Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft Certified: Cybersecurity Architect Expert SC-100 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?

Options:

A.

Azure Key Vault


B.

GitHub Advanced Security


C.

Application Insights in Azure Monitor


D.

Azure DevTest Labs


Expert Solution
Questions # 32:

You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 32


Expert Solution
Questions # 33:

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Security Assertion Markup Language (SAML)


B.

NTLMv2


C.

certificate-based authentication


D.

Kerberos


Expert Solution
Questions # 34:

You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 34


Expert Solution
Questions # 35:

You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.

Question # 35


Expert Solution
Questions # 36:

You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements.

Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.

Options:

A.

Azure AD Conditional Access


B.

Microsoft Defender for Cloud Apps


C.

Microsoft Defender for Cloud


D.

Microsoft Defender for Endpoint


E.

access reviews in Azure AD


Expert Solution
Questions # 37:

You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Question # 37


Expert Solution
Questions # 38:

You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point.

Question # 38


Expert Solution
Questions # 39:

You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 39


Expert Solution
Questions # 40:

You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Options:

A.

Enable Microsoft Defender for Cosmos DB.


B.

Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.


C.

Disable local authentication for Azure Cosmos DB.


D.

Enable Microsoft Defender for Identity.


E.

Send the Azure Cosmos DB logs to a Log Analytics workspace.


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions