Exam Details

  • Exam Code
    :SC-100
  • Exam Name
    :Microsoft Cybersecurity Architect
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :251 Q&As
  • Last Updated
    :Mar 23, 2025

Microsoft Microsoft Certifications SC-100 Questions & Answers

  • Question 81:

    You have Microsoft Defender for Cloud assigned to Azure management groups.

    You have a Microsoft Sentinel deployment.

    During the triage of alerts, you require additional information about the security events, including suggestions for remediation.

    Which two components can you use to achieve the goal? Each correct answer presents a complete solution.

    NOTE: Each correct selection is worth one point.

    A. Microsoft Sentinel threat intelligence workbooks

    B. Microsoft Sentinel notebooks

    C. threat intelligence reports in Defender for Cloud

    D. workload protections in Defender for Cloud

  • Question 82:

    You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.)

    After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?

    A. Storage account public access should be disallowed

    B. Azure Key Vault Managed HSM should have purge protection enabled

    C. Storage accounts should prevent shared key access

    D. Storage account keys should not be expired

  • Question 83:

    You have an on-premises network that has several legacy applications. The applications perform LDAP queries against an existing directory service.

    You are migrating the on- premises infrastructure to a cloud-only infrastructure.

    You need to recommend an identity solution for the infrastructure that supports the legacy applications. The solution must minimize the administrative effort to maintain the infrastructure.

    Which identity service should you include in the recommendation?

    A. Azure AD B2C

    B. Azure Active Directory Domain Services (Azure AD DS)

    C. Azure AD

    D. Active Directory Domain Services (AD DS)

  • Question 84:

    You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are authenticated by using access keys.

    You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts. The solution must minimize the impact on the legacy applications.

    What should you include in the recommendation?

    A. Apply read-only locks on the storage accounts.

    B. Set the AllowSharcdKeyAccess property to false.

    C. Set the AllowBlobPublicAcccss property to false.

    D. Configure automated key rotation.

  • Question 85:

    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

    Your on-premises network contains an e-commerce web app that was developed in Angular and Node,js. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.

    You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model.

    Solution: You recommend implementing Azure Front Door with Azure Web Application Firewall (WAF).

    Does this meet the goal?

    A. Yes

    B. No

  • Question 86:

    You have an Azure subscription that has Microsoft Defender for Cloud enabled.

    Suspicious authentication activity alerts have been appearing in the Workload protections dashboard.

    You need to recommend a solution to evaluate and remediate the alerts by using a workflow automation feature of Microsoft Defender for Cloud.

    What should you include in the recommendation?

    A. Azure Monitor webhooks

    B. Azure Event Hubs

    C. Azure Functions apps

    D. Azure Logic Apps

  • Question 87:

    You have a customer that has a Microsoft 365 subscription and an Azure subscription.

    The customer has devices that run either Windows, iOS, Android, or macOS. The Windows devices are deployed on-premises and in Azure.

    You need to design a security solution to assess whether all the devices meet the customer's compliance rules.

    What should you include in the solution?

    A. Microsoft Defender for Endpoint

    B. Microsoft Endpoint Manager

    C. Microsoft Information Protection

    D. Microsoft Sentinel

  • Question 88:

    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

    You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.

    You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.

    Solution: You recommend configuring gateway-required virtual network integration.

    Does this meet the goal?

    A. Yes

    B. No

  • Question 89:

    You have Windows 11 devices and Microsoft 365 E5 licenses.

    You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites.

    What should you include in the recommendation?

    A. Microsoft Endpoint Manager

    B. Compliance Manager

    C. Microsoft Defender for Cloud Apps

    D. Microsoft Defender for Endpoint

  • Question 90:

    You have an Azure subscription that contains virtual machines.

    Port 3389 and port 22 are disabled for outside access.

    You need to design a solution to provide administrators with secure remote access to the virtual machines. The solution must meet the following requirements:

    1.

    Prevent the need to enable ports 3389 and 22 from the internet.

    2.

    Only provide permission to connect the virtual machines when required.

    3.

    Ensure that administrators use the Azure portal to connect to the virtual machines.

    Which two actions should you include in the solution? Each correct answer presents part of the solution.

    NOTE: Each correct selection is worth one point.

    A. Configure Azure VPN Gateway.

    B. Enable Just Enough Administration (JEA).

    C. Configure Azure Bastion.

    D. Enable just-in-time (JIT) VM access.

    E. Enable Azure AD Privileged Identity Management (PIM) roles as virtual machine contributors.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SC-100 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.