This page was exported from Free Exams Dumps Materials [ http://exams.dumpsmaterials.com ] Export date:Fri Jan 3 5:04:35 2025 / +0000 GMT ___________________________________________________ Title: [Q82-Q99] Latest Microsoft SC-100 First Attempt, Exam real Dumps Updated [Dec-2023] --------------------------------------------------- Latest Microsoft SC-100 First Attempt, Exam real Dumps Updated [Dec-2023] Get the superior quality SC-100 Dumps Questions from DumpsMaterials. Nobody can stop you from getting to your dreams now. Your bright future is just a click away! Q82. You need to design a solution to provide administrators with secure remote access to the virtual machines. The solution must meet the following requirements:* Prevent the need to enable ports 3389 and 22 from the internet.* Only provide permission to connect the virtual machines when required.* Ensure that administrators use the Azure portal to connect to the virtual machines.Which two actions should you include in the solution? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.  Enable Azure Active Directory (Azure AD) Privileged Identity Management (PIM) roles as virtual machine contributors.  Configure Azure VPN Gateway.  Enable Just Enough Administration (JEA).  Enable just-in-time (JIT) VM access.  Configure Azure Bastion. Topic 1, Litware, inc.Existing EnvironmentLitware has an Azure Active Directory (Azure AD) tenant that syncs with an Active Directory Domain Services (AD D%) forest named Utvvare.com and is linked to 20 Azure subscriptions. Azure AD Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.The environment also includes several AD DS forests, Azure AD tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of Litware.Planned ChangesLitware plans to implement the following changes:* Create a management group hierarchy for each Azure AD tenant.* Design a landing zone strategy to refactor the existing Azure environment of Litware and deploy all future Azure workloads.* Implement Azure AD Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.Business RequirementsLitware identifies the following business requirements:* Minimize any additional on-premises infrastructure.* Minimize the operational costs associated with administrative overhead.Hybrid RequirementsLitware identifies the following hybrid cloud requirements:* Enable the management of on-premises resources from Azure, including the following:* Use Azure Policy for enforcement and compliance evaluation.* Provide change tracking and asset inventory.* Implement patch management.* Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.Microsoft Sentinel RequirementsLitware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAK) capabilities of Microsoft Sentinel. The company wants to centralize Security Operations Center (SOQ by using Microsoft Sentinel.Identity RequirementsLitware identifies the following identity requirements:* Detect brute force attacks that directly target AD DS user accounts.* Implement leaked credential detection in the Azure AD tenant of Litware.* Prevent AD DS user accounts from being locked out by brute force attacks that target Azure AD user accounts.* Implement delegated management of users and groups in the Azure AD tenant of Litware, including support for.* The management of group properties, membership, and licensing* The management of user properties, passwords, and licensing* The delegation of user management based on business units.Regulatory Compliance RequirementsLitware identifies the following regulatory compliance requirements:* insure data residency compliance when collecting logs, telemetry, and data owned by each United States- and France-based subsidiary.* Leverage built-in Azure Policy definitions to evaluate regulatory compliance across the entire managed environment.* Use the principle of least privilege.Azure Landing Zone RequirementsLitware identifies the following landing zone requirements:* Route all internet-bound traffic from landing zones through Azure Firewall in a dedicated Azure subscription.* Provide a secure score scoped to the landing zone.* Ensure that the Azure virtual machines in each landing zone communicate with Azure App Service web apps in the same zone over the Microsoft backbone network, rather than over public endpoints.* Minimize the possibility of data exfiltration.* Maximize network bandwidth.The landing zone architecture will include the dedicated subscription, which will serve as the hub for internet and hybrid connectivity. Each landing zone will have the following characteristics:* Be created in a dedicated subscription.* Use a DNS namespace of litware.com.Application Security RequirementsLitware identifies the following application security requirements:* Identify internal applications that will support single sign-on (SSO) by using Azure AD Application Proxy.* Monitor and control access to Microsoft SharePoint Online and Exchange Online data in real time.Q83. Your company has an Azure App Service plan that is used to deploy containerized web apps. You are designing a secure DevOps strategy for deploying the web apps to the App Service plan. You need to recommend a strategy to integrate code scanning tools into a secure software development lifecycle. The code must be scanned during the following two phases:Uploading the code to repositories Building containersWhere should you integrate code scanning for each phase? To answer, select the appropriate options in the answer area. Q84. You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.The Azure subscription contains a Microsoft Sentinel workspace. Microsoft Sentinel data connectors are configured for Microsoft 365, Microsoft 365 Defender, Defender for Cloud, and Azure.You plan to deploy Azure virtual machines that will run Windows Server.You need to enable extended detection and response (EDR) and security orchestration, automation, and response (SOAR) capabilities for Microsoft Sentinel.How should you recommend enabling each capability? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Q85. Your company has a Microsoft 365 E5 subscription, an Azure subscription, on-premises applications, and Active Directory Domain Services (AD DSV You need to recommend an identity security strategy that meets the following requirements:* Ensures that customers can use their Facebook credentials to authenticate to an Azure App Service website* Ensures that partner companies can access Microsoft SharePoint Online sites for the project to which they are assigned The solution must minimize the need to deploy additional infrastructure components. What should you include in the recommendation? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Q86. You have Microsoft Defender for Cloud assigned to Azure management groups.You have a Microsoft Sentinel deployment.During the triage of alerts, you require additional information about the security events, including suggestions for remediation. Which two components can you use to achieve the goal? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.  workload protections in Defender for Cloud  threat intelligence reports in Defender for Cloud  Microsoft Sentinel notebooks  Microsoft Sentinel threat intelligence workbooks https://docs.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction https://docs.microsoft.com/en-us/azure/defender-for-cloud/threat-intelligence-reports https://docs.microsoft.com/en-us/azure/sentinel/notebooksQ87. You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements.What should you recommend? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Q88. You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements.What should you recommend? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Q89. Your company has an office in Seattle.The company has two Azure virtual machine scale sets hosted on different virtual networks.The company plans to contract developers in India.You need to recommend a solution provide the developers with the ability to connect to the virtual machines over SSL from the Azure portal. The solution must meet the following requirements:* Prevent exposing the public IP addresses of the virtual machines.* Provide the ability to connect without using a VPN.* Minimize costs.Which two actions should you perform? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.  Deploy Azure Bastion to one virtual network.  Deploy Azure Bastion to each virtual network.  Enable just-in-time VM access on the virtual machines.  Create a hub and spoke network by using virtual network peering.  Create NAT rules and network rules in Azure Firewall. Q90. Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.The company signs a contract with the United States government. You need to review the current subscription for NIST 800-53 compliance. What should you do first?  From Defender for Cloud, review the Azure security baseline for audit report.  From Defender for Cloud, review the secure score recommendations.  From Azure Policy, assign a built-in initiative that has a scope of the subscription.  From Defender for Cloud, enable Defender for Cloud plans. Explanationhttps://docs.microsoft.com/en-us/azure/defender-for-cloud/update-regulatory-compliance-packages#what-regulatQ91. You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements.What should you recommend? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Q92. Your company is moving all on-premises workloads to Azure and Microsoft 365. You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following requirements:* Minimizes manual intervention by security operation analysts* Supports Waging alerts within Microsoft Teams channelsWhat should you include in the strategy?  data connectors  playbooks  workbooks  KQL https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook?tabs=LACQ93. Your on-premises network contains an e-commerce web app that was developed in Angular and Nodejs. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model.Solution: You recommend creating private endpoints for the web app and the database layer.Does this meet the goal?  Yes  No Q94. Your company has on-premises Microsoft SQL Server databases.The company plans to move the databases to Azure.You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive data by using dynamic data masking. The solution must minimize costs.What should you include in the recommendation?  Azure SQL Managed Instance  Azure Synapse Analytics dedicated SQL pools  Azure SQL Database  SQL Server on Azure Virtual Machines Q95. Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You have an Azure subscription that has Microsoft Defender for Cloud enabled.You are evaluating the Azure Security Benchmark V3 report.In the Secure management ports controls, you discover that you have 0 out of a potential 8 points.You need to recommend configurations to increase the score of the Secure management ports controls.Solution: You recommend enabling the VMAccess extension on all virtual machines.Does this meet the goal?  Yes  No https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-privileged-access#pa-2-avoid-standing-access-for-user-accounts-and-permissions Adaptive Network Hardening: https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-network-security#ns-7-simplify-network-security-configurationQ96. You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements.What should you recommend? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. Q97. You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point. Q98. Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk.You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. What should you include in the recommendation?  Azure Event Hubs  Azure Data Factor  a Microsoft Sentinel workbook  a Microsoft Sentinel data connector Explanationhttps://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/azure-sentinel-side-by-side-with-splunk-via-eveQ99. You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers.In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.  Linux containers deployed to Azure Container Registry  Linux containers deployed to Azure Kubernetes Service (AKS)  Windows containers deployed to Azure Container Registry  Windows containers deployed to Azure Kubernetes Service (AKS)  Linux containers deployed to Azure Container Instances https://docs.microsoft.com/en-us/learn/modules/design-strategy-for-secure-paas-iaas-saas-services/9-specify-security-requirements-for-containershttps://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-containers-introduction#view-vulnerabilities-for-running-images Loading … Guaranteed Success with Valid Microsoft SC-100 Dumps: https://www.dumpsmaterials.com/SC-100-real-torrent.html --------------------------------------------------- Images: https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif https://exams.dumpsmaterials.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-12-24 12:32:10 Post date GMT: 2023-12-24 12:32:10 Post modified date: 2023-12-24 12:32:10 Post modified date GMT: 2023-12-24 12:32:10