Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

Microsoft Updated SC-100 Exam Questions and Answers by maira

Page: 5 / 8

Microsoft SC-100 Exam Overview :

Exam Name: Microsoft Cybersecurity Architect
Exam Code: SC-100 Dumps
Vendor: Microsoft Certification: Microsoft Certified: Cybersecurity Architect Expert
Questions: 171 Q&A's Shared By: maira
Question 20

You have a customer that has a Microsoft 365 subscription and uses the Free edition of Azure Active Directory (Azure AD)

The customer plans to obtain an Azure subscription and provision several Azure resources.

You need to evaluate the customer's security environment.

What will necessitate an upgrade from the Azure AD Free edition to the Premium edition?

Options:

A.

role-based authorization

B.

Azure AD Privileged Identity Management (PIM)

C.

resource-based authorization

D.

Azure AD Multi-Factor Authentication

Discussion
Walter
Yayyy!!! I passed my exam with the help of Cramkey Dumps. Highly appreciated!!!!
Angus (not set)
YES….. I saw the same questions in the exam.
Faye
Yayyyy. I passed my exam. I think all students give these dumps a try.
Emmeline (not set)
Definitely! I have no doubt new students will find them to be just as helpful as I did.
Freddy
I passed my exam with flying colors and I'm confident who will try it surely ace the exam.
Aleksander (not set)
Thanks for the recommendation! I'll check it out.
Teddie
yes, I passed my exam with wonderful score, Accurate and valid dumps.
Isla-Rose (not set)
Absolutely! The questions in the dumps were almost identical to the ones that appeared in the actual exam. I was able to answer almost all of them correctly.
Carson
Yeah, definitely. I would definitely recommend Cramkey Dumps to anyone who is preparing for an exam.
Rufus (not set)
Me too. They're a lifesaver!
Question 21

Your company has the virtual machine infrastructure shown in the following table.

Questions 21

The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines to Azure.

You need to provide recommendations to increase the resiliency of the backup strategy to mitigate attacks such as ransomware.

What should you include in the recommendation?

Options:

A.

Use geo-redundant storage (GRS).

B.

Use customer-managed keys (CMKs) for encryption.

C.

Require PINs to disable backups.

D.

Implement Azure Site Recovery replication.

Discussion
Question 22

Your company has an on-premise network in Seattle and an Azure subscription. The on-premises network contains a Remote Desktop server.

The company contracts a third-party development firm from France to develop and deploy resources to the virtual machines hosted in the Azure subscription.

Currently, the firm establishes an RDP connection to the Remote Desktop server. From the Remote Desktop connection, the firm can access the virtual machines hosted in Azure by using custom administrative tools installed on the Remote Desktop server. All the traffic to the Remote Desktop server is captured by a firewall, and the firewall only allows specific connections from France to the server.

You need to recommend a modern security solution based on the Zero Trust model. The solution must minimize latency tor developers.

Which three actions should you recommend? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Configure network security groups (NSGs) to allow access from only specific logical groupings of IP address ranges.

B.

Implement Azure Firewall to restrict host pool outbound access.

C.

Configure Azure Active Directory (Azure AD) Conditional Access with multi-factor authentication (MFA) and named locations.

D.

Migrate from the Remote Desktop server to Azure Virtual Desktop.

E.

Deploy a Remote Desktop server to an Azure region located in France.

Discussion
Question 23

Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud.

You receive the following recommendations in Defender for Cloud

• Access to storage accounts with firewall and virtual network configurations should be restricted,

• Storage accounts should restrict network access using virtual network rules.

• Storage account should use a private link connection.

• Storage account public access should be disallowed.

You need to recommend a service to mitigate identified risks that relate to the recommendations. What should you recommend?

Options:

A.

Azure Storage Analytics

B.

Azure Network Watcher

C.

Microsoft Sentinel

D.

Azure Policy

Discussion
Page: 5 / 8

SC-100
PDF

$38.5  $109.99

SC-100 Testing Engine

$45.5  $129.99

SC-100 PDF + Testing Engine

$59.5  $169.99