DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Unlock Success with Microsoft SC-100 Pracatice Questions, Microsoft Cybersecurity Architect | SPOTO

Looking to ace your Exam SC-100 for Microsoft Cybersecurity Architect certification? Look no further! Our practice tests page, titled "Pass Your Exams with Comprehensive SC-100 Exam Questions & Answers, Microsoft Cybersecurity Architect | SPOTO," offers an array of resources to help you succeed. Access free test materials including online exam questions, sample questions, and exam dumps. Our latest practice tests are designed to simulate the real exam experience, providing invaluable practice and boosting your confidence. With our exam questions and answers, mock exams, and exam materials, you'll be well-prepared to tackle the certification exam. Don't leave your success to chance—trust SPOTO to guide you through your exam practice journey and ensure you're fully equipped to excel in your cybersecurity career.

Take other online exams

Question #1
You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements. Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.
A. Azure AD Conditional Access
B. Microsoft Defender for Cloud Apps
C. Microsoft Defender for Cloud
D. Microsoft Defender for Endpoint
E. access reviews in Azure AD
View answer
Correct Answer: A
Question #2
You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements. What should you include in the recommendation?
A. Transparent Data Encryption (TDE)
B. Always Encrypted
C. row-level security (RLS)
D. dynamic data masking
E. data classification
View answer
Correct Answer: B
Question #3
Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?
A. dataflow
B. system flow
C. process flow
D. network flow
View answer
Correct Answer: A
Question #4
You are evaluating an Azure environment for compliance. You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources. Which effect should you use in Azure Policy?
A. Deny
B. Disabled
C. Modify
D. Append
View answer
Correct Answer: C
Question #5
Your on-premises network contains an e-commerce web app that was developed in Angular and Nodejs. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone. You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model. Solution: You recommend creating private endpoints for the web app and the database layer. Does
A. Yes
B. No
View answer
Correct Answer: C
Question #6
You have Windows 11 devices and Microsoft 365 E5 licenses. You need to recommend a solution to prevent users from accessing websites that contain adult content such as gambling sites. What should you include in the recommendation?
A. Microsoft Endpoint Manager
B. Compliance Manager
C. Microsoft Defender for Cloud Apps
D. Microsoft Defender for Endpoint
View answer
Correct Answer: BDE
Question #7
Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel. You plan to integrate Microsoft Sentinel with Splunk. You need to recommend a solution to send security events from Microsoft Sentinel to Splunk. What should you include in the recommendation?
A. Azure Event Hubs
B. Azure Data Factor
C. a Microsoft Sentinel workbook
D. a Microsoft Sentinel data connector
View answer
Correct Answer: A
Question #8
Your company is migrating data to Azure. The data contains Personally Identifiable Information (Pll). The company plans to use Microsoft Information Protection for the Pll data store in Azure. You need to recommend a solution to discover Pll data at risk in the Azure resources. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
A. Mastered
B. Not Mastered
View answer
Correct Answer: AB
Question #9
You are designing the security standards for containerized applications onboarded to Azure. You are evaluating the use of Microsoft Defender for Containers. In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. Linux containers deployed to Azure Container Registry
B. Linux containers deployed to Azure Kubernetes Service (AKS)
C. Windows containers deployed to Azure Container Registry
D. Windows containers deployed to Azure Kubernetes Service (AKS)
E. Linux containers deployed to Azure Container Instances
View answer
Correct Answer: BE
Question #10
You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation? (Choose Two)
A. Onboard the virtual machines to Microsoft Defender for Endpoint
B. Onboard the virtual machines to Azure Arc
C. Create a device compliance policy in Microsoft Endpoint Manager
D. Enable the Qualys scanner in Defender for Cloud
View answer
Correct Answer: AD
Question #11
You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation?
A. Onboard the virtual machines to Microsoft Defender for Endpoint
B. Onboard the virtual machines to Azure Arc
C. Create a device compliance policy in Microsoft Endpoint Manager
D. Enable the Qualys scanner in Defender for Cloud
View answer
Correct Answer: A
Question #12
Your company is developing a serverless application in Azure that will have the architecture shown in the following exhibit. You need to recommend a solution to isolate the compute components on an Azure virtual network. What should you include in the recommendation?
A. Azure Active Directory (Azure AD) enterprise applications
B. an Azure App Service Environment (ASE)
C. Azure service endpoints
D. an Azure Active Directory (Azure AD) application proxy
View answer
Correct Answer: C
Question #13
Your company has a Microsoft 365 E5 subscription. The company plans to deploy 45 mobile self-service kiosks that will run Windows 10. You need to provide recommendations to secure the kiosks. The solution must meet the following requirements: ? Ensure that only authorized applications can run on the kiosks. ? Regularly harden the kiosks against new threats. Which two actions should you include in the recommendations? Each correct answer presents part of the solution. NOTE: Each correct selection is worth on
A. Onboard the kiosks to Azure Monitor
B. Implement Privileged Access Workstation (PAW) for the kiosks
C. Implement Automated Investigation and Remediation (AIR) in Microsoft Defender for Endpoint
D. Implement threat and vulnerability management in Microsoft Defender for Endpoint
E. Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint
View answer
Correct Answer: A
Question #14
What should you create in Azure AD to meet the Contoso developer requirements?
A. Mastered
B. Not Mastered
View answer
Correct Answer: A
Question #15
Your company finalizes the adoption of Azure and is implementing Microsoft Defender for Cloud. You receive the following recommendations in Defender for Cloud ? Access to storage accounts with firewall and virtual network configurations should be restricted, ? Storage accounts should restrict network access using virtual network rules. ? Storage account should use a private link connection. ? Storage account public access should be disallowed. You need to recommend a service to mitigate identified risks tha
A. Azure Storage Analytics
B. Azure Network Watcher
C. Microsoft Sentinel
D. Azure Policy
View answer
Correct Answer: BD
Question #16
Your company has devices that run either Windows 10, Windows 11, or Windows Server. You are in the process of improving the security posture of the devices. You plan to use security baselines from the Microsoft Security Compliance Toolkit. What should you recommend using to compare the baselines to the current device configurations?
A. Microsoft Intune
B. Policy Analyzer
C. Local Group Policy Object (LGPO)
D. Windows Autopilot
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: