Free SC-100 Exam Braindumps (page: 9)

Page 8 of 66

You have the following on-premises servers that run Windows Server:
• Two domain controllers in an Active Directory Domain Services (AD DS) domain
• Two application servers named Server1 and Server2 that run ASP.NET web apps
• A VPN server named Served that authenticates by using RADIUS and AD DS
End users use a VPN to access the web apps over the internet.
You need to redesign a user access solution to increase the security of the connections to the web apps. The solution must minimize the attack surface and follow the Zero Trust principles of the Microsoft Cybersecurity Reference Architectures (MCRA).
What should you include in the recommendation?

  1. Publish the web apps by using Azure AD Application Proxy.
  2. Configure the VPN to use Azure AD authentication.
  3. Configure connectors and rules in Microsoft Defender for Cloud Apps.
  4. Configure web protection in Microsoft Defender for Endpoint.

Answer(s): A



HOTSPOT (Drag and Drop is not supported)
You have a Microsoft 365 E5 subscription that uses Microsoft Purview, SharePoint Online, and OneDrive for Business.
You need to recommend a ransomware protection solution that meets the following requirements:
• Mitigates attacks that make copies of files, encrypt the copies, and then delete the original files
• Mitigates attacks that encrypt files in place
• Minimizes administrative effort
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



You are designing a security operations strategy based on the Zero Trust framework.
You need to minimize the operational load on Tier 1 Microsoft Security Operations Center (SOC) analysts.
What should you do?

  1. Enable built-in compliance policies in Azure Policy.
  2. Enable self-healing in Microsoft 365 Defender.
  3. Automate data classification.
  4. Create hunting queries in Microsoft 365 Defender.

Answer(s): B



DRAG DROP (Drag and Drop is not supported)
You are designing a security operations strategy based on the Zero Trust framework.
You need to increase the operational efficiency of the Microsoft Security Operations Center (SOC).
Based on the Zero Trust framework, which three deployment objectives should you prioritize in sequence? To answer move the appropriate objectives from the list of objectives to the answer area and arrange them in the correct order.

  1. See Explanation section for answer.

Answer(s): A

Explanation:






Post your Comments and Discuss Microsoft SC-100 exam with other Community members:

Exam Discussions & Posts