Firefly Open Source Community

   Login   |   Register   |
New_Topic
Print Previous Topic Next Topic

[General] SC-100 Trusted Exam Resource & SC-100 New Question

124

Credits

0

Prestige

0

Contribution

registered members

Rank: 2

Credits
124

【General】 SC-100 Trusted Exam Resource & SC-100 New Question

Posted at yesterday 22:17      View:11 | Replies:0        Print      Only Author   [Copy Link] 1#
What's more, part of that Dumpcollection SC-100 dumps now are free: https://drive.google.com/open?id=1e0Z0flPUlrPmCq6PsXnxzagq84vs21TW
If you are worry about the coming SC-100 exam, our SC-100 study materials will help you solve your problem. In order to promise the high quality of our SC-100 exam questions, our company has outstanding technical staff, and has perfect service system after sale. More importantly, our good SC-100 Guide quiz and perfect after sale service are approbated by our local and international customers.
Do you want to pass the Microsoft SC-100 Certification ExamIf you are looking for a way to pass the SC-100 exam, then you are at the right place. We offer the best Microsoft SC-100 practice questions that will help you prepare for your exam. Our SC-100 exam dumps questions are prepared by IT industry experts and professionals who have years of experience in this field. You can become certified with our SC-100 Practice Test software which is simple and easy to use.
SC-100 Prep Training - SC-100 Study Guide & SC-100 Test PdfMany people choose to sign up for the Microsoft SC-100 certification examinations in order to advance their knowledge and abilities. We offer updated and actual Microsoft SC-100 Dumps questions that will be enough to get ready for the Microsoft SC-100 test. Our Microsoft SC-100 questions are 100% genuine and will certainly appear in the next Microsoft SC-100 test.
Microsoft SC-100 exam is a 180-minute test consisting of 40-60 multiple-choice questions. SC-100 exam covers a range of topics, including security concepts, threat management, identity, access management, platform protection, data and application protection, and governance, risk management, and compliance. Candidates who pass the exam will demonstrate the skills and knowledge required to design and implement secure solutions using Microsoft technologies.
Microsoft SC-100 exam covers a range of topics related to cybersecurity architecture, including security design, implementation, and management. SC-100 Exam Tests an individual’s understanding of cybersecurity principles, as well as their ability to implement and manage security solutions in a variety of settings. SC-100 exam is designed to be challenging, and individuals who pass the exam can be confident in their ability to design and implement effective cybersecurity solutions.
Microsoft Cybersecurity Architect Sample Questions (Q176-Q181):NEW QUESTION # 176
Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud.
You receive the following recommendations in Defender for Cloud
* Access to storage accounts with firewall and virtual network configurations should be restricted,
* Storage accounts should restrict network access using virtual network rules.
* Storage account should use a private link connection.
* Storage account public access should be disallowed.
You need to recommend a service to mitigate identified risks that relate to the recommendations. What should you recommend?
  • A. Microsoft Sentinel
  • B. Azure Network Watcher
  • C. Azure Policy
  • D. Azure Storage Analytics
Answer: C
Explanation:
https://docs.microsoft.com/en-us ... rity-policy-concept https://docs.microsoft.com
/en-us/security/benchmark/azure/baselines/storage-security-baseline

NEW QUESTION # 177
You are evaluating an Azure environment for compliance.
You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources.
Which effect should you use in Azure Policy?
  • A. Append
  • B. Deny
  • C. Disabled
  • D. Modify
Answer: C
Explanation:
Before looking to manage new or updated resources with your new policy definition, it's best to see how it evaluates a limited subset of existing resources, such as a test resource group. Use the enforcement mode Disabled (DoNotEnforce) on your policy assignment to prevent the effect from triggering or activity log entries from being created.
https://docs.microsoft.com/en-us ... pts/evaluate-impact

NEW QUESTION # 178
Your on-premises network contains an e-commerce web app that was developed in Angular and Node.js. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.

You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model.
Solution: You recommend implementing Azure Front Door with Azure Web Application Firewall (WAF).
Does this meet the goal?
  • A. Yes
  • B. No
Answer: B
Explanation:
https://www.varonis.com/blog/securing-access-azure-webapps
Topic 2, Fabrikam, Inc Case Study 1
OverView
Fabrikam, Inc. is an insurance company that has a main office in New York and a branch office in Paris.
On-premises Environment
The on-premises network contains a single Active Directory Domain Services (AD DS) domain named corp.fabrikam.com.
Azure Environment
Fabrikam has the following Azure resources:
* An Azure Active Directory (Azure AD) tenant named fabrikam.onmicrosoft.com that syncs with corp.fabnkam.com
* A single Azure subscription named Sub1
* A virtual network named Vnet1 in the East US Azure region
* A virtual network named Vnet2 in the West Europe Azure region
* An instance of Azure Front Door named FD1 that has Azure Web Application Firewall (WAR enabled
* A Microsoft Sentinel workspace
* An Azure SQL database named ClaimsDB that contains a table named ClaimDetails
* 20 virtual machines that are configured as application servers and are NOT onboarded to Microsoft Defender for Cloud
* A resource group named TestRG that is used for testing purposes only
* An Azure Virtual Desktop host pool that contains personal assigned session hosts All the resources in Sub1 are in either the East US or the West Europe region.
Partners
Fabrikam has contracted a company named Contoso, Ltd. to develop applications. Contoso has the following infrastructure-.
* An Azure AD tenant named contoso.onmicrosoft.com
* An Amazon Web Services (AWS) implementation named ContosoAWS1 that contains AWS EC2 instances used to host test workloads for the applications of Fabrikam Developers at Contoso will connect to the resources of Fabrikam to test or update applications. The developers will be added to a security Group named Contoso Developers in fabrikam.onmicrosoft.com that will be assigned to roles in Sub1.
The ContosoDevelopers group is assigned the db.owner role for the ClaimsDB database.
Compliance Event
Fabrikam deploys the following compliance environment:
* Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
* Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
* Qualys is used as the standard vulnerability assessment tool for servers.
Problem Statements
The secure score in Defender for Cloud shows that all the virtual machines generate the following recommendation-. Machines should have a vulnerability assessment solution.
All the virtual machines must be compliant in Defender for Cloud.
ClaimApp Deployment
Fabrikam plans to implement an internet-accessible application named ClaimsApp that will have the following specification
* ClaimsApp will be deployed to Azure App Service instances that connect to Vnetl and Vnet2.
* Users will connect to ClaimsApp by using a URL of https://claims.fabrikam.com.
* ClaimsApp will access data in ClaimsDB.
* ClaimsDB must be accessible only from Azure virtual networks.
* The app services permission for ClaimsApp must be assigned to ClaimsDB.
Application Development Requirements
Fabrikam identifies the following requirements for application development:
* Azure DevTest labs will be used by developers for testing.
* All the application code must be stored in GitHub Enterprise.
* Azure Pipelines will be used to manage application deployments.
* All application code changes must be scanned for security vulnerabilities, including application code or configuration files that contain secrets in clear text. Scanning must be done at the time the code is pushed to a repository.
Security Requirement
Fabrikam identifies the following security requirements:
* Internet-accessible applications must prevent connections that originate in North Korea.
* Only members of a group named InfraSec must be allowed to configure network security groups (NSGs} and instances of Azure Firewall, VJM. And Front Door in Sub1.
* Administrators must connect to a secure host to perform any remote administration of the virtual machines.
The secure host must be provisioned from a custom operating system image.
AWS Requirements
Fabrikam identifies the following security requirements for the data hosted in ContosoAWSV.
* Notify security administrators at Fabrikam if any AWS EC2 instances are noncompliant with secure score recommendations.
* Ensure that the security administrators can query AWS service logs directly from the Azure environment.
Contoso Developer Requirements
Fabrikam identifies the following requirements for the Contoso developers;
* Every month, the membership of the ContosoDevelopers group must be verified.
* The Contoso developers must use their existing contoso.onmicrosoft.com credentials to access the resources in Sub1.
* The Comoro developers must be prevented from viewing the data in a column named MedicalHistory in the ClaimDetails table.
Compliance Requirement
Fabrikam wants to automatically remediate the virtual machines in Sub1 to be compliant with the HIPPA HITRUST standard. The virtual machines in TestRG must be excluded from the compliance assessment.

NEW QUESTION # 179
Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud.
You receive the following recommendations in Defender for Cloud
* Access to storage accounts with firewall and virtual network configurations should be restricted,
* Storage accounts should restrict network access using virtual network rules.
* Storage account should use a private link connection.
* Storage account public access should be disallowed.
You need to recommend a service to mitigate identified risks that relate to the recommendations. What should you recommend?
  • A. Microsoft Sentinel
  • B. Azure Network Watcher
  • C. Azure Policy
  • D. Azure Storage Analytics
Answer: C
Explanation:
https://docs.microsoft.com/en-us ... rity-policy-concept
https://docs.microsoft.com/en-us ... e-security-baseline

NEW QUESTION # 180
You have 50 Azure subscriptions.
You need to monitor resource in the subscriptions for compliance with the ISO 27001:2013 standards. The solution must minimize the effort required to modify the list of monitored policy definitions for the subscriptions.
NOTE: Each correct selection is worth one point.
  • A. Assign an initiative to each subscription.
  • B. Assign a blueprint to each subscription.
  • C. Assign a policy to a management group.
  • D. Assign a blueprint to a management group.
  • E. Assign a policy to each subscription.
  • F. Assign an initiative to a management group.
Answer: D,F
Explanation:
https://docs.microsoft.com/en-us ... ent-groups/overview
https://docs.microsoft.com/en-us ... blueprints/overview
https://docs.microsoft.com/en-us ... y/samples/iso-27001
https://docs.microsoft.com/en-us ... s/create-and-manage

NEW QUESTION # 181
......
SC-100 New Question: https://www.dumpcollection.com/SC-100_braindumps.html
What's more, part of that Dumpcollection SC-100 dumps now are free: https://drive.google.com/open?id=1e0Z0flPUlrPmCq6PsXnxzagq84vs21TW
Reply

Use props Report

You need to log in before you can reply Login | Register

This forum Credits Rules

Quick Reply Back to top Back to list