Free Microsoft SC-100 Exam Questions

Become Microsoft Certified with updated SC-100 exam questions and correct answers

Page:    1 / 50      
Total 250 Questions | Updated On: Feb 05, 2026
Add To Cart
Question 1

Your company has the virtual machine infrastructure shown in the following table.The company plans to use Microsoft Azure Backup Server (MABS) to back up the virtual machines toAzure.You need to provide recommendations to increase the resiliency of the backup strategy to mitigateattacks such as ransomware.What should you include in the recommendation?  


Answer: C
Question 2

Your company has a hybrid cloud infrastructure.The company plans to hire several temporary employees within a brief period. The temporaryemployees will need to access applications and data on the company' premises network.The company's security policy prevents the use of personal devices for accessing company data andapplications.You need to recommend a solution to provide the temporary employee with access to companyresources. The solution must be able to scale on demand.What should you include in the recommendation? 


Answer: D
Question 3

You are designing the encryption standards for data at rest for an Azure resourceYou need to provide recommendations to ensure that the data at rest is encrypted by using AES-256keys. The solution must support rotating the encryption keys monthly.Solution: For Azure SQL databases, you recommend Transparent Data Encryption (TDE) that uses customer-managed keys (CMKs).Does this meet the goal? 


Answer: B
Question 4

You are designing the security standards for containerized applications onboarded to Azure.

You are evaluating the use of Microsoft Defender for Containers.

In which two environments can you use Defender for Containers to scan for known vulnerabilities? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.


Answer: C,D
Question 5

Your company is developing a modern application that will run as an Azure App Service web app. You plan to perform threat modeling to identify potential security issues by using the Microsoft Threat Modeling Tool. Which type of diagram should you create? 


Answer: A
Page:    1 / 50      
Total 250 Questions | Updated On: Feb 05, 2026
Add To Cart

© Copyrights DumpsCertify 2026. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.