Become Microsoft Certified with updated SC-100 exam questions and correct answers
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
Which security control should you recommend?
Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create?
You are planning the security requirements for Azure Cosmos DB Core (SQL) API accounts. You need to recommend a solution to audit all users that access the data in the Azure Cosmos DB accounts. Which two configurations should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Your company has a main office and 10 branch offices. Each branch office contains an on-premisesfile server that runs Windows Server and multiple devices that run either Windows 11 or macOS. Thedevices are enrolled in Microsoft Intune.You have a Microsoft Entra tenant.You need to deploy Global Secure Access to implement web filtering for device traffic to the internetThe solution must ensure that all the web traffic from the devices in the branch offices is controlledby using Global Secure Access.What should you do first in each branch office?
Your company has the virtual machine infrastructure shown in the following table.
The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines toAzure.You need to provide recommendations to increase the resiliency of the backup strategy to mitigateattacks such as ransomware.What should you include in the recommendation?
© Copyrights DumpsCertify 2026. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.