Microsoft Cybersecurity Architect (SC-100) Certification Sample Questions

Cybersecurity Architect Dumps, SC-100 Dumps, SC-100 PDF, Cybersecurity Architect VCE, Microsoft SC-100 VCE, Microsoft MCE Cybersecurity Architect PDFThe purpose of this Sample Question Set is to provide you with information about the Microsoft Cybersecurity Architect exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the SC-100 certification test. To get familiar with real exam environment, we suggest you try our Sample Microsoft Cybersecurity Architect Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual Microsoft Cybersecurity Architect certification exam.

These sample questions are simple and basic questions that represent likeness to the real Microsoft SC-100 exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium Microsoft Cybersecurity Architect Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

Microsoft SC-100 Sample Questions:

01. A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications. The customer discovers that several endpoints are infected with malware. The customer suspends access attempts from the infected endpoints. The malware is removed from the end point.
Which two conditions must be met before endpoint users can access the corporate applications again?
Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
a) Microsoft Defender for Endpoint reports the endpoints as compliant.
b) Microsoft Intune reports the endpoints as compliant.
c) A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.
d) The client access tokens are refreshed.
 
02. You have an Azure subscription that is used as an Azure landing zone for an application. You need to evaluate the security posture of all the workloads in the landing zone. What should you do first?
a) Enable the Defender plan for all resource types in Microsoft Defender for Cloud.
b) Configure Continuous Integration/Continuous Deployment (CI/CD) vulnerability scanning.
c) Obtain Azure Active Directory Premium Plan 2 licenses.
d) Add Microsoft Sentinel data connectors
 
03. To meet the application security requirements, which two authentication methods must the applications support?
Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
a) Security Assertion Markup Language (SAML)
b) certificate-based authentication
c) NTLMv2
d) Kerberos
 
04. You are designing the security standards for a new Azure environment. You need to design a privileged identity strategy based on the Zero Trust model. Which framework should you follow to create the design?
a) Microsoft Security Development Lifecycle (SDL)
b) Enhanced Security Admin Environment (ESAE)
c) Rapid Modernization Plan (RaMP)
d) Microsoft Operational Security Assurance (OSA)
 
05. You are creating an application lifecycle management process based on the Microsoft Security Development Lifecycle (SDL). You need to recommend a security standard for onboarding applications to Azure. The standard will include recommendations for application design, development, and deployment.
What should you include during the application design phase?
a) software decomposition by using Microsoft Visual Studio Enterprise
b) threat modeling by using the Microsoft Threat Modeling Tool
c) dynamic application security testing (DAST) by using Veracode
d) static application security testing (SAST) by using SonarQube
 
06. You have a Microsoft 365 E5 subscription. You are designing a solution to protect confidential data in Microsoft SharePoint Online sites that contain more than one million documents. You need to recommend a solution to prevent Personally Identifiable Information (Pll) from being shared.
Which two components should you include in the recommendation?
Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
a) data loss prevention (DLP) policies
b) sensitivity label policies
c) retention label policies
d) eDiscovery cases
 
07. You have an Azure subscription that contains several storage accounts. The storage accounts are accessed by legacy applications that are authenticated by using access keys. You need to recommend a solution to prevent new applications from obtaining the access keys of the storage accounts.
The solution must minimize the impact on the legacy applications. 
What should you include in the recommendation?
a) Apply read-only locks on the storage accounts.
b) Set the AllowBlobPublicAcccss property to false.
c) Configure automated key rotation.
d) Set the AllowSharcdKeyAccess property to false.
 
08. You have a Microsoft 365 E5 subscription. You need to recommend a solution to add a watermark to email attachments that contain sensitive data. What should you include in the recommendation?
a) insider risk management
b) Microsoft Defender for Cloud Apps
c) Microsoft Information Protection
d) Azure Purview
 
09. You have an Azure subscription that has Microsoft Defender for Cloud enabled. Suspicious authentication activity alerts have been appearing in the Workload protections dashboard. You need to recommend a solution to evaluate and remediate the alerts by using workflow automation. The solution must minimize development effort.
What should you include in the recommendation?
a) Azure Logics Apps
b) Azure Event Hubs
c) Azure Functions apps
d) Azure Monitor webhooks
 
10. You have a customer that has a Microsoft 365 subscription and an Azure subscription. The customer has devices that run either Windows, iOS, Android, or macOS. The Windows devices are deployed on-premises and in Azure.
You need to design a security solution to assess whether all the devices meet the customer's compliance rules. What should you include in the solution?
a) Microsoft Information Protection
b) Microsoft Defender for Endpoint
c) Microsoft Sentinel
d) Microsoft Endpoint Manager

Answers:

Question: 01
Answer: b, d
Question: 02
Answer: a
Question: 03
Answer: a, b
Question: 04
Answer: c
Question: 05
Answer: b
Question: 06
Answer: a, d
Question: 07
Answer: a
Question: 08
Answer: c
Question: 09
Answer: a
Question: 10
Answer: d

Note: For any error in Microsoft Cybersecurity Architect (SC-100) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 4.8 / 5 (95 votes)