Exam Details

  • Exam Code
    :SC-100
  • Exam Name
    :Microsoft Cybersecurity Architect
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :251 Q&As
  • Last Updated
    :Mar 23, 2025

Microsoft Microsoft Certifications SC-100 Questions & Answers

  • Question 121:

    Your company is moving all on-premises workloads to Azure and Microsoft 365.

    You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following requirements:

    1.

    Minimizes manual intervention by security operation analysts

    2.

    Supports triaging alerts within Microsoft Teams channels What should you include in the strategy?

    A. KQL

    B. playbooks

    C. data connectors

    D. KQLworkbooks

  • Question 122:

    You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts.

    You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts.

    Which two configurations should you include in the recommendation? Each correct answer presents part of the solution.

    NOTE: Each correct selection is worth one point.

    A. Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace.

    B. Enable Microsoft Defender for Identity.

    C. Send the Azure Cosmos DB logs to a Log Analytics workspace.

    D. Disable local authentication for Azure Cosmos DB.

    E. Enable Microsoft Defender for Cosmos DB.

  • Question 123:

    Your company has the virtual machine infrastructure shown in the following table.

    The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines to Azure.

    You need to provide recommendations to increase the resiliency of the backup strategy to mitigate attacks such as ransomware.

    What should you include in the recommendation?

    A. Use geo-redundant storage (GRS).

    B. Maintain multiple copies of the virtual machines.

    C. Encrypt the backups by using customer-managed keys (CMKS).

    D. Require PINs to disable backups.

  • Question 124:

    Your company has an office in Seattle.

    The company has two Azure virtual machine scales sets hosted on different virtual networks.

    The company plans to contract developers in India.

    You need to recommend a solution to provide the developers with the ability to connect to the virtual machines over SSL from the Azure portal. The solution must meet the following requirements:

    1.

    Prevent exposing the public IP addresses of the virtual machines.

    2.

    Provide the ability to connect without using a VPN.

    3.

    Minimize costs.

    Which two actions should you perform? Each correct answer presents part of the solution.

    NOTE: Each correct selection is worth one point.

    A. Create a hub and spoke network by using virtual network peering.

    B. Deploy Azure Bastion to each virtual network.

    C. Enable just-in-time VM access on the virtual machines.

    D. Create NAT rules and network rules in Azure Firewall.

    E. Deploy Azure Bastion to one virtual network.

  • Question 125:

    Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud. You receive the following recommendations in Defender for Cloud

    1.

    Access to storage accounts with firewall and virtual network configurations should be restricted.

    2.

    Storage accounts should restrict network access using virtual network rules.

    3.

    Storage account should use a private link connection.

    4.

    Storage account public access should be disallowed.

    You need to recommend a service to mitigate identified risks that relate to the recommendations.

    What should you recommend?

    A. Azure Policy

    B. Azure Network Watcher

    C. Azure Storage Analytics

    D. Microsoft Sentinel

  • Question 126:

    A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription.

    All on-premises servers in the perimeter network are prevented from connecting directly to the internet.

    The customer recently recovered from a ransomware attack.

    The customer plans to deploy Microsoft Sentinel.

    You need to recommend solutions to meet the following requirements:

    1.

    Ensure that the security operations team can access the security logs and the operation logs.

    2.

    Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network. Which two solutions should you include in the recommendation? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

    A. a custom collector that uses the Log Analytics agent

    B. the Azure Monitor agent

    C. resource-based role-based access control (RBAC)

    D. Azure Active Directory (Azure AD) Conditional Access policies

  • Question 127:

    You are designing security for an Azure landing zone.

    Your company identifies the following compliance and privacy requirements:

    1.

    Encrypt cardholder data by using encryption keys managed by the company.

    2.

    Encrypt insurance claim files by using encryption keys hosted on-premises.

    Which two configurations meet the compliance and privacy requirements? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

    A. Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed keys.

    B. Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.

    C. Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM.

    D. Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HSM.

  • Question 128:

    You have a Microsoft 365 E5 subscription and an Azure subscription.

    You are designing a Microsoft deployment.

    You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing security events.

    What should you recommend using in Microsoft Sentinel?

    A. playbooks

    B. workbooks

    C. notebooks

    D. threat intelligence

  • Question 129:

    HOTSPOT

    Your company has a Microsoft 365 E5 subscription, an Azure subscription, on-premises applications, and Active Directory Domain Services (AD DS).

    You need to recommend an identity security strategy that meets the following requirements:

    1.

    Ensures that customers can use their Facebook credentials to authenticate to an Azure App Service website

    2.

    Ensures that partner companies can access Microsoft SharePoint Online sites for the project to which they are assigned

    The solution must minimize the need to deploy additional infrastructure components.

    What should you include in the recommendation? To answer, select the appropriate options in the answer area.

    NOTE: Each correct selection is worth one point.

    Hot Area:

  • Question 130:

    HOTSPOT

    Your company uses Microsoft Defender for Cloud and Microsoft Sentinel.

    The company is designing an application that will have the architecture shown in the following exhibit.

    You are designing a logging and auditing solution for the proposed architecture. The solution must meet the following requirements:

    1.

    Integrate Azure Web Application Firewall (WAF) logs with Microsoft Sentinel.

    2.

    Use Defender for Cloud to review alerts from the virtual machines.

    What should you include in the solution? To answer, select the appropriate options in the answer area.

    NOTE: Each correct selection is worth one point.

    Hot Area:

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SC-100 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.