DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Success Secrets: Microsoft SC-100 Exam Questions & Mock Tests, Microsoft Cybersecurity Architect | SPOTO

Dive into a wealth of resources tailored to help you conquer Exam SC-100 and emerge as a certified Microsoft Cybersecurity Architect. Access free test materials including online exam questions, sample questions, and exam dumps, meticulously designed to enhance your exam practice. Elevate your preparation with our comprehensive exam questions and answers, coupled with mock exams and exam materials, ensuring you're equipped to tackle every challenge. Stay ahead of the curve with our latest practice tests, finely tuned to mirror the real exam experience. As a Microsoft cybersecurity architect, mastering the art of translating cybersecurity strategies into protective capabilities is paramount. Let SPOTO be your guide, providing the tools and support needed to excel in your exam practice and beyond.
Take other online exams

Question #1
A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications. The customer discovers that several endpoints are infected with malware. The customer suspends access attempts from the infected endpoints. The malware is removed from the end point. Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Microsoft Defender for Endpoint reports the endpoints as compliant
B. Microsoft Intune reports the endpoints as compliant
C. A new Azure Active Directory (Azure AD) Conditional Access policy is enforced
D. The client access tokens are refreshed
View answer
Correct Answer: A
Question #2
You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance. Solution: You recommend access restrictions to allow traffic from the backend IP address of the Front Door instance. Does this meet the goal?
A. Yes
B. No
View answer
Correct Answer: D
Question #3
You have an Azure subscription that has Microsoft Defender for Cloud enabled. You need to enforce ISO 2700V2013 standards for the subscription. The solution must ensure that noncompliant resources are remediated automatically What should you use?
A. the regulatory compliance dashboard in Defender for Cloud
B. Azure Policy
C. Azure Blueprints
D. Azure role-based access control (Azure RBAC)
View answer
Correct Answer: AB
Question #4
Your on-premises network contains an e-commerce web app that was developed in Angular and Node.js. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone. You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model. Solution: You recommend implementing Azure Front Door with Azure Web Application Firewall (WAF)
A. Yes
B. No
View answer
Correct Answer: C
Question #5
Your company has a Microsoft 365 E5 subscription. Users use Microsoft Teams, Exchange Online, SharePoint Online, and OneDrive for sharing and collaborating. The company identifies protected health information (PHI) within stored documents and communications. What should you recommend using to prevent the PHI from being shared outside the company?
A. insider risk management policies
B. data loss prevention (DLP) policies
C. sensitivity label policies
D. retention policies
View answer
Correct Answer: B
Question #6
You have a Microsoft 365 E5 subscription. You are designing a solution to protect confidential data in Microsoft SharePoint Online sites that contain more than one million documents. You need to recommend a solution to prevent Personally Identifiable Information (Pll) from being shared. Which two components should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. data loss prevention (DLP) policies
B. sensitivity label policies
C. retention label policies
D. eDiscovery cases
View answer
Correct Answer: B
Question #7
You have a Microsoft 365 subscription You need to recommend a security solution to monitor the following activities: ? User accounts that were potentially compromised ? Users performing bulk file downloads from Microsoft SharePoint Online What should you include in the recommendation for each activity? To answer, drag the appropriate components to the correct activities. Each component may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content
A. Mastered
B. Not Mastered
View answer
Correct Answer: B
Question #8
A customer is deploying Docker images to 10 Azure Kubernetes Service (AKS) resources across four Azure subscriptions. You are evaluating the security posture of the customer. You discover that the AKS resources are excluded from the secure score recommendations. You need to produce accurate recommendations and update the secure score. Which two actions should you recommend in Microsoft Defender for Cloud? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Configure auto provisioning
B. Assign regulatory compliance policies
C. Review the inventory
D. Add a workflow automation
E. Enable Defender plans
View answer
Correct Answer: CD
Question #9
You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements. What should you configure for each landing zone?
A. Azure DDoS Protection Standard
B. an Azure Private DNS zone
C. Microsoft Defender for Cloud
D. an ExpressRoute gateway
View answer
Correct Answer: A
Question #10
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have an Azure subscription that has Microsoft Defender for Cloud enabled.
A. Yes
B. No
View answer
Correct Answer: A
Question #11
You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Enable Microsoft Defender for Cosmos DB
B. Send the Azure Active Directory (Azure AD) sign-in logs to a Log Analytics workspace
C. Disable local authentication for Azure Cosmos DB
D. Enable Microsoft Defender for Identity
E. Send the Azure Cosmos DB logs to a Log Analytics workspace
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: