Free Microsoft SC-100 Exam Braindumps (page: 11)

HOTSPOT (Drag and Drop is not supported)
You have a Microsoft 365 E5 subscription that uses Microsoft Purview, SharePoint Online, and OneDrive for Business.
You need to recommend a ransomware protection solution that meets the following requirements:
Mitigates attacks that make copies of files, encrypt the copies, and then delete the original files Mitigates attacks that encrypt files in place
Minimizes administrative effort
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box 1: Data loss prevention (DLP) policies
Mitigates attacks that make copies of files, encrypt the copies, and then delete the original files Minimizes administrative effort
Protective actions of DLP policies
DLP policies are how you monitor the activities that users take on sensitive items at rest, sensitive items in transit, or sensitive items in use and take protective actions. For example, when a user attempts to take a prohibited action, like copying a sensitive item to an unapproved location or sharing medical information in an email or other conditions laid out in a policy, DLP can:
show a pop-up policy tip to the user that warns them that they may be trying to share a sensitive item inappropriately
block the sharing and, via a policy tip, allow the user to override the block and capture the users' justification block the sharing without the override option
for data at rest, sensitive items can be locked and moved to a secure quarantine location for Teams chat, the sensitive information won't be displayed
Box 2: Versioning
Mitigates attacks that encrypt files in place Minimizes administrative effort
Ransomware
There are many forms of ransomware attacks, but one of the most common forms is where a malicious individual encrypts a user's important files and then demands something from the user, such as money or information, in exchange for the key to decrypt them. Ransomware attacks are on the rise, particularly those
that encrypt files that are stored in the user's cloud storage
Versioning helps to protect SharePoint Online lists and SharePoint Online and OneDrive for Business libraries from some, but not all, of these types of ransomware attacks. Versioning is enabled by default in OneDrive for Business and SharePoint Online. Since versioning is enabled in SharePoint Online site lists, you can look at earlier versions and recover them, if necessary. That enables you to recover versions of items that pre-date their encryption by the ransomware. Some organizations also retain multiple versions of items in their lists for legal reasons or audit purposes.


Reference:

https://learn.microsoft.com/en-us/purview/dlp-learn-about-dlp
https://learn.microsoft.com/en-us/compliance/assurance/assurance-malware-and-ransomware-protection



You are designing a security operations strategy based on the Zero Trust framework.
You need to minimize the operational load on Tier 1 Microsoft Security Operations Center (SOC) analysts. What should you do?

  1. Enable built-in compliance policies in Azure Policy.
  2. Enable self-healing in Microsoft Defender XDR.
  3. Automate data classification.
    Create hunting queries in Microsoft Defender XDR.

Answer(s): B



DRAG DROP (Drag and Drop is not supported)
You are designing a security operations strategy based on the Zero Trust framework.
You need to increase the operational efficiency of the Microsoft Security Operations Center (SOC).
Based on the Zero Trust framework, which three deployment objectives should you prioritize in sequence? To answer move the appropriate objectives from the list of objectives to the answer area and arrange them in the correct order.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Step 1: Establish visibility
Visibility, automation, and orchestration Zero Trust deployment objectives
When implementing an end-to-end Zero Trust framework for visibility, automation, and orchestration, we recommend you focus first on these initial deployment objectives:
Establish visibility.
The first step is to establish visibility by enabling Microsoft Threat Protection (MTP).
Step 2: Enable automation
Enable automation.
After these are completed, focus on these additional deployment objectives: Step 3: Enable additional protection and detection controls
Enable additional protection and detection controls.
Incorrect:
* Establish ransomware recovery readiness
* Implement disaster recovery


Reference:

https://learn.microsoft.com/en-us/security/zero-trust/deploy/visibility-automation-orchestration



HOTSPOT (Drag and Drop is not supported)
You have an Azure subscription that contains multiple apps. The apps are managed by using continuous integration and continuous deployment (CI/CD) pipelines in Azure DevOps.
You need to recommend DevSecOps controls for the Commit the code and the Build and test CI/CD process stages based on the Microsoft Cloud Adoption Framework for Azure.
Which testing method should you recommend for each stage? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box 1: Static application security testing (SAST) Commit the code


Box 2: Dynamic application security testing (DAST) Build and test


Reference:

https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/secure/devsecops-controls



Viewing page 11 of 70
Viewing questions 41 - 44 out of 303 questions



Post your Comments and Discuss Microsoft SC-100 exam prep with other Community members:

SC-100 Exam Discussions & Posts