Exam Details

  • Exam Code
    :SC-100
  • Exam Name
    :Microsoft Cybersecurity Architect
  • Certification
    :Microsoft Certified: Cybersecurity Architect Expert
  • Vendor
    :Microsoft
  • Total Questions
    :180 Q&As
  • Last Updated
    :May 07, 2024

Microsoft Microsoft Certified: Cybersecurity Architect Expert SC-100 Questions & Answers

  • Question 31:

    You are designing a new Azure environment based on the security best practices of the Microsoft Cloud Adoption Framework for Azure. The environment will contain one subscription for shared infrastructure components and three separate subscriptions for applications.

    You need to recommend a deployment solution that includes network security groups (NSGs), Azure Firewall, Azure Key Vault, and Azure Bastion. The solution must minimize deployment effort and follow security best practices of the Microsoft Cloud Adoption Framework for Azure.

    What should you include in the recommendation?

    A. the Azure landing zone accelerator

    B. the Azure Well-Architected Framework

    C. Azure Security Benchmark v3

    D. Azure Advisor

  • Question 32:

    Your company plans to follow DevSecOps best practices of the Microsoft Cloud Adoption Framework for Azure.

    You need to perform threat modeling by using a top-down approach based on the Microsoft Cloud Adoption Framework for Azure.

    What should you use to start the threat modeling process?

    A. the STRIDE model

    B. the DREAD model

    C. OWASP threat modeling

  • Question 33:

    For a Microsoft cloud environment, you are designing a security architecture based on the Microsoft Cloud Security Benchmark.

    What are three best practices for identity management based on the Azure Security Benchmark? Each correct answer presents a complete solution.

    NOTE: Each correct selection is worth one point.

    A. Manage application identities securely and automatically.

    B. Manage the lifecycle of identities and entitlements

    C. Protect identity and authentication systems.

    D. Enable threat detection for identity and access management.

    E. Use a centralized identity and authentication system.

  • Question 34:

    Your company is preparing for cloud adoption.

    You are designing security for Azure landing zones.

    Which two preventative controls can you implement to increase the secure score? Each NOTE: Each correct selection is worth one point.

    A. Azure Firewall

    B. Azure Web Application Firewall (WAF)

    C. Microsoft Defender for Cloud alerts

    D. Azure Active Directory (Azure AD Privileged Identity Management (PIM)

    E. Microsoft Sentinel

  • Question 35:

    You have legacy operational technology (OT) devices and IoT devices.

    You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business

    operations.

    Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.

    NOTE: Each correct selection is worth one point.

    A. active scanning

    B. threat monitoring

    C. software patching

    D. passive traffic monitoring

  • Question 36:

    You have an on-premises network and a Microsoft 365 subscription.

    You are designing a Zero Trust security strategy.

    Which two security controls should you include as part of the Zero Trust solution? Each correct answer presents part of the solution.

    NOTE: Each correct answer is worth one point.

    A. Always allow connections from the on-premises network.

    B. Disable passwordless sign-in for sensitive accounts.

    C. Block sign-in attempts from unknown locations.

    D. Block sign-in attempts from noncompliant devices.

  • Question 37:

    You have an Azure subscription.

    Your company has a governance requirement that resources must be created in the West Europe or North Europe Azure regions.

    What should you recommend using to enforce the governance requirement?

    A. Azure management groups

    B. custom Azure roles

    C. Azure Policy assignments

    D. regulatory compliance standards in Microsoft Defender for Cloud

  • Question 38:

    You design cloud-based software as a service (SaaS) solutions.

    You need to recommend a recovery solution for ransomware attacks. The solution must follow Microsoft Security Best Practices.

    What should you recommend doing first?

    A. Develop a privileged identity strategy.

    B. Implement data protection.

    C. Develop a privileged access strategy.

    D. Prepare a recovery plan.

  • Question 39:

    You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (CI/CD) workflows for the deployment of applications to Azure.

    You need to recommend what to include in dynamic application security testing (DAST) based on the principles of the Microsoft Cloud Adoption Framework for Azure.

    What should you recommend?

    A. unit testing

    B. penetration testing

    C. dependency checks

    D. threat modeling

  • Question 40:

    You have a Microsoft 365 subscription.

    You are designing a user access solution that follows the Zero Trust principles of the Microsoft Cybersecurity Reference Architectures (MCRA).

    You need to recommend a solution that automatically restricts access to Microsoft Exchange Online, SharePoint Online, and Teams in near-real-time (NRT) in response to the following Azure AD events:

    1.

    A user account is disabled or deleted.

    2.

    The password of a user is changed or reset.

    3.

    All the refresh tokens for a user are revoked.

    4.

    Multi-factor authentication (MFA) is enabled for a user.

    Which two features should you include in the recommendation? Each correct answer presents part of the solution.

    NOTE: Each correct selection is worth one point.

    A. continuous access evaluation

    B. Azure AD Application Proxy

    C. a sign-in risk policy

    D. Azure AD Privileged Identity Management (PIM)

    E. Conditional Access

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SC-100 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.