Topic 3: Mix Questions
You have a customer that has a Microsoft 365 subscription and an Azure subscription.
The customer has devices that run either Windows, iOS, Android, or macOS. The Windows
devices are deployed on-premises and in Azure.
You need to design a security solution to assess whether all the devices meet the
customer's compliance rules.
What should you include in the solution?
A. Microsoft Information Protection
B. Microsoft Defender for Endpoint
C. Microsoft Sentinel
D. Microsoft Intune
Explanation:
https://docs.microsoft.com/en-us/mem/intune/protect/compliance-policymonitor#
open-the-compliance-dashboard
Your on-premises network contains an e-commerce web app that was developed in Angular and Node.js. The web app uses a MongoDB database You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.

A. Yes
B. No
Explanation:
When using Azure-provided PaaS services (e.g., Azure Storage, Azure
Cosmos DB, or Azure Web App, use the PrivateLink connectivity option to ensure all data
exchanges are over the private IP space and the traffic never leaves the Microsoft network
Your company is preparing for cloud adoption.
You are designing security for Azure landing zones.
Which two preventative controls can you implement to increase the secure score? Each
NOTE: Each correct selection is worth one point.
A. Azure Firewall
B. Azure Web Application Firewall (WAF)
C. Microsoft Defender for Cloud alerts
D. Azure Active Directory (Azure AD Privileged Identity Management (PIM)
E. Microsoft Sentinel
E. Microsoft Sentinel
Explanation:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-scoresecurity-
controls
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender
and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different
applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on
the virtual machines. If an unauthorized application attempts to run or be installed, the
application must be blocked automatically until an administrator authorizes the application.
Which security control should you recommend?
A. Azure Active Directory (Azure AD) Conditional Access App Control policies
B. OAuth app policies in Microsoft Defender for Cloud Apps
C. app protection policies in Microsoft Endpoint Manager
D. application control policies in Microsoft Defender for Endpoint
Explanation:
https://docs.microsoft.com/en-us/windows/security/threatprotection/
windows-defender-application-control/select-types-of-rules-to-create#windowsdefender-
application-control-policy-rules
You have legacy operational technology (OT) devices and loT devices.
You need to recommend best practices for applying Zero Trust principles to the OT and loT
devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The
solution must minimize the risk of disrupting business operations.
Which two security methodologies should you include in the recommendation? Each
correct answer presents part of the solution.
NOTE: Each correct selection is worth one point
A. passive traffic monitoring
B. active scanning
C. threat monitoring
D. software patching
D. software patching
You are evaluating an Azure environment for compliance.
You need to design an Azure Policy implementation that can be used to evaluate
compliance without changing any resources.
Which effect should you use in Azure Policy?
A. Deny
B. Disabled
C. Modify
D. Append
Explanation:
Before looking to manage new or updated resources with your new policy
definition, it's best to see how it evaluates a limited subset of existing resources, such as a
test resource group. Use the enforcement mode Disabled (DoNotEnforce) on your policy assignment to prevent the effect from triggering or activity log entries from being created.
https://docs.microsoft.com/en-us/azure/governance/policy/concepts/evaluate-impact
You open Microsoft Defender for Cloud as shown in the following exhibit.

You have an Azure subscription and an on-premises datacenter. The datacenter contains
100 servers that run Windows Server. AJI the servers are backed up to a Recovery
Services vault by using Azure Backup and the Microsoft Azure Recovery Services (MARS)
agent.
You need to design a recovery solution for ransomware attacks that encrypt the onpremises
servers. The solution must follow Microsoft Security Best Practices and protect
against the following risks:
• A compromised administrator account used to delete the backups from Azure Backup
before encrypting the servers
• A compromised administrator account used to disable the backups on the MARS agent
before encrypting the servers
What should you use for each risk? To answer, select the appropriate options in the
answer area.
NOTE: Each correct selection is worth one point
You have an Azure AD tenant that syncs with an Active Directory Domain Services (AD
DS) domain.
You have an on-premises datacenter that contains 100 servers. The servers run Windows
Server and are backed up by using Microsoft Azure Backup Server (MABS).
You are designing a recovery solution for ransomware attacks. The solution follows
Microsoft Security Best Practices.
You need to ensure that a compromised administrator account cannot be used to delete
the backups.
What should you do?
A. From a Recovery Services vault generate a security PIN for critical operations.
B. From Azure Backup, configure multi-user authorization by using Resource Guard.
C. From Microsoft Azure Backup Setup, register MABS with a Recovery Services vault
D. From Azure AD Privileged Identity Management (PIM), create a role assignment for the Backup Contributor role.
You have an Azure subscription. The subscription contains 100 virtual machines that run
Windows Server. The virtual machines are managed by using Azure Policy and Microsoft
Defender for Servers.
You need to enhance security on the virtual machines. The solution must meet the
following requirements:
• Ensure that only apps on an allowlist can be run.
• Require administrators to confirm each app added to the allowlist.
• Automatically add unauthorized apps to a blocklist when an attempt is made to launch the
app.
• Require administrators to approve an app before the app can be moved from the blocklist
to the allowlist.
What should you include in the solution?
A. a compute policy in Azure Policy
B. admin consent settings for enterprise applications in Azure AD
C. adaptive application controls in Defender for Servers
D. app governance in Microsoft Defender for Cloud Apps
| Page 5 out of 18 Pages |
| SC-100 Practice Test | Previous |