SC-100 Microsoft Cybersecurity Architect exam is one of the required exam to earn Microsoft Certified: Cybersecurity Architect Expert Certification. PassQuestion provides high-quality SC-100 Practice Test Questions that will allow you to improve your preparation level for the Microsoft SC-100 exam. SC-100 Practice Test Questions are actual exam questions. It will help you to build confidence and you can pass the Microsoft SC-100 exam easily. If you are going through all of our SC-100 Practice Test Questions, then you will be able to clear the Microsoft Certified: Cybersecurity Architect Expert SC-100 exam on the first attempt. Our SC-100 Practice Test Questions are enough for getting success in the first shot.
Microsoft Cybersecurity Architect SC-100 Exam
The SC-100 Microsoft Cybersecurity Architect exam is aimed towards candidates who have a wide range of knowledge in different areas of Microsoft Security and are able to design and implement security solutions. You will also be expected to be familiar with both hybrid and cloud-only environments and implementations. In the Microsoft SC-100 exam, there will be 40-60 questions.A candidate must, however, achieve a score of 700 or better in order to pass the exam. Furthermore, the exam is only offered in English and will cost you $165 USD.
Microsoft Certified: Cybersecurity Architect Expert Certification
To obtain the Cybersecurity Architect Expert certification you need to pass the new SC-100 exam (this study guide) and ONLY ONE of the following four prerequisites security exams:
Option 1: Exam SC-200: Microsoft Security Operations Analyst.
Option 2: Exam SC-300: Microsoft Identity and Access Administrator.
Option 3: Exam AZ-500: Microsoft Azure Security Technologies.
Option 4: Exam MS-500: Microsoft 365 Security Administration.
Exam Topics
Design a Zero Trust strategy and architecture (30–35%)
Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies (20–25%)
Design security for infrastructure (20–25%)
Design a strategy for data and applications (20–25%)
View Online Microsoft Cybersecurity Architect SC-100 Free Questions
Azure subscription that uses Azure Storage.
The company plans to share specific blobs with vendors. You need to recommend a solution to provide the vendors with secure access to specific blobs without exposing the blobs publicly. The access must be t\me-Vim\ted. What should you include in the recommendation?
A.Create shared access signatures (SAS).
B.Share the connection string of the access key.
C.Configure private link connections.
D.Configure encryption by using customer-managed keys (CMKs)
Answer: D
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.
You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.
Solution: You recommend configuring gateway-required virtual network integration.
Does this meet the goal?
A.Yes
B.No
Answer: A
You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers.
In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A.Linux containers deployed to Azure Container Registry
B.Linux containers deployed to Azure Kubernetes Service (AKS)
C.Windows containers deployed to Azure Container Registry
D.Windows containers deployed to Azure Kubernetes Service (AKS)
E.Linux containers deployed to Azure Container Instances
Answer: D, E
You have Windows 11 devices and Microsoft 365 E5 licenses.
You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites. What should you include in the recommendation?
A.Microsoft Endpoint Manager
B.Compliance Manager
C.Microsoft Defender for Cloud Apps
D.Microsoft Defender for Endpoint
Answer: D
You are evaluating an Azure environment for compliance.
You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources.
Which effect should you use in Azure Policy?
A.Deny
B.Disabled
C.Modify
D.Append
Answer: A
You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements.
What should you include in the recommendation?
A.Transparent Data Encryption (TDE)
B.Always Encrypted
C.row-level security (RLS)
D.dynamic data masking
E.data classification
Answer: A
You need to recommend a solution to meet the security requirements for the virtual machines. What should you include in the recommendation?
A.an Azure Bastion host
B.a network security group (NSG)
C.just-in-time (JIT) VM access
D.Azure Virtual Desktop
Answer: A
You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation?
A.Onboard the virtual machines to Microsoft Defender for Endpoint.
B.Onboard the virtual machines to Azure Arc.
C.Create a device compliance policy in Microsoft Endpoint Manager.
D.Enable the Qualys scanner in Defender for Cloud.
Answer: A
You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?
A.Azure Key Vault
B.GitHub Advanced Security
C.Application Insights in Azure Monitor
D.Azure DevTest Labs
Answer: D
You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements.
What should you configure for each landing zone?
A.Azure DDoS Protection Standard
B.an Azure Private DNS zone
C.Microsoft Defender for Cloud
D.an ExpressRoute gateway
Answer: D
No comments yet