Free Microsoft SC-100 Exam Questions

Become Microsoft Certified with updated SC-100 exam questions and correct answers

Page:    1 / 50      
Total 250 Questions | Updated On: May 18, 2022
Add To Cart
Question 1

A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and anAzure subscription.All the on-premises servers in the perimeter network are prevented from connecting directly to theinternet.The customer recently recovered from a ransomware attack.The customer plans to deploy Microsoft Sentinel.You need to recommend configurations to meet the following requirements:Ensure that the security operations team can access the security logs and the operation logs.Ensure that the IT operations team can access only the operations logs, including the event logs ofthe servers in the perimeter network.Which two configurations can you include in the recommendation? Each correct answer presents acomplete solution. NOTE: Each correct selection is worth one point. 


Answer: B,C
Question 2

A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and anAzure subscription.All the on-premises servers in the perimeter network are prevented from connecting directly to theinternet.The customer recently recovered from a ransomware attack.The customer plans to deploy Microsoft Sentinel.You need to recommend configurations to meet the following requirements:Ensure that the security operations team can access the security logs and the operation logs.Ensure that the IT operations team can access only the operations logs, including the event logs ofthe servers in the perimeter network.Which two configurations can you include in the recommendation? Each correct answer presents acomplete solution. NOTE: Each correct selection is worth one point. 


Answer: B,C
Question 3

A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and anAzure subscription.All the on-premises servers in the perimeter network are prevented from connecting directly to theinternet.The customer recently recovered from a ransomware attack.The customer plans to deploy Microsoft Sentinel.You need to recommend configurations to meet the following requirements:Ensure that the security operations team can access the security logs and the operation logs.Ensure that the IT operations team can access only the operations logs, including the event logs ofthe servers in the perimeter network.Which two configurations can you include in the recommendation? Each correct answer presents acomplete solution. NOTE: Each correct selection is worth one point. 


Answer: B,C
Question 4

Your company has a main office and 10 branch offices. Each branch office contains an on-premisesfile server that runs Windows Server and multiple devices that run either Windows 11 or macOS. Thedevices are enrolled in Microsoft Intune.You have a Microsoft Entra tenant.You need to deploy Global Secure Access to implement web filtering for device traffic to the internetThe solution must ensure that all the web traffic from the devices in the branch offices is controlledby using Global Secure Access.What should you do first in each branch office?


Answer: B
Question 5

Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security Best Practices.

You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART) approach in Microsoft Security Best Practices.

What should you include in the response plan?


Answer: D
Page:    1 / 50      
Total 250 Questions | Updated On: May 18, 2022
Add To Cart

© Copyrights DumpsCertify 2026. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.