Exam Code : SC-100
Exam Name : Microsoft Cybersecurity Architect
Vendor Name :
"Microsoft"
SC-100 Dumps
SC-100 Braindumps SC-100 Real Questions SC-100 Practice Test
SC-100 Actual Questions
Microsoft Cybersecurity Architect
https://killexams.com/pass4sure/exam-detail/SC-100
Question: 33
You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL).
You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment
What should you include during the application design phase?
static application security testing (SAST) by using SonarQube
dynamic application security testing (DAST) by using Veracode
threat modeling by using the Microsoft Threat Modeling Tool
software decomposition by using Microsoft Visual Studio Enterprise
https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
Question: 34
HOTSPOT
You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements.
What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.
Explanation:
Box 1: Virtual Network Integration – correct
Virtual network integration gives your app access to resources in your virtual network, but it doesn’t grant inbound private access to your app from the virtual network.
Box 2: Private Endpoints. – correct
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access the app over Private Link.
Question: 35
Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit.
What should you include in the recommendation?
Azure Active Directory (Azure AD) enterprise applications
an Azure App Service Environment (ASE)
Azure service endpoints
an Azure Active Directory (Azure AD) application proxy
App Service environments (ASEs) are appropriate for application workloads that require: Very high scale,Isolation and secure network access,High memory utilization.
This capability can host your: Windows web apps,Linux web apps Docker containers,Mobile apps Functions
https://docs.microsoft.com/en-us/azure/app-service/environment/overview
Question: 36
You need to recommend a solution to scan the application code. The solution must meet the application development requirements.
What should you include in the recommendation?
Azure Key Vault
GitHub Advanced Security
Application Insights in Azure Monitor
Azure DevTest Labs
https://docs.microsoft.com/en-us/learn/modules/introduction-github-advanced-security/2-what-is-github-advanced- security
Question: 37
HOTSPOT
You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements.
What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point.
Explanation:
Question: 38
You are designing a ransomware response plan that follows Microsoft Security Best Practices.
You need to recommend a solution to limit the scope of damage of ransomware attacks without being locked out. What should you include in the recommendations?
Privileged Access Workstations (PAWs)
emergency access accounts
device compliance policies
Customer Lockbox for Microsoft Azure
Answer: B
Question: 39 HOTSPOT
You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements.
What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct
selection is worth one point.
Question: 40
HOTSPOT
You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (CI/CO) workflows.
You need to recommend best practices to secure the stages of the CI/CD workflows based on the Microsoft Cloud Adoption Framework for Azure.
What should you include in the recommendation for each stage? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Question: 41
A customer is deploying Docker images to 10 Azure Kubernetes Service (AKS) resources across four Azure subscriptions. You are evaluating the security posture of the customer.
You discover that the AKS resources are excluded from the secure score recommendations. You need to produce accurate recommendations and update the secure score.
Which two actions should you recommend in Microsoft Defender for Cloud? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Configure auto provisioning.
Assign regulatory compliance policies.
Review the inventory.
Add a workflow automation.
Enable Defender plans.
https://docs.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages
https://docs.microsoft.com/en-us/azure/defender-for-cloud/workflow-automation
Question: 42
Your company has a Microsoft 365 E5 subscription.
Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications.
What should you recommend using to prevent the PHI from being shared outside the company?
insider risk management policies
data loss prevention (DLP) policies
sensitivity label policies
retention policies
https://docs.microsoft.com/en-us/microsoft-365/compliance/create-test-tune-dlp-policy?view=o365-worldwide