Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft Certified: Cybersecurity Architect Expert SC-100 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

You have an Azure subscription that contains an Azure key vault named Vault1.

You plan to deploy multiple virtual machines that will host a custom app named App1. App1 will use secrets stored in Vault1. The virtual machines will be redeployed regularly based on the usage demands of App1.

You need to recommend a solution that will enable App1 to access the secrets stored in Vault1. The solution must meet the following requirements:

    Minimize the number of security principals that can access Vault1.

    Minimize the storage of sensitive data on the virtual machines.

    Minimize administrative effort.

Which type of endpoint should App1 use to access the secrets, and which type of identity should App1 use? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 21


Expert Solution
Questions # 22:

A customer is deploying Docker images to 10 Azure Kubernetes Service (AKS) resources across four Azure subscriptions. You are evaluating the security posture of the customer.

You discover that the AKS resources are excluded from the secure score recommendations. You need to produce accurate recommendations and update the secure score.

Which two actions should you recommend in Microsoft Defender for Cloud? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Options:

A.

Configure auto provisioning.


B.

Assign regulatory compliance policies.


C.

Review the inventory.


D.

Add a workflow automation.


E.

Enable Defender plans.


Expert Solution
Questions # 23:

Your company has a hybrid cloud infrastructure that contains an on-premises Active Directory Domain Services (AD DS) forest, a Microsoft B65 subscription, and an Azure subscription.

The company's on-premises network contains internal web apps that use Kerberos authentication. Currently, the web apps are accessible only from the network.

You have remote users who have personal devices that run Windows 11.

You need to recommend a solution to provide the remote users with the ability to access the web apps. The solution must meet the following requirements:

• Prevent the remote users from accessing any other resources on the network.

• Support Azure Active Directory (Azure AD) Conditional Access.

• Simplify the end-user experience.

What should you include in the recommendation?

Options:

A.

Azure AD Application Proxy


B.

Azure Virtual WAN


C.

Microsoft Tunnel


D.

web content filtering in Microsoft Defender for Endpoint


Expert Solution
Questions # 24:

You have a Microsoft 365 E5 subscription and an Azure subscripts You need to evaluate the existing environment to increase the overall security posture for the following components:

• Windows 11 devices managed by Microsoft Intune

• Azure Storage accounts

• Azure virtual machines

What should you use to evaluate the components? To answer, select the appropriate options in the answer area.

Question # 24


Expert Solution
Questions # 25:

You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation? (Choose Two)

Options:

A.

Onboard the virtual machines to Microsoft Defender for Endpoint.


B.

Onboard the virtual machines to Azure Arc.


C.

Create a device compliance policy in Microsoft Endpoint Manager.


D.

Enable the Qualys scanner in Defender for Cloud.


Expert Solution
Questions # 26:

You need to recommend a solution to meet the requirements for connections to ClaimsDB.

What should you recommend using for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 26


Expert Solution
Questions # 27:

What should you create in Azure AD to meet the Contoso developer requirements?

Question # 27


Expert Solution
Questions # 28:

You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements.

What should you include in the recommendation?

Options:

A.

Transparent Data Encryption (TDE)


B.

Always Encrypted


C.

row-level security (RLS)


D.

dynamic data masking


E.

data classification


Expert Solution
Questions # 29:

You are evaluating the security of ClaimsApp.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.

Question # 29


Expert Solution
Questions # 30:

You need to recommend a solution to meet the security requirements for the InfraSec group.

What should you use to delegate the access?

Options:

A.

a subscription


B.

a custom role-based access control (RBAC) role


C.

a resource group


D.

a management group


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions