azure/active-directory-b2c/conditional-access-user-flow?pivots=b2c-user-flow
Conditional Access can be added to your Azure Active Directory B2C (Azure AD B2C) user flows or custom policies to manage risky sign-ins to your
applications. Azure Active Directory (Azure AD) Conditional Access is the tool used by Azure AD B2C to bring signals together, make decisions, and
enforce organizational policies.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 283/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Your company plans to evaluate the security of its Azure environment based on the principles of the Microsoft Cloud Adoption Framework for
Azure.
You need to recommend a cloud-based service to evaluate whether the Azure resources comply with the National Institute of Standards and
Technology (NIST) Cybersecurity Framework (CSF).
C. Microsoft Sentinel
Correct Answer: D
https://learn.microsoft.com/en-us/azure/defender-for-cloud/regulatory-compliance-dashboard
Microsoft Defender for Cloud helps streamline the process for meeting regulatory compliance requirements, using the regulatory compliance
dashboard. Defender for Cloud continuously assesses your hybrid cloud environment to analyze the risk factors according to the controls and best
practices in the standards that you've applied to your subscriptions. The dashboard reflects the status of your compliance with these standards.
When you enable Defender for Cloud on an Azure subscription, the Microsoft cloud security benchmark is automatically assigned to that
subscription. This widely respected benchmark builds on the controls from the Center for Internet Security (CIS), PCI-DSS and the National Institute
of Standards and Technology (NIST) with a focus on cloud-centric security.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 284/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages#add-a-regulatory-standard-to-your-
dashboard
upvoted 3 times
janesb 2 months, 4 weeks ago
Selected Answer: A
it is the Compliance Manager in Microsoft Purview for sure
https://learn.microsoft.com/en-us/compliance/regulatory/offering-nist-csf#use-microsoft-purview-compliance-manager-to-assess-your-risk
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 285/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application
attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
A. app discovery anomaly detection policies in Microsoft Defender for Cloud Apps
Correct Answer: C
https://learn.microsoft.com/en-us/azure/defender-for-cloud/adaptive-application-controls
Adaptive application controls are an intelligent and automated solution for defining allowlists of known-safe applications for your machines.
Often, organizations have collections of machines that routinely run the same processes. Microsoft Defender for Cloud uses machine learning to
analyze the applications running on your machines and create a list of the known-safe software. Allowlists are based on your specific Azure
workloads, and you can further customize the recommendations using the following instructions.
When you've enabled and configured adaptive application controls, you'll get security alerts if any application runs other than the ones you've
defined as safe.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 286/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application
attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
Correct Answer: D
https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager
prevents malicious code from running by ensuring that only approved code, that you know, can be run.
Application Control is a software-based security layer that enforces an explicit list of software that is allowed to run on a PC. On its own, Application
Control doesn't have any hardware or firmware prerequisites. Application Control policies deployed with Configuration Manager enable a policy on
devices in targeted collections that meet the minimum Windows version and SKU requirements outlined in this article. Optionally, hypervisor-based
protection of Application Control policies deployed through Configuration Manager can be enabled through group policy on capable hardware.
upvoted 1 times
Application control policies in Microsoft Defender for Endpoint provide a way to prevent the execution of malicious and unauthorized applications
on Windows 10 and Windows Server 2019 machines. Application control policies can be used to block all unknown applications or allow only
trusted applications to run.
Using application control policies, you can create policies that restrict application execution to a specific set of approved applications. When an
unknown application attempts to run, it will be blocked until the administrator approves it.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 287/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Therefore, the correct answer is D) application control policies in Microsoft Defender for Endpoint.
upvoted 1 times
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application
attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
C. app discovery anomaly detection policies in Microsoft Defender for Cloud Apps
Correct Answer: B
https://learn.microsoft.com/en-us/mem/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager
prevents malicious code from running by ensuring that only approved code, that you know, can be run.
Application Control is a software-based security layer that enforces an explicit list of software that is allowed to run on a PC. On its own, Application
Control doesn't have any hardware or firmware prerequisites. Application Control policies deployed with Configuration Manager enable a policy on
devices in targeted collections that meet the minimum Windows version and SKU requirements outlined in this article. Optionally, hypervisor-based
protection of Application Control policies deployed through Configuration Manager can be enabled through group policy on capable hardware.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 288/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You need to design a solution to block file downloads from Microsoft SharePoint Online by authenticated users on unmanaged devices.
Which two services should you include in the solution? Each correct answer presents part of the solution.
Correct Answer: AE
https://learn.microsoft.com/en-us/defender-cloud-apps/use-case-proxy-block-session-aad#create-a-block-download-policy-for-unmanaged-
devices
Defender for Cloud Apps session policies allow you to restrict a session based on device state. To accomplish control of a session using its device as
a condition, create both a conditional access policy AND a session policy.
upvoted 1 times
Azure AD Conditional Access provides policies that enable you to ensure that access to your Microsoft 365 resources is only allowed from trusted
devices that meet your compliance requirements. You can use Conditional Access policies to block access to SharePoint Online for users on
unmanaged devices.
Microsoft Defender for Cloud Apps provides advanced data protection and compliance features for cloud applications, including SharePoint
Online. Defender for Cloud Apps allows you to control access to data in SharePoint Online, including blocking file downloads by authenticated
users on unmanaged devices.
Therefore, the correct answers are A) Azure AD Conditional Access and E) Microsoft Defender for Cloud Apps.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 289/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
gaura 2 months, 2 weeks ago
AE is correct
https://learn.microsoft.com/en-us/sharepoint/block-download-from-sites
upvoted 1 times
Question #1 Topic 5
Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security
Best Practices.
You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART)
approach in Microsoft Security Best Practices.
B. application isolation
C. memory scanning
D. machine isolation
E. user isolation
Correct Answer: D
https://learn.microsoft.com/en-us/security/operations/incident-response-playbook-dart-ransomware-approach#dart-recommendations-and-best-
practices
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 290/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 5
You have an operational model based on the Microsoft Cloud Adoption Framework for Azure.
You need to recommend a solution that focuses on cloud-centric control areas to protect resources such as endpoints, databases, files, and
storage accounts.
A. business resilience
C. network isolation
Correct Answer: D
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/govern/security-baseline
Security baseline is one of the Five Disciplines of Cloud Governance within the Cloud Adoption Framework governance model. Security is a
component of any IT deployment, and the cloud introduces unique security concerns. Many businesses are subject to regulatory requirements that
make protecting sensitive data a major organizational priority when considering a cloud transformation. Identifying potential security threats to
your cloud environment and establishing processes and procedures for addressing these threats should be a priority for any IT security or
cybersecurity team. The Security Baseline discipline ensures technical requirements and security constraints are consistently applied to cloud
environments, as those requirements mature.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 291/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 5
HOTSPOT
-
You use Azure Policy with Azure Repos to implement continuous integration and continuous deployment (CI/CD) workflows.
You need to recommend best practices to secure the stages of the CI/CD workflows based on the Microsoft Cloud Adoption Framework for Azure.
What should you include in the recommendation for each stage? To answer, select the appropriate options in the answer area.
Correct Answer:
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/best-practices/secure-devops
upvoted 5 times
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/best-practices/secure-devops#restrict-access-to-protected-branches
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/best-practices/secure-devops#azure-key-vault
If your CI platform supports it, consider storing credentials in a dedicated secret store, for example Azure Key Vault. Credentials are fetched at
runtime by the build agent and your attack surface is reduced.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 292/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 293/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 5
HOTSPOT
-
Your company wants to optimize using Azure to protect its resources from ransomware.
You need to recommend which capabilities of Azure Backup and Azure Storage provide the strongest protection against ransomware attacks. The
solution must follow Microsoft Security Best Practices.
What should you recommend? To answer, select the appropriate options in the answer area.
Correct Answer:
https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware#azure-backup
Checks have been added to make sure only valid users can perform various operations. These include adding an extra layer of authentication. As
part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN before modifying online backups.
https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware#steps-to-take-before-an-attack
Online immutable storage (such as Azure Blob) enables you to store business-critical data objects in a WORM (Write Once, Read Many) state. This
state makes the data non-erasable and non-modifiable for a user-specified interval.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 294/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
It looks correct to me. A security PIN for backup and Encryption by using platform-managed keys for Azure Storage
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 295/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #5 Topic 5
You have an Azure AD tenant that syncs with an Active Directory Domain Services (AD DS) domain.
You have an on-premises datacenter that contains 100 servers. The servers run Windows Server and are backed up by using Microsoft Azure
Backup Server (MABS).
You are designing a recovery solution for ransomware attacks. The solution follows Microsoft Security Best Practices.
You need to ensure that a compromised administrator account cannot be used to delete the backups.
B. From Microsoft Azure Backup Setup, register MABS with a Recovery Services vault.
C. From a Recovery Services vault, generate a security PIN for critical operations.
D. From Azure AD Privileged Identity Management (PIM), create a role assignment for the Backup Contributor role.
Correct Answer: C
ref: https://learn.microsoft.com/en-us/azure/backup/protect-backups-from-ransomware-faq
upvoted 7 times
Soft delete is a useful feature that helps you deal with data loss. Soft delete retains backup data for 14 days, allowing the recovery of that backup
item before it’s permanently lost. For more information, see How to enable, manage and disable soft delete for Azure Backup?
MUA for Azure Backup uses a new resource called Resource Guard to ensure critical operations, such as disabling soft delete, stopping and
deleting backups, or reducing retention of backup policies, are performed only with applicable authorization.
upvoted 1 times
If you put in place an approval process through PIM, then all admins would need to get the Backup Contributor role.
See: https://learn.microsoft.com/en-us/azure/backup/backup-rbac-rs-vault
upvoted 1 times
zellck 1 month, 3 weeks ago
Selected Answer: A
A is the answer.
https://learn.microsoft.com/en-us/azure/backup/protect-backups-from-ransomware-faq#what-are-the-best-practices-to-configure-and-protect-
azure-backups-against-security-and-ransomware-threats
- Ensure Multi-user authorization (MUA) is enabled to protect against rogue admin scenario. MUA for Azure Backup uses a new resource called the
Resource Guard to ensure critical operations, such as disabling soft delete, stopping and deleting backups, or reducing retention of backup
policies, are performed only with applicable authorization.
upvoted 3 times
https://learn.microsoft.com/en-us/azure/backup/multi-user-authorization?pivots=vaults-recovery-services-vault&tabs=azure-portal
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 297/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #6 Topic 5
You are designing a ransomware response plan that follows Microsoft Security Best Practices.
You need to recommend a solution to limit the scope of damage of ransomware attacks without being locked out.
Correct Answer: B
https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-devices#device-roles-and-profiles
Privileged Access Workstation (PAW) – This is the highest security configuration designed for extremely sensitive roles that would have a significant
or material impact on the organization if their account was compromised. The PAW configuration includes security controls and policies that
restrict local administrative access and productivity tools to minimize the attack surface to only what is absolutely required for performing sensitive
job tasks. This makes the PAW device difficult for attackers to compromise because it blocks the most common vector for phishing attacks: email
and web browsing. To provide productivity to these users, separate accounts and workstations must be provided for productivity applications and
web browsing. While inconvenient, this is a necessary control to protect users whose account could inflict damage to most or all resources in the
organization.
upvoted 1 times
Privileged Access Workstations (PAWs) are dedicated devices that are used to perform sensitive administrative tasks, such as configuring security
settings and managing domain controllers. PAWs provide enhanced security by isolating administrative activities from regular user activities and by
requiring multi-factor authentication and additional controls.
By using a PAW, administrators can perform sensitive tasks without exposing their credentials to the regular network or potentially malicious
content, such as ransomware. This helps to limit the scope of damage of ransomware attacks while also maintaining access to critical systems.
Therefore, option B is the correct answer.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 298/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #7 Topic 5
You need to recommend a recovery solution for ransomware attacks. The solution must follow Microsoft Security Best Practices.
Correct Answer: D
https://learn.microsoft.com/en-us/training/modules/design-resiliency-strategy-common-cyberthreats-like-ransomware/3-ransomware-protection
Microsoft best practices for ransomware protection are based on a three step approach:
- Prepare your recovery plan
- Limit the scope of the damage
- Make it hard to get in
upvoted 1 times
https://learn.microsoft.com/en-us/training/modules/design-resiliency-strategy-common-cyberthreats-like-ransomware/3-ransomware-protection
Microsoft best practices for ransomware protection are based on a three step approach:
- Prepare your recovery plan
- Limit the scope of the damage
- Make it hard to get in
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 299/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-
ransomware-protection-extortion-based-attacks
upvoted 2 times
Burnie 2 months, 1 week ago
Phase 1 of ransomware protection is to develop a recovery plan.
The first thing you should do for these attacks is prepare your organization so that it has a viable alternative to paying the ransom.
https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-
ransomware-protection-extortion-based-attacks
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 300/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #8 Topic 5
HOTSPOT
-
You need to recommend a security methodology for a DevOps development process based on the Microsoft Cloud Adoption Framework for Azure.
During which stage of a continuous integration and continuous deployment (CI/CD) DevOps process should each security-related task be
performed? To answer, select the appropriate options in the answer area.
Correct Answer:
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#plan-and-develop
Typically, modern development follows an agile development methodology. Scrum is one implementation of agile methodology that has every
sprint start with a planning activity. Introducing security into this part of the development process should focus on:
- Threat modeling to view the application through the lens of a potential attacker
- IDE security plug-ins and pre-commit hooks for lightweight static analysis checking within an integrated development environment (IDE).
- Peer reviews and secure coding standards to identify effective security coding standards, peer review processes, and pre-commit hooks.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 302/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 5
You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (CI/CD) workflows for the deployment
of applications to Azure.
You need to recommend what to include in dynamic application security testing (DAST) based on the principles of the Microsoft Cloud Adoption
Framework for Azure.
A. unit testing
B. penetration testing
C. dependency checks
D. threat modeling
Correct Answer: B
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls#dynamic-application-security-testing
A penetration test consists of several action points, one of which is dynamic application security testing (DAST). DAST is a web application security
test that finds security issues in the running application by seeing how the application responds to specially crafted requests. DAST tools are also
known as web application vulnerability scanners.
upvoted 1 times
Source: https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-devops-security#ds-5-integrate-dynamic-application-security-testing-
into-devops-pipeline
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 303/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
You are designing a user access solution that follows the Zero Trust principles of the Microsoft Cybersecurity Reference Architectures (MCRA).
You need to recommend a solution that automatically restricts access to Microsoft Exchange Online, SharePoint Online, and Teams in near-real-
time (NRT) in response to the following Azure AD events:
Which two features should you include in the recommendation? Each correct answer presents part of the solution.
E. Conditional Access
Correct Answer: AE
https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-continuous-access-evaluation
Timely response to policy violations or security issues really requires a "conversation" between the token issuer (Azure AD), and the relying party
(enlightened app). This two-way conversation gives us two important capabilities. The relying party can see when properties change, like network
location, and tell the token issuer. It also gives the token issuer a way to tell the relying party to stop respecting tokens for a given user because of
account compromise, disablement, or other concerns. The mechanism for this conversation is continuous access evaluation (CAE). The goal for
critical event evaluation is for response to be near real time, but latency of up to 15 minutes may be observed because of event propagation time;
however, IP locations policy enforcement is instant.
upvoted 1 times
https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-continuous-access-evaluation#critical-event-evaluation
Continuous access evaluation is implemented by enabling services, like Exchange Online, SharePoint Online, and Teams, to subscribe to critical
Azure AD events. Those events can then be evaluated and enforced near real time. Critical event evaluation doesn't rely on Conditional Access
policies so it's available in any tenant. The following events are currently evaluated:
- User Account is deleted or disabled
- Password for a user is changed or reset
- Multifactor Authentication is enabled for the user
- Administrator explicitly revokes all refresh tokens for a user
- High user risk detected by Azure AD Identity Protection
upvoted 2 times
A. Continuous Access Evaluation: It provides real-time access decisions based on the user's current risk and compliance status. It ensures that only
authorized and compliant devices can access the resources.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 304/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
E. Conditional Access: It allows you to define access policies based on conditions such as user, device, location, and risk level. With Conditional
Access, you can enforce multi-factor authentication, block access, or limit access to specific applications or resources based on the user's risk level
and compliance status.
upvoted 4 times
mohsan001 2 months, 2 weeks ago
CHTGPT4 A and E should be included in the recommendation. Option C (a sign-in risk policy) and Option D (Azure AD Privileged Identity
Management (PIM)) are also important security features, but they are not directly related to the NRT access restriction of Exchange Online,
SharePoint Online, and Teams in response to Azure AD events. Azure AD Application Proxy (Option B) is not necessary for the functionality
described in the scenario.
upvoted 1 times
This process enables the scenario where users lose access to organizational files, email, calendar, or tasks from Microsoft 365 client apps or
SharePoint Online immediately after network location changes.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 305/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
HOTSPOT
-
You have an Azure subscription and an on-premises datacenter. The datacenter contains 100 servers that run Windows Server. All the servers are
backed up to a Recovery Services vault by using Azure Backup and the Microsoft Azure Recovery Services (MARS) agent.
You need to design a recovery solution for ransomware attacks that encrypt the on-premises servers. The solution must follow Microsoft Security
Best Practices and protect against the following risks:
• A compromised administrator account used to delete the backups from Azure Backup before encrypting the servers
• A compromised administrator account used to disable the backups on the MARS agent before encrypting the servers
What should you use for each risk? To answer, select the appropriate options in the answer area.
Correct Answer:
For disabled backups, I would recommend using Multi-user authorization by using Resource Guard - to prevent a compromised administrator
account from disabling the backups. This allows you to specify which users are authorized to perform critical operations and limits the scope of
potential attacks.
upvoted 6 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 306/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature-cloud
Concerns about security issues, like malware, ransomware, and intrusion, are increasing. These security issues can be costly, in terms of both money
and data. To guard against such attacks, Azure Backup now provides security features to help protect backup data even after deletion.
One such feature is soft delete. With soft delete, even if a malicious actor deletes a backup (or backup data is accidentally deleted), the backup data
is retained for 14 additional days, allowing the recovery of that backup item with no data loss. The additional 14 days of retention for backup data
in the "soft delete" state don't incur any cost to you.
https://learn.microsoft.com/en-us/azure/backup/multi-user-authorization-concept?tabs=recovery-services-vault
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 307/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 6 - Testlet 1
Question #1 Topic 6
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 308/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 309/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout#how-smart-lockout-works
Any other solution relies on AD FS. Since the case study doesn't say anything about AD FS, use the lockout policy as described.
That's my last comment, I'm taking the exam in 20 minutes. Thank you all and good day.
upvoted 37 times
The ones saying it is Lockout policy that does not provide protection, there are things like Suspected overpass‑the‑hash attack (Kerberos) 2002
Medium
Account enumeration reconnaissance 2003 Medium
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 310/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
there are some of the protection and alerts the Defender for identity on perm provides, the password lock out policy will only actually prevent
the brute force attack...
upvoted 4 times
Sam_Gutterson 5 months ago
I am not sure if these are correct choices however, the case study clearly says 'password has sync has been disabled' under overview.
Also, this specific question of the case study clearly says 'Forest' (AD Forest).
upvoted 2 times
https://learn.microsoft.com/en-us/defender-for-identity/credential-access-alerts#suspected-brute-force-attack-ldap-external-id-2004
In a brute-force attack, the attacker attempts to authenticate with many different passwords for different accounts until a correct password is found
for at least one account. Once found, an attacker can log in using that account.
In this detection, an alert is triggered when Defender for Identity detects a massive number of simple bind authentications. This alert detects brute
force attacks performed either horizontally with a small set of passwords across many users, vertically with a large set of passwords on just a few
users, or any combination of the two options. The alert is based on authentication events from sensors running on domain controller and AD FS
servers.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 311/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Although the current overview states pwd has sync is disabled, the identity requirements state: "Implement leaked credential detection in the Azure
AD tenant of Litware.". Therefore, you need to implement the best controls to meet the requirements.
1: Identity Protection
2: Defender for Identity
upvoted 1 times
The ones saying it is Lockout policy that does not provide protection, there are things like Suspected overpass‑the‑hash attack (Kerberos) 2002
Medium
Account enumeration reconnaissance 2003 Medium
Suspected Brute Force attack (LDAP) 2004 Medium
there are some of the protection and alerts the Defender for identity on perm provides, the password lock out policy will only actually prevent the
brute force attack...
upvoted 2 times
2. Defender for identity. Prevent AD DS user accounts from being locked out by brute force attacks that target Azure AD user accounts.they are
targeting the Azure AD Accounts, brute force protection will prevent attackers from locking out the on premises AD DS accounts.
upvoted 5 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 313/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 6
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
Requirements. Identity Requirements
Litware identifies the following identity requirements:
Detect brute force attacks that directly target AD DS user accounts.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 314/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory
compliance requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 315/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
This model offers significant advantages over a fully centralized model in which all data is copied to a single workspace.
Scenario:
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
Hybrid Requirements -
Litware identifies the following hybrid cloud requirements:
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Box 2: Azure Lighthouse subscription onboarding process
You can use Azure Lighthouse to extend all cross-workspace activities across tenant boundaries, allowing users in your managing tenant to
work on Microsoft
Sentinel workspaces across all tenants.
Azure Lighthouse enables you to see and manage Azure resources from different tenancies, in the one place, with the power of delegated
administration. That tenancy may be a customer (for example, if you're a managed services provider with a support contract arrangement in
place), or a separate Azure environment for legal or financial reasons (like franchisee groups or Enterprises with large brand groups).
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 316/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Incorrect:
* not Azure AD B2B
Azure AD B2B uses guest account, which goes against the requirements in this scenario,
Note: Azure Active Directory (Azure AD) B2B collaboration is a feature within External Identities that lets you invite guest users to collaborate
with your organization.
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants https://docs.microsoft.com/en-
us/azure/sentinel/best-practices-workspace-architecture https://techcommunity.microsoft.com/t5/itops-talk-blog/onboarding-to-azure-
lighthouse-using-a-template/ba-p/1091786 https://docs.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b
Relevant information from Microsoft is on this Best Practices page for workspace architecture:
https://docs.microsoft.com/en-us/azure/sentinel/best-practices-workspace-architecture#region-considerations
https://learn.microsoft.com/en-us/azure/sentinel/best-practices-workspace-architecture#working-with-multiple-tenants
If you have multiple tenants, such as if you're a managed security service provider (MSSP), we recommend that you create at least one workspace
for each Azure AD tenant to support built-in, service to service data connectors that work only within their own Azure AD tenant.
https://learn.microsoft.com/en-us/azure/sentinel/best-practices-workspace-architecture#region-considerations
Use separate Microsoft Sentinel instances for each region. While Microsoft Sentinel can be used in multiple regions, you may have requirements to
separate data by team, region, or site, or regulations and controls that make multi-region models impossible or more complex than needed. Using
separate instances and workspaces for each region helps to avoid bandwidth / egress costs for moving data across regions.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 317/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
needed.
Ref: https://learn.microsoft.com/en-us/azure/lighthouse/overview
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 318/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 6
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
Requirements. Identity Requirements
Litware identifies the following identity requirements:
Detect brute force attacks that directly target AD DS user accounts.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 319/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 320/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
Azure AD B2C -
Azure Active Directory B2C provides business-to-customer identity as a service. Your customers use their preferred social, enterprise, or local
account identities to get single sign-on access to your applications and APIs.
By serving as the central authentication authority for your web applications, mobile apps, and APIs, Azure AD B2C enables you to build a single
sign-on (SSO) solution for them all. Centralize the collection of user profile and preference information, and capture detailed analytics about
sign-in behavior and sign-up conversion.
Note: Azure AD B2C is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of
authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats
like denial-of-service, password spray, or brute force attacks.
Incorrect:
Azure Lighthouse -
Cross-tenant management experiences
As a service provider, you can use Azure Lighthouse to manage resources for multiple customers from within your own Azure Active Directory
(Azure AD) tenant.
With Azure Lighthouse, the onboarding process specifies users within the service provider's tenant who will be able to work on delegated
subscriptions and resource groups in the customer's tenant. These users can then sign in to the Azure portal using their own credentials. Within
the Azure portal, they can manage resources belonging to all customers to which they have access.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 321/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/lighthouse/overview
Azure Lighthouse enables multi-tenant management with scalability, higher automation, and enhanced governance across resources.
With Azure Lighthouse, service providers can deliver managed services using comprehensive and robust tooling built into the Azure platform.
Customers maintain control over who has access to their tenant, which resources they can access, and what actions can be taken. Enterprise
organizations managing resources across multiple tenants can use Azure Lighthouse to streamline management tasks.
upvoted 1 times
No doubts
upvoted 3 times
INfo on lighthouse for the ones that do not know what it is:
Lighthouse simplifies onboarding of customer tenants by recommending security configuration baselines tailored to SMB customers and providing
multi-tenant views across all customer environments. With Lighthouse, MSPs can scale the management of their customers, focus on what's most
important, quickly find and investigate risks, and take action to get their customers to a healthy and secure state.
upvoted 3 times
Ref: https://learn.microsoft.com/en-us/azure/lighthouse/overview
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 322/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 6
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
Requirements. Identity Requirements
Litware identifies the following identity requirements:
Detect brute force attacks that directly target AD DS user accounts.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 323/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business
requirements.
What should you configure for each landing zone?
A. an ExpressRoute gateway
Correct Answer: A
ExpressRoute provides direct connectivity to Azure cloud services and connecting Microsoft's global network. All transferred data is not
encrypted, and do not go over the public Internet. VPN Gateway provides secured connectivity to Azure cloud services over public Internet.
Note:
Litware identifies the following landing zone requirements:
ג€¢ Route all internet-bound traffic from landing zones through Azure Firewall in a dedicated Azure subscription.
ג€¢ Provide a secure score scoped to the landing zone.
ג€¢ Ensure that the Azure virtual machines in each landing zone communicate with Azure App Service web apps in the same zone over the
Microsoft backbone network, rather than over public endpoints.
ג€¢ Minimize the possibility of data exfiltration.
ג€¢ Maximize network bandwidth.
Litware identifies the following business requirements:
ג€¢ Minimize any additional on-premises infrastructure.
ג€¢ Minimize the operational costs associated with administrative overhead.
Reference:
https://medium.com/awesome-azure/azure-difference-between-azure-expressroute-and-azure-vpn-gateway-comparison-azure-hybrid-
connectivity-
5f7ce02044f3
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 324/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/landing-zone/design-area/security#security-in-the-azure-landing-zone-
accelerator
upvoted 2 times
Therefore, the best solution for securing the landing zones would be to route all internet-bound traffic from landing zones through Azure
Firewall in a dedicated Azure subscription, which is option D. Azure DDoS Protection Standard is also a good option, as it helps protect against
DDoS attacks by monitoring and absorbing the attack traffic.
From ChatGPT
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 325/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Tools:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 327/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 7 - Testlet 2
Question #1 Topic 7
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 328/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
What should you create in Azure AD to meet the Contoso developer requirements?
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 329/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 330/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Reference:
https://docs.microsoft.com/en-us/azure/active-directory-domain-services/synchronization https://docs.microsoft.com/en-us/azure/active-
directory/governance/access-reviews-overview
https://learn.microsoft.com/en-us/azure/active-directory/external-identities/what-is-b2b
Azure Active Directory (Azure AD) B2B collaboration is a feature within External Identities that lets you invite guest users to collaborate with your
organization. With B2B collaboration, you can securely share your company's applications and services with external users, while maintaining
control over your own corporate data. Work safely and securely with external partners, large or small, even if they don't have Azure AD or an IT
department.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 331/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 7
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
Existing Environment. Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation: Machines should have a
vulnerability assessment solution.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 332/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to recommend a solution to meet the security requirements for the InfraSec group.
What should you use to delegate the access?
A. a subscription
C. a resource group
D. a management group
Correct Answer: B
Scenario: Requirements. Security Requirements include:
Only members of a group named InfraSec must be allowed to configure network security groups (NSGs) and instances of Azure Firewall, WAF,
and Front Door in
Sub1.
If the Azure built-in roles don't meet the specific needs of your organization, you can create your own custom roles. Just like built-in roles, you
can assign custom roles to users, groups, and service principals at management group (in preview only), subscription, and resource group
scopes.
Incorrect:
Not D: Management groups are useful when you have multiple subscriptions. This is not what is addressed in this question.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 333/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/role-based-access-control/custom-roles
If the Azure built-in roles don't meet the specific needs of your organization, you can create your own custom roles. Just like built-in roles, you can
assign custom roles to users, groups, and service principals at management group, subscription, and resource group scopes.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 334/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 8 - Testlet 3
Question #1 Topic 8
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 335/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a solution to meet the AWS requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 336/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 337/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
native AWS connector, defender for server will be for advanced threat protection
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 338/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-aws?pivots=env-settings
With cloud workloads commonly spanning multiple cloud platforms, cloud security services must do the same. Microsoft Defender for Cloud
protects workloads in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), GitHub and Azure DevOps (ADO).
https://learn.microsoft.com/en-us/azure/sentinel/connect-aws?tabs=s3
Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. These connectors work by granting Microsoft
Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft
Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 340/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 8
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
Existing Environment. Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation: Machines should have a
vulnerability assessment solution.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 341/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to recommend a solution to resolve the virtual machine issue.
What should you include in the recommendation?
Correct Answer: B
Scenario: 20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud.
Existing Environment. Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation: Machines should have a
vulnerability assessment solution.
All the virtual machines must be compliant in Defender for Cloud.
Note: Deploying Microsoft Defender for Endpoint is a two-step process.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 342/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/defender-for-cloud/deploy-vulnerability-assessment-vm
When a machine is found that doesn't have a vulnerability assessment solution deployed, Defender for Cloud generates the security
recommendation: Machines should have a vulnerability assessment solution. Use this recommendation to deploy the vulnerability assessment
solution to your Azure virtual machines and your Azure Arc-enabled hybrid machines.
Defender for Cloud includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account -
everything's handled seamlessly inside Defender for Cloud. This page provides details of this scanner and instructions for how to deploy it.
upvoted 2 times
If all of the machines should have a vulnerability assessment solution then you should enable the Vulnerability access solution ...
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 344/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 345/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 8
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
Existing Environment. Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation: Machines should have a
vulnerability assessment solution.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 346/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to recommend a solution to meet the security requirements for the virtual machines.
What should you include in the recommendation?
Correct Answer: B
Scenario: Requirements. Compliance Requirements
Fabrikam wants to automatically remediate the virtual machines in Sub1 to be compliant with the HIPAA HITRUST standard. The virtual
machines in TestRG must be excluded from the compliance assessment.
Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal. The Azure Bastion
service is a fully platform-managed PaaS service that you provision inside your virtual network. It provides secure and seamless RDP/SSH
connectivity to your virtual machines directly from the Azure portal over TLS. When you connect via Azure Bastion, your virtual machines don't
need a public IP address, agent, or special client software.
Bastion provides secure RDP and SSH connectivity to all of the VMs in the virtual network in which it is provisioned. Using Azure Bastion
protects your virtual machines from exposing RDP/SSH ports to the outside world, while still providing secure access using RDP/SSH.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 347/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Reference:
https://docs.microsoft.com/en-us/azure/bastion/bastion-overview https://docs.microsoft.com/en-us/azure/governance/policy/samples/hipaa-
hitrust-9-2
Reasons:
1. Compliance requirements trumps all others and remote access connections need to be secure to meet HIPAA, so use of Azure Bastion most
probably wins.
3. You can deploy a custom image without needing AVD - what do you guys think a VM is exactly?
upvoted 3 times
https://learn.microsoft.com/en-us/azure/virtual-desktop/create-custom-image-templates
Custom image templates in Azure Virtual Desktop enable you to easily create a custom image that you can use when deploying session host virtual
machines (VMs). Using custom images helps you to standardize the configuration of your session host VMs for your organization. Custom image
templates are built on Azure Image Builder and tailored for Azure Virtual Desktop.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 348/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Selected Answer: C
Obviously C here. The requirements state that the "jump box" must be running a custom image. Bastion is a fully managed non-customisanle PaaS
product. The only answer that supports the requirement for a custom image is AVD.
upvoted 4 times
others comments re customer image is related to secure host ONLY. Therefore, its not applicable
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 349/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 8
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
Existing Environment. Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation: Machines should have a
vulnerability assessment solution.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 350/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a solution to meet the compliance requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 351/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
Box 1: A blueprint -
Scenario: Requirements. Compliance Requirements
Fabrikam wants to automatically remediate the virtual machines in Sub1 to be compliant with the HIPAA HITRUST standard.
Microsoft releases automation for HIPAA/HITRUST compliance
I am excited to share our new Azure Security and Compliance Blueprint for HIPAA/HITRUST ג€" Health Data & AI. Microsoft's Azure Blueprints
are resources to help build and launch cloud-powered applications that comply with stringent regulations and standards. Included in the
blueprints are reference architectures, compliance guidance and deployment scripts.
An Azure Blueprint is a package for creating specific sets of standards and requirements that govern the implementation of Azure services,
security, and design.
Such packages are reusable so that consistency and compliance among resources can be maintained.
Incorrect:
* not Workflow automation
Workflow automation is an approach to making the flow of tasks, documents and information across work-related activities perform
independently in accordance with defined business rules.
Box 2: Modify an Azure policy definition
Scenario: The virtual machines in TestRG must be excluded from the compliance assessment.
Use a Policy definition to include the TestRG virtual machines from the Blueprint.
Note: Azure Policy establishes conventions for resources. Policy definitions describe resource compliance conditions and the effect to take if a
condition is met. A condition compares a resource property field or a value to a required value. Resource property fields are accessed by using
aliases. When a resource property field is an array, a special array alias can be used to select values from all array members and apply a
condition to each one.
By defining conventions, you can control costs and more easily manage your resources. For example, you can specify that only certain types of
virtual machines are allowed. Or, you can require that resources have a particular tag. Policy assignments are inherited by child resources. If a
policy assignment is applied to a resource group, it's applicable to all the resources in that resource group.
Incorrect:
* Not Update a policy assignment
A policy assignment assigns a Blueprint to a subscription. The scope is at the subscription level.
Note: Policy Assignments provide a means for applying policy to a subscription to which a blueprint is assigned. That said, the policy must be
within the scope of the blueprint containing the policy. Parameters defined with a policy are assigned during blueprint creation or during
blueprint assignment.
Reference:
https://azure.microsoft.com/en-us/blog/microsoft-releases-automation-for-hipaa-hitrust-compliance/ https://cloudacademy.com/blog/what-
are-azure-blueprints/ https://k21academy.com/microsoft-azure/azure-rbac-vs-azure-policies-vs-azure-blueprints/
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 352/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Not correct in my opinion: "Fabrikam wants to automatically remediate the virtual machines in Sub1 to be compliant with the HIPAA HITRUST
standard."
MS says: Remediation is accomplished through remediation tasks that deploy the deployIfNotExists template or the modify operations of the
assigned policy
From my point of view, Workflow Automation offers the best set of possibilities to enforce compliance.
https://learn.microsoft.com/en-us/azure/governance/blueprints/overview#blueprint-definition
Policy Assignment
- Allows assignment of a policy or initiative to the subscription the blueprint is assigned to. The policy or initiative must be within the scope of the
blueprint definition location. If the policy or initiative has parameters, these parameters are assigned at creation of the blueprint or during blueprint
assignment.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 353/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 354/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 9 - Testlet 4
Question #1 Topic 9
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 355/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the
regulatory compliance requirements and the business requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 356/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://learn.microsoft.com/en-us/azure/governance/policy/concepts/initiative-definition-structure
Initiatives enable you to group several related policy definitions to simplify assignments and management because you work with a group as a
single item. For example, you can group related tagging policy definitions into a single initiative. Rather than assigning each policy individually, you
apply the initiative.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 357/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/azure/azure-arc/overview
Azure Arc simplifies governance and management by delivering a consistent multicloud and on-premises management platform.
upvoted 1 times
awssecuritynewbie 4 months, 2 weeks ago
The answer is correct they want to monitor the entire management -->management group
to evaluate the regularity compliance on-perm it would be Azure ARC as you are on-boarding the devices on perm into it, now you can on-board
VM, SQL server and many more.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 358/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 10 - Testlet 5
Question #1 Topic 10
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 359/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to recommend a strategy for routing internet-bound traffic from the landing zones. The solution must meet the landing zone
requirements.
What should you recommend as part of the landing zone deployment?
B. forced tunneling
C. service chaining
Correct Answer: C
Service chaining.
Service chaining enables you to direct traffic from one virtual network to a virtual appliance or gateway in a peered network through user-
defined routes.
You can deploy hub-and-spoke networks, where the hub virtual network hosts infrastructure components such as a network virtual appliance or
VPN gateway. All the spoke virtual networks can then peer with the hub virtual network. Traffic flows through network virtual appliances or VPN
gateways in the hub virtual network.
Virtual network peering enables the next hop in a user-defined route to be the IP address of a virtual machine in the peered virtual network, or a
VPN gateway.
You can't route between virtual networks with a user-defined route that specifies an Azure ExpressRoute gateway as the next hop type.
Incorrect:
Not B: Forced tunneling lets you redirect or "force" all Internet-bound traffic back to your on-premises location via a Site-to-Site VPN tunnel for
inspection and auditing. This is a critical security requirement for most enterprise IT policies. If you don't configure forced tunneling, Internet-
bound traffic from your VMs in Azure always traverses from the Azure network infrastructure directly out to the Internet, without the option to
allow you to inspect or audit the traffic. Unauthorized
Internet access can potentially lead to information disclosure or other types of security breaches.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 360/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
ExpressRoute forced tunneling is not configured via this mechanism, but instead, is enabled by advertising a default route via the ExpressRoute
BGP peering sessions.
Note:
https://learn.microsoft.com/en-us/azure/firewall/forced-tunneling
upvoted 1 times
https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peering-overview#service-chaining
Service chaining enables you to direct traffic from one virtual network to a virtual appliance or gateway in a peered network through user-
defined routes.
To enable service chaining, configure user-defined routes that point to virtual machines in peered virtual networks as the next hop IP address.
User-defined routes could also point to virtual network gateways to enable service chaining.
upvoted 2 times
used for routing internet-bound traffic from landing zones through Azure Firewall in a dedicated Azure subscription. Forced tunneling is used to
direct traffic from a virtual network to an on-premises location. However, it can also be used to route internet-bound traffic from landing zones
through Azure Firewall in a dedicated Azure subscription.
upvoted 1 times
OK2020 3 months, 2 weeks ago
Selected Answer: B
The key is that traffic needs to be directed to an Azure FW to achieve the sought outcome. For this specific case a FW with Forced tunneling is the
way to go according to the below links:
https://learn.microsoft.com/en-us/azure/architecture/reference-architectures/hybrid-networking/hub-spoke?toc=%2Fazure%2Fvirtual-
network%2Ftoc.json&tabs=cli
https://learn.microsoft.com/en-us/azure/firewall/forced-tunneling
upvoted 3 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 362/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 10
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
Requirements. Identity Requirements
Litware identifies the following identity requirements:
Detect brute force attacks that directly target AD DS user accounts.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 363/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 364/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://learn.microsoft.com/en-us/azure/app-service/overview-vnet-integration
With Azure virtual networks, you can place many of your Azure resources in a non-internet-routable network. The App Service virtual network
integration feature enables your apps to access resources in or through a virtual network.
https://learn.microsoft.com/en-us/azure/app-service/networking/private-endpoint
You can use private endpoint for your App Service apps to allow clients located in your private network to securely access the app over Azure
Private Link. The private endpoint uses an IP address from your Azure virtual network address space. Network traffic between a client on your
private network and the app traverses over the virtual network and a Private Link on the Microsoft backbone network, eliminating exposure from
the public Internet.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 365/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 366/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 10
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
Requirements. Identity Requirements
Litware identifies the following identity requirements:
Detect brute force attacks that directly target AD DS user accounts.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 367/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the
regulatory compliance requirements.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 368/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
https://learn.microsoft.com/en-us/azure/active-directory/roles/administrative-units
An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. An administrative unit can contain only users,
groups, or devices.
Administrative units restrict permissions in a role to any portion of your organization that you define. You could, for example, use administrative
units to delegate the Helpdesk Administrator role to regional support specialists, so they can manage users only in the region that they support.
upvoted 1 times
Password Hash Sync also enables leaked credential detection for your hybrid accounts. Microsoft works alongside dark web researchers and law
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 369/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
enforcement agencies to find publicly available username/password pairs. If any of these pairs match those of our users, the associated account
is moved to high risk.
upvoted 1 times
TJ001 6 months ago
Correct Answers given
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 370/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 11 - Testlet 6
Question #1 Topic 11
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 371/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You are evaluating the security of ClaimsApp.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 372/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
Box 1: No -
Box 2: Yes -
Users will connect to ClaimsApp by using a URL of https://claims.fabrikam.com.
Need certificate for HTTPS.
TLS/SSL certificates -
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you must use a TLS/SSL certificate. You can
choose to use a certificate that is managed by Azure Front Door or use your own certificate.
Box 3: Yes -
By default, Azure Front Door will respond to all user requests regardless of the location where the request is coming from. In some scenarios,
you may want to restrict the access to your web application by countries/regions. The Web application firewall (WAF) service in Front Door
enables you to define a policy using custom access rules for a specific path on your endpoint to either allow or block access from specified
countries/regions.
Note: Requirements. Security Requirements
Fabrikam identifies the following security requirements:
ג€¢ Internet-accessible applications must prevent connections that originate in North Korea.
Reference:
https://techcommunity.microsoft.com/t5/azure-architecture-blog/permit-access-only-from-azure-front-door-to-azure-app-service-as/ba-
p/2000173 https://docs.microsoft.com/en-us/azure/frontdoor/front-door-custom-domain-https#tlsssl-certificates
https://learn.microsoft.com/en-us/azure/frontdoor/front-door-custom-domain-https#tlsssl-certificates
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you must use a TLS/SSL certificate. You can choose
to use a certificate that is managed by Azure Front Door or use your own certificate.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 373/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
Gurulee 3 months, 2 weeks ago
Front Door is non-regional and can be used across regions. Therefore, as noted in the case: "A virtual network named Vnet1 in the East US Azure
region
A virtual network named Vnet2 in the West Europe Azure region", and with ClaimsApp being deployed to both vNet's; I believe its YES to first item.
upvoted 1 times
The question is whether 'FD1 can be used to protect all the instances of ClaimsApp.'. The requirement also mentioned 'ClaimsApp will be deployed
to Azure App Service instances'. So the required scope of protection is only App Service instances, not Vnet1, Vnet2 and ClaimsDB.
Azure Front Door with WAF able to protection layer 7 web application hosted in Azure App Service.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 374/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 11
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
Existing Environment. Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation: Machines should have a
vulnerability assessment solution.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 375/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to recommend a solution to scan the application code. The solution must meet the application development requirements.
What should you include in the recommendation?
Correct Answer: A
Requirements. Application Development Requirements
Fabrikam identifies the following requirements for application development:
* All the application code must be stored in GitHub Enterprise.
* All application code changes must be scanned for security vulnerabilities, including application code or configuration files that contain
secrets in clear text.
Scanning must be done at the time the code is pushed to a repository.
A GitHub Advanced Security license provides the following additional features:
Code scanning - Search for potential security vulnerabilities and coding errors in your code.
Secret scanning - Detect secrets, for example keys and tokens, that have been checked into the repository. If push protection is enabled, also
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 376/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://learn.microsoft.com/en-us/training/modules/introduction-github-advanced-security/2-what-is-github-advanced-security
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 377/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 12 - Testlet 7
Question #1 Topic 12
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 378/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security
requirements.
Which two services should you leverage in the strategy? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Correct Answer: BD
Scenario: Litware identifies the following application security requirements:
Monitor and control access to Microsoft SharePoint Online and Exchange Online data in real time.
B: Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise
applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
D: The Defender for Cloud Apps framework
Discover and control the use of Shadow IT: Identify the cloud apps, IaaS, and PaaS services used by your organization. Investigate usage
patterns, assess the risk levels and business readiness of more than 25,000 SaaS apps against more than 80 risks. Start managing them to
ensure security and compliance.
Protect your sensitive information anywhere in the cloud: Understand, classify, and protect the exposure of sensitive information at rest.
Leverage out-of-the box policies and automated processes to apply controls in real time across all your cloud apps.
Etc.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 379/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Reference:
https://docs.microsoft.com/en-us/azure/active-directory/governance/access-reviews-overview https://docs.microsoft.com/en-us/defender-
cloud-apps/what-is-defender-for-cloud-apps
https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-integrate-with-microsoft-cloud-application-security
upvoted 11 times
https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/overview
The modern security perimeter now extends beyond an organization's network to include user and device identity. Organizations can use identity-
driven signals as part of their access control decisions.
Conditional Access brings signals together, to make decisions, and enforce organizational policies. Azure AD Conditional Access is at the heart of
the new identity-driven control plane.
https://learn.microsoft.com/en-us/defender-cloud-apps/protect-office-365
Connecting Office 365 to Defender for Cloud Apps gives you improved insights into your users' activities, provides threat detection using machine
learning based anomaly detections, information protection detections (such as detecting external information sharing), enables automated
remediation controls, and detects threats from enabled third-party apps in your organization.
upvoted 3 times
You can use authentication contexts to connect an Azure AD conditional access policy to a SharePoint site. Policies can be applied directly to the
site or via a sensitivity label.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 380/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
upvoted 2 times
JCkD4Ni3L 9 months, 1 week ago
Selected Answer: AD
Correct answer is A & D
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 381/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 12
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote
employees across the United States. The remote employees connect to the main offices by using a VPN.
Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in
France.
Existing Environment -
Litware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com
and is linked to
20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and
password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.
The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of
Litware.
Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.
Requirements. Business Requirements
Litware identifies the following business requirements:
Minimize any additional on-premises infrastructure.
Minimize the operational costs associated with administrative overhead.
Requirements. Hybrid Requirements
Litware identifies the following hybrid cloud requirements:
Enable the management of on-premises resources from Azure, including the following:
- Use Azure Policy for enforcement and compliance evaluation.
- Provide change tracking and asset inventory.
- Implement patch management.
Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.
Requirements. Microsoft Sentinel Requirements
Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR)
capabilities of Microsoft
Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.
Requirements. Identity Requirements
Litware identifies the following identity requirements:
Detect brute force attacks that directly target AD DS user accounts.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 382/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a
complete solution.
NOTE: Each correct selection is worth one point.
B. NTLMv2
C. certificate-based authentication
D. Kerberos
Correct Answer: AD
A: SAML -
Litware identifies the following application security requirements:
Identify internal applications that will support single sign-on (SSO) by using Azure AD Application Proxy.
You can provide single sign-on (SSO) to on-premises applications that are secured with SAML authentication and provide remote access to
these applications through Application Proxy. With SAML single sign-on, Azure Active Directory (Azure AD) authenticates to the application by
using the user's Azure AD account.
D: You can provide single sign-on for on-premises applications published through Application Proxy that are secured with integrated Windows
authentication.
These applications require a Kerberos ticket for access. Application Proxy uses Kerberos Constrained Delegation (KCD) to support these
applications.
Incorrect:
Not C: Certificate. This is not a custom domain scenario!
If you're using a custom domain, you also need to upload the TLS/SSL certificate for your application.
To configure an on-premises app to use a custom domain, you need a verified Azure Active Directory custom domain, a PFX certificate for the
custom domain, and an on-premises app to configure.
Reference:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 383/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-on-premises-apps
https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-with-kcd
https://docs.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-custom-domain
https://learn.microsoft.com/en-us/azure/active-directory/app-proxy/application-proxy-configure-single-sign-on-on-premises-apps
You can provide single sign-on (SSO) to on-premises applications that are secured with SAML authentication and provide remote access to these
applications through Application Proxy. With SAML single sign-on, Azure Active Directory (Azure AD) authenticates to the application by using the
user's Azure AD account. Azure AD communicates the sign-on information to the application through a connection protocol. You can also map
users to specific application roles based on rules you define in your SAML claims. By enabling Application Proxy in addition to SAML SSO, your
users will have external access to the application and a seamless SSO experience.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 384/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Topic 13 - Testlet 8
Question #1 Topic 13
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 385/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer
requirements.
What should you include in the recommendation?
C. Always Encrypted
D. data classification
Correct Answer: E
Scenario: The Contoso developers must be prevented from viewing the data in a column named MedicalHistory in the ClaimDetails table.
Dynamic data masking (DDM) limits sensitive data exposure by masking it to non-privileged users. It can be used to greatly simplify the design
and coding of security in your application.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 386/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Dynamic data masking helps prevent unauthorized access to sensitive data by enabling customers to specify how much sensitive data to reveal
with minimal impact on the application layer. DDM can be configured on designated database fields to hide sensitive data in the result sets of
queries. With DDM, the data in the database isn't changed. DDM is easy to use with existing applications, since masking rules are applied in the
query results.
Incorrect:
Not B: Transparent Data Encryption (TDE) encrypts the entire database, not specific columns.
Reference:
https://docs.microsoft.com/en-us/sql/relational-databases/security/dynamic-data-masking
You need to prevent the developers from seeing data in specific column in the DB.
upvoted 17 times
Always Encrypted is a feature designed to protect sensitive data, such as credit card numbers or national identification numbers (for
example, U.S. social security numbers), stored in Azure SQL Database, Azure SQL Managed Instance, and SQL Server databases. Always
Encrypted allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine. This
provides a separation between those who own the data and can view it, and those who manage the data but should have no access - on-
premises database administrators, cloud database operators, or other high-privileged unauthorized users. As a result, Always Encrypted
enables customers to confidently store their sensitive data in the cloud, and to reduce the likelihood of data theft by malicious insiders.
upvoted 6 times
https://learn.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine?view=sql-server-ver16
Always Encrypted is a feature designed to protect sensitive data, such as credit card numbers or national/regional identification numbers (for
example, U.S. social security numbers), stored in Azure SQL Database, Azure SQL Managed Instance, and SQL Server databases. Always Encrypted
allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine. This provides a
separation between those who own the data and can view it, and those who manage the data but should have no access - on-premises database
administrators, cloud database operators, or other high-privileged unauthorized users. As a result, Always Encrypted enables customers to
confidently store their sensitive data in the cloud, and to reduce the likelihood of data theft by malicious insiders.
upvoted 1 times
Ref: https://learn.microsoft.com/en-us/azure/azure-sql/database/security-best-practice?view=azuresql
upvoted 4 times
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Always Encrypted is a feature designed to protect sensitive data, stored in Azure SQL Database or SQL Server databases from access by database
administrators (e.g. the members of the SQL Server sysadmin or db_owner roles), administrators of machines hosting SQL Server instances,), and
Azure SQL Database (cloud) administrators.
So data masking is not enough, they can still have a look, with always encrypt they cannot. 100% sure its Always Encrypt.
upvoted 4 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 389/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
database administrators, cloud database operators, or other high-privileged unauthorized users, can't access the encrypted data.
https://learn.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine?view=sql-server-ver16
upvoted 2 times
JCkD4Ni3L 9 months, 1 week ago
Selected Answer: C
i agree with PlumpyThumbler here, C is the correct answer... developpers have admin privileges through the db_owner role and would see the data
in the colomn otherwise.
upvoted 2 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 390/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 13
Introductory Info
Case Study -
This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However,
there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions
included on this exam in the time provided.
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might
contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is
independent of the other question in this case study.
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to
the next section of the exam. After you begin a new section, you cannot return to this section.
Overview -
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
Existing Environment. On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Existing Environment. Azure Environment
Fabrikam has the following Azure resources:
An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabrikam.com
A single Azure subscription named Sub1
A virtual network named Vnet1 in the East US Azure region
A virtual network named Vnet2 in the West Europe Azure region
An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAF) enabled
A Microsoft Sentinel workspace
An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
A resource group named TestRG that is used for testing purposes only
An Azure Virtual Desktop host pool that contains personal assigned session hosts
All the resources in Sub1 are in either the East US or the West Europe region.
Fabrikam -
Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security group
named
ContosoDevelopers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db_owner role for the ClaimsDB database.
Existing Environment. Compliance Environment
Fabrikam deploys the following compliance environment:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
Qualys is used as the standard vulnerability assessment tool for servers.
Existing Environment. Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation: Machines should have a
vulnerability assessment solution.
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 391/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Question
HOTSPOT -
You need to recommend a solution to meet the requirements for connections to ClaimsDB.
What should you recommend using for each requirement? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 392/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
Correct Answer:
Workflow -
1. Using Azure App Service regional VNet Integration, the web app connects to Azure through an AppSvcSubnet delegated subnet in an Azure
Virtual Network.
2. In this example, the Virtual Network only routes traffic and is otherwise empty, but other subnets and workloads could also run in the Virtual
Network.
3. The App Service and Private Link subnets could be in separate peered Virtual Networks, for example as part of a hub-and-spoke network
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 393/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
configuration.
4. Azure Private Link sets up a private endpoint for the Azure SQL Database in the PrivateLinkSubnet of the Virtual Network.
5. The web app connects to the SQL Database private endpoint through the PrivateLinkSubnet of the Virtual Network.
The database firewall allows only traffic coming from the PrivateLinkSubnet to connect, making the database inaccessible from the public
internet.
The other part is a private endpoint, this way you will create a private ip for the sql instance and any settings on the db will not open up the sql to
public.
I have dealt with this scenario for a couple of projects and these are the correct answers.
upvoted 16 times
https://learn.microsoft.com/en-us/azure/azure-sql/database/private-endpoint-overview?view=azuresql
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. A private endpoint is a private IP address within a
specific VNet and subnet.
https://learn.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview
While developers can securely store the secrets in Azure Key Vault, services need a way to access Azure Key Vault. Managed identities provide an
automatically managed identity in Azure Active Directory (Azure AD) for applications to use when connecting to resources that support Azure AD
authentication. Applications can use managed identities to obtain Azure AD tokens without having to manage any credentials.
upvoted 1 times
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 394/395
7/4/23, 10:06 AM SC-100 Exam – Free Actual Q&As, Page 1 | ExamTopics
https://www.examtopics.com/exams/microsoft/sc-100/custom-view/ 395/395