SC-100模擬練習 & SC-100模試エンジンお客様に最高のサービスをお楽しみいただくために、当社のSC-100試験準備はすべて、何百人もの経験豊富な専門家によって設計されました。 SC-100テストの質問は、お客様が試験に関する重要な知識を学ぶのに役立ちます。同時に、SC-100テストトレントは、暗記学習の習慣に陥るのを防ぐのに役立ちます。学習に20〜30時間費やすだけで、SC-100試験を受けて合格することができます。さらに、当社のSC-100試験準備の正式な制作チームは、お客様に最新の情報をお楽しみいただけるよう、毎日学習システムを更新します。 Microsoft Cybersecurity Architect 認定 SC-100 試験問題 (Q78-Q83):質問 # 78
You need to recommend a solution to meet the AWS requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point. 正解:
解説:
質問 # 79
For a Microsoft cloud environment, you are designing a security architecture based on the Microsoft Cybersecurity Reference Architectures (MCRA). You need to protect against the following external threats of an attack chain:
* An attacker attempts to exfiltrate data to external websites.
* An attacker attempts lateral movement across domain-joined computers.
What should you include in the recommendation for each threat? To answer, select the appropriate options in the answer area. 正解:
解説:
質問 # 81
You are a security architect in an organization. The chief compliance officer has tasked you to ensure that all new Azure core services are HIPAA compliant.
What operation compliance Azure solution can you use to automate the deployment compliance for Azure core services?
A. Azure Automation Update Management
B. Azure Policy
C. Azure Blueprints
D. Desired State Configuration
正解:C
解説:
Option A is incorrect because Azure Policy assesses resources in Azure by evaluating the properties of those resources to business policies; these business rules are known as policy definitions.
Option B is correct because the Azure blueprint is correct, as you can use the Azure blueprint to automate deployment to the desired regulatory target.
Option C is Incorrect because Desired State Configuration is used to automate Linux and Windows operating systems configurations.
Option D Incorrect is incorrect because Azure Automation Update Management is used for patch management.
Reference: https://learn.microsoft.com/en-u ... pliance-strategy/2- interpret-compliance-requirements-their-technical-capabilities
質問 # 82
You are designing security for a runbook in an Azure Automation account. The runbook will copy data to Azure Data Lake Storage Gen2.
You need to recommend a solution to secure the components of the copy process.
What should you include in the recommendation for each component? To answer, select the appropriate options in the answer are a. NOTE: Each correct selection is worth one point. 正解:
解説: