Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

SC-100Free trialFree trial

By microsoft
Aug, 2025

Verified

25Q per page

Question 26

DRAG DROP

You are designing a security operations strategy based on the Zero Trust framework.

You need to increase the operational efficiency of the Microsoft Security Operations Center (SOC).

Based on the Zero Trust framework, which three deployment objectives should you prioritize in sequence? To answer move the appropriate objectives from the list of objectives to the answer area and arrange them in the correct order.

Image 1

Question 27

HOTSPOT

You have an Azure subscription that contains multiple apps. The apps are managed by using continuous integration and continuous deployment (CCD) pipelines in Azure DevOps.

You need to recommend DevSecOps controls for the Commit the code and the Build and test CI/CD process stages based on the Microsoft Cloud Adoption Framework for Azure.

Which testing method should you recommend for each stage? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Image 1

Question 28

You have a Microsoft Entra tenant that contains 10 Windows 11 devices and two groups named Group1 and Group2. The Windows 11 devices are joined to the Microsoft Entra tenant and are managed by using Microsoft Intune.

You are designing a privileged access strategy based on the rapid modernization plan (RaMP). The strategy will include the following configurations:

• Each user in Group1 will be assigned a Windows 11 device that will be configured as a privileged access device.
• The Security Administrator role will be mapped to the privileged access security level.
• The users in Group1 will be assigned the Security Administrator role.
• The users in Group2 will manage the privileged access devices.

You need to configure the local Administrators group for each privileged access device. The solution must follow the principle of least privilege.

What should you include in the solution?

  • A: Only add Group2 to the local Administrators group.
  • B: Configure Windows Local Administrator Password Solution (Windows LAPS) in legacy Microsoft LAPS emulation mode.
  • C: Add Group2 to the local Administrators group. Add the user that is assigned the Security Administrator role to the local Administrators group of the user's assigned privileged access device.

Question 29

HOTSPOT

Case Study

This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided.

To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other question in this case study.

At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section.

To start the case study

To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question.

Overview

Litware, Inc. is a financial services company that has main offices in New York and San Francisco. Litware has 30 branch offices and remote employees across the United States. The remote employees connect to the main offices by using a VPN.

Litware has grown significantly during the last two years due to mergers and acquisitions. The acquisitions include several companies based in France.

Existing Environment

Litware has a Microsoft Entra tenant that syncs with an Active Directory Domain Services (AD DS) forest named litware.com and is linked to 20 Azure subscriptions. Microsoft Entra Connect is used to implement pass-through authentication. Password hash synchronization is disabled, and password writeback is enabled. All Litware users have Microsoft 365 E5 licenses.

The environment also includes several AD DS forests, Microsoft Entra tenants, and hundreds of Azure subscriptions that belong to the subsidiaries of Litware.

Requirements. Planned Changes

Litware plans to implement the following changes:

• Create a management group hierarchy for each Microsoft Entra tenant.
• Design a landing zone strategy to refactor the existing Azure environment of Litware and deploy all future Azure workloads.
• Implement Microsoft Entra Application Proxy to provide secure access to internal applications that are currently accessed by using the VPN.

Requirements. Business Requirements

Litware identifies the following business requirements:

• Minimize any additional on-premises infrastructure.
• Minimize the operational costs associated with administrative overhead.

Requirements. Hybrid Requirements

Litware identifies the following hybrid cloud requirements:

• Enable the management of on-premises resources from Azure, including the following:
o Use Azure Policy for enforcement and compliance evaluation.
o Provide change tracking and asset inventory.
o Implement patch management.
• Provide centralized, cross-tenant subscription management without the overhead of maintaining guest accounts.

Requirements. Microsoft Sentinel Requirements

Litware plans to leverage the security information and event management (SIEM) and security orchestration automated response (SOAR) capabilities of Microsoft Sentinel. The company wants to centralize Security Operations Center (SOC) by using Microsoft Sentinel.

Requirements. Identity Requirements

Litware identifies the following identity requirements:

• Detect brute force attacks that directly target AD DS user accounts.
• Implement leaked credential detection in the Microsoft Entra tenant of Litware.
• Prevent AD DS user accounts from being locked out by brute force attacks that target Microsoft Entra user accounts.
• Implement delegated management of users and groups in the Microsoft Entra tenant of Litware, including support for:
o The management of group properties, membership, and licensing
o The management of user properties, passwords, and licensing
o The delegation of user management based on business units

Requirements. Regulatory Compliance Requirements

Litware identifies the following regulatory compliance requirements:

• Ensure data residency compliance when collecting logs, telemetry, and data owned by each United States- and France-based subsidiary.
• Leverage built-in Azure Policy definitions to evaluate regulatory compliance across the entire managed environment.
• Use the principle of least privilege.

Requirements. Azure Landing Zone Requirements

Litware identifies the following landing zone requirements:

• Route all internet-bound traffic from landing zones through Azure Firewall in a dedicated Azure subscription.
• Provide a secure score scoped to the landing zone.
• Ensure that the Azure virtual machines in each landing zone communicate with Azure App Service web apps in the same zone over the Microsoft backbone network, rather than over public endpoints.
• Minimize the possibility of data exfiltration.
• Maximize network bandwidth.

The landing zone architecture will include the dedicated subscription, which will serve as the hub for internet and hybrid connectivity. Each landing zone will have the following characteristics:

• Be created in a dedicated subscription.
• Use a DNS namespace of litware.com.

Requirements. Application Security Requirements

Litware identifies the following application security requirements:

• Identify internal applications that will support single sign-on (SSO) by using Microsoft Entra Application Proxy.
• Monitor and control access to Microsoft SharePoint Online and Exchange Online data in real time.

You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Image 1

Question 30

You have an Azure subscription.

You plan to deploy enterprise-scale landing zones based on the Microsoft Cloud Adoption Framework for Azure. The deployment will include a single-platform landing zone for all shared services and three application landing zones that will each host a different Azure application.

You need to recommend which resource to deploy to each landing zone. The solution must meet the Cloud Adoption Framework best-practice recommendations for enterprise-scale landing zones.

What should you recommend?

  • A: an Azure firewall
  • B: an Azure virtual network gateway
  • C: an Azure Private DNS zone
  • D: an Azure key vault

Question 31

HOTSPOT

You have 1,000 on-premises servers that run Windows Server 2022 and 500 on-premises servers that run Linux.

You have an Azure subscription that contains the following resources:

• A Log Analytics workspace
• A Microsoft Defender Cloud Security Posture Management (CSPM) plan

You need to deploy Update Management for the servers.

What should you configure? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Image 1

Question 32

HOTSPOT

You have an Active Directory Domain Services (AD DS) domain that contains a virtual desktop infrastructure (VDI). The VDI uses non-persistent images and cloned virtual machine templates. VDI devices are members of the domain.

You have an Azure subscription that contains an Azure Virtual Desktop environment. The environment contains host pools that use a custom golden image. All the Azure Virtual Desktop deployments are members of a single Microsoft Entra Domain Services domain.

You need to recommend a solution to deploy Microsoft Defender for Endpoint to the hosts. The solution must meet the following requirements:

• Ensure that the hosts are onboarded to Defender for Endpoint during the first startup sequence.
• Ensure that the Microsoft Defender portal contains a single entry for each deployed VDI host.
• Minimize administrative effort.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Image 1

Question 33

You have 10 Azure subscriptions that contain 100 role-based access control (RBAC) role assignments.

You plan to consolidate the role assignments.

You need to recommend a solution to identify which role assignments were NOT used during the last 90 days. The solution must minimize administrative effort.

What should you include in the recommendation?

  • A: Microsoft Defender for Cloud
  • B: Microsoft Entra access reviews
  • C: Microsoft Entra Privileged Identity Management (PIM)
  • D: Microsoft Entra Permissions Management

Question 34

HOTSPOT -
Your company is migrating data to Azure. The data contains Personally Identifiable Information (PII).
The company plans to use Microsoft Information Protection for the PII data store in Azure.
You need to recommend a solution to discover PII data at risk in the Azure resources.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 35

You have a Microsoft Entra tenant that syncs with an Active Directory Domain Services (AD DS) domain.

You have an on-premises datacenter that contains 100 servers. The servers run Windows Server and are backed up by using Microsoft Azure Backup Server (MABS).

You are designing a recovery solution for ransomware attacks. The solution follows Microsoft Security Best Practices.

You need to ensure that a compromised local administrator account cannot be used to stop scheduled backups.

What should you do?

  • A: From Azure Backup, configure multi-user authorization by using Resource Guard.
  • B: From Microsoft Entra Privileged Identity Management (PIM), create a role assignment for the Backup Contributor role.
  • C: From Microsoft Azure Backup Setup, register MABS with a Recovery Services vault.
  • D: From a Recovery Services vault, generate a security PIN for critical operations.

Question 36

HOTSPOT

You have an Azure subscription that contains multiple Azure Storage blobs and Azure Files shares.

You need to recommend a security solution for authorizing access to the blobs and shares. The solution must meet the following requirements:

• Support access to the shares by using the SMB protocol.
• Limit access to the blobs to specific periods of time.
• Include authentication support when possible.

What should you recommend for each resource? To answer, select the options in the answer area.

NOTE: Each correct selection is worth one point.

Image 1

Question 37

DRAG DROP

You need to design a solution to accelerate a Zero Trust security implementation. The solution must be based on the Zero Trust Rapid Modernization Plan (RaMP).

Which three initiatives should you include in the solution, and in which order should you implement the initiatives? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Image 1

Question 38

You have a Microsoft 365 E5 subscription and an Azure subscription.
You are designing a Microsoft deployment.
You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing security events.
What should you recommend using in Microsoft Sentinel?

  • A: notebooks
  • B: playbooks
  • C: workbooks
  • D: threat intelligence

Question 39

Your company has a Microsoft 365 subscription and uses Microsoft Defender for Identity.
You are informed about incidents that relate to compromised identities.
You need to recommend a solution to expose several accounts for attackers to exploit. When the attackers attempt to exploit the accounts, an alert must be triggered.
Which Defender for Identity feature should you include in the recommendation?

  • A: sensitivity labels
  • B: custom user tags
  • C: standalone sensors
  • D: honeytoken entity tags

Question 40

Your company is moving all on-premises workloads to Azure and Microsoft 365.
You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following requirements:
✑ Minimizes manual intervention by security operation analysts
✑ Supports triaging alerts within Microsoft Teams channels
What should you include in the strategy?

  • A: KQL
  • B: playbooks
  • C: data connectors
  • D: workbooks

Question 41

You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases.
All resources are backed up multiple times a day by using Azure Backup.
You are developing a strategy to protect against ransomware attacks.
You need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a successful ransomware attack.
Which two controls should you include in the recommendation? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • A: Enable soft delete for backups.
  • B: Require PINs for critical operations.
  • C: Encrypt backups by using customer-managed keys (CMKs).
  • D: Perform offline backups to Azure Data Box.
  • E: Use Azure Monitor notifications when backup configurations change.

Question 42

HOTSPOT -
You are creating the security recommendations for an Azure App Service web app named App1. App1 has the following specifications:
✑ Users will request access to App1 through the My Apps portal. A human resources manager will approve the requests.
✑ Users will authenticate by using Azure Active Directory (Azure AD) user accounts.
You need to recommend an access security architecture for App1.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 43

HOTSPOT -
You are evaluating the security of ClaimsApp.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 44

You need to recommend a solution to scan the application code. The solution must meet the application development requirements.
What should you include in the recommendation?

  • A: GitHub Advanced Security
  • B: Azure Key Vault
  • C: Azure DevTest Labs
  • D: Application Insights in Azure Monitor

Question 45

You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements.
Which two services should you leverage in the strategy? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A: Azure AD Conditional Access
  • B: access reviews in Azure AD
  • C: Microsoft Defender for Cloud
  • D: Microsoft Defender for Cloud Apps
  • E: Microsoft Defender for Endpoint

Question 46

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • A: Security Assertion Markup Language (SAML)
  • B: NTLMv2
  • C: certificate-based authentication
  • D: Kerberos

Question 47

You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements.
What should you include in the recommendation?

  • A: row-level security (RLS)
  • B: Transparent Data Encryption (TDE)
  • C: Always Encrypted
  • D: data classification
  • E: dynamic data masking

Question 48

HOTSPOT -
You need to recommend a solution to meet the requirements for connections to ClaimsDB.
What should you recommend using for each requirement? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Image 1

Question 49

You are evaluating an Azure environment for compliance.
You need to design an Azure Policy implementation that can be used to evaluate compliance without changing any resources.
Which effect should you use in Azure Policy?

  • A: Deny
  • B: Modify
  • C: Append
  • D: Disabled

Question 50

You are designing security for an Azure landing zone.
Your company identifies the following compliance and privacy requirements:
✑ Encrypt cardholder data by using encryption keys managed by the company.
✑ Encrypt insurance claim files by using encryption keys hosted on-premises.
Which two configurations meet the compliance and privacy requirements? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A: Store the cardholder data in an Azure SQL database that is encrypted by using Microsoft-managed keys.
  • B: Store the insurance claim data in Azure Blob storage encrypted by using customer-provided keys.
  • C: Store the cardholder data in an Azure SQL database that is encrypted by using keys stored in Azure Key Vault Managed HSM.
  • D: Store the insurance claim data in Azure Files encrypted by using Azure Key Vault Managed HSM.
Page 2 of 10 • Questions 26-50 of 247

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!