Microsoft SC-100 Exam Real Questions

Prepare and pass your Microsoft Cybersecurity Architect with free SC-100 exam questions.

Page:    1 / 37      
Total 185 Questions | Updated On: Oct 16, 2024
Add To Cart
Question 1

You have a Microsoft 365 E5 subscription.

You need to recommend a solution to add a watermark to email attachments that contain sensitive data.

What should you include in the recommendation?


Answer: A
Question 2

You are designing the security standards for containerized applications onboarded to Azure.

You are evaluating the use of Microsoft Defender for Containers.

In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.


Answer: C,D
Question 3

Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security Best Practices.

You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART) approach in Microsoft Security Best Practices.

What should you include in the response plan?


Answer: D
Question 4

Your company has a Microsoft 365 ES subscription.

The Chief Compliance Officer plans to enhance privacy management in the working environment.

You need to recommend a solution to enhance the privacy management. The solution must meet the following requirements:

✑ Identify unused personal data and empower users to make smart data handling decisions.

✑ Provide users with notifications and guidance when a user sends personal data in Microsoft Teams.

✑ Provide users with recommendations to mitigate privacy risks.

What should you include in the recommendation?


Answer: C
Question 5

You have a Microsoft 365 tenant.

Your company uses a third-party software as a service (SaaS) app named App1 that is integrated with an Azure AD tenant.

You need to design a security strategy to meet the following requirements:

• Users must be able to request access to App1 by using a self-service request.

• When users request access to App1, they must be prompted to provide additional information about their request.

• Every three months, managers must verify that the users still require access to App1.

What should you include in the design?


Answer: A
Page:    1 / 37      
Total 185 Questions | Updated On: Oct 16, 2024
Add To Cart

© Copyrights DumpsCertify 2024. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.