





{"id":6234,"date":"2024-11-02T10:19:44","date_gmt":"2024-11-02T02:19:44","guid":{"rendered":"http:\/\/www.killtest.hk\/?p=6234"},"modified":"2024-11-02T10:19:44","modified_gmt":"2024-11-02T02:19:44","slug":"%e5%be%ae%e8%bb%9f%e8%aa%8d%e8%ad%89%e8%80%83%e8%a9%a6-sc-100-microsoft-%e8%b3%87%e8%a8%8a%e4%bf%9d%e8%ad%b7%e7%ae%a1%e7%90%86%e5%93%a1%e7%9c%9f%e9%a1%8c%e6%af%8f%e6%97%a5%e4%b8%80%e7%b7%b4","status":"publish","type":"post","link":"https:\/\/www.killtest.hk\/index.php\/killtest\/%e5%be%ae%e8%bb%9f%e8%aa%8d%e8%ad%89%e8%80%83%e8%a9%a6-sc-100-microsoft-%e8%b3%87%e8%a8%8a%e4%bf%9d%e8%ad%b7%e7%ae%a1%e7%90%86%e5%93%a1%e7%9c%9f%e9%a1%8c%e6%af%8f%e6%97%a5%e4%b8%80%e7%b7%b4\/","title":{"rendered":"\u5fae\u8edf\u8a8d\u8b49\u8003\u8a66 SC-100: Microsoft \u8cc7\u8a0a\u4fdd\u8b77\u7ba1\u7406\u54e1\u771f\u984c\u6bcf\u65e5\u4e00\u7df4"},"content":{"rendered":"<p><a href=\"https:\/\/www.killtest.net\/Microsoft-Certified-Cybersecurity-Architect-Expert\/SC-100.asp\">SC-100:Microsoft Cybersecurity Architect<\/a>\u771f\u9898\u7ec3\u4e60<br \/>\n1.Your company has a Microsoft 365 ES subscription.The Chief Compliance Ocer plans to enhance privacy management in the working environment.<br \/>\nYou need to recommend a solution to enhance the privacy management. The solution must meet the following requirements:<br \/>\n\u2711 Identify unused personal data and empower users to make smart data handling decisions.<br \/>\n\u2711 Provide users with notications and guidance when a user sends personal data in Microsoft Teams.<br \/>\n\u2711 Provide users with recommendations to mitigate privacy risks.What should you include in the recommendation?<br \/>\nA. communication compliance in insider risk management\u00a0<br \/>\nB. Microsoft Viva Insights<br \/>\nC. Privacy Risk Management in Microsoft Priva<br \/>\nD. Advanced eDiscovery<br \/>\n\u7b54\u6848\uff1aC<\/p>\n<p>2.You have an Azure subscription that has Microsoft Defender for Cloud enabled.Suspicious authentication activity alerts have been appearing in the Workload protections dashboard.<br \/>\nYou need to recommend a solution to evaluate and remediate the alerts by using workow automation. The solution must minimize development effort.What should you include in the recommendation?<br \/>\nA. Azure Monitor webhooks\u00a0<br \/>\nB. Azure Event Hubs<br \/>\nC. Azure Functions apps<br \/>\nD. Azure Logics Apps<br \/>\n\u7b54\u6848\uff1aD<\/p>\n<p>3.Your company is moving a big data solution to Azure.The company plans to use the following storage workloads:\u00a0<br \/>\n\u2711 Azure Storage blob containers<br \/>\n\u2711 Azure Data Lake Storage Gen2Azure Storage le shares &#8211;<br \/>\n\u2711 Azure Disk StorageWhich two storage workloads support authentication by using Azure Active Directory (Azure AD)?<br \/>\nEach correct answer presents a complete solution.NOTE: Each correct selection is worth one point.<br \/>\nA. Azure Storage le shares\u00a0<br \/>\nB. Azure Disk Storage<br \/>\nC. Azure Storage blob containers<br \/>\nD. Azure Data Lake Storage Gen2<br \/>\n\u7b54\u6848\uff1aCD<\/p>\n<p>4.You have a Microsoft 365 E5 subscription and an Azure subscription.You are designing a Microsoft deployment.You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing security events.What should you recommend using in Microsoft Sentinel?<br \/>\nA. notebooks\u00a0<br \/>\nB. playbooks<br \/>\nC. workbooks<br \/>\nD. threat intelligence<br \/>\n\u7b54\u6848\uff1aC<\/p>\n<p>5.Your company has a Microsoft 365 subscription and uses Microsoft Defender for Identity.You are informed about incidents that relate to compromised identities.<br \/>\nYou need to recommend a solution to expose several accounts for attackers to exploit. When the attackers attempt to exploit the accounts, an alert must be triggered.Which Defender for Identity feature should you include in the  recommendation?<br \/>\nA. sensitivity labels<br \/>\nB. custom user tags\u00a0<br \/>\nC. standalone sensors<br \/>\nD. honeytoken entity tags<br \/>\n\u7b54\u6848\uff1aD<\/p>\n<p>6.You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases.All resources are backed up multiple times a day by using Azure Backup.You are developing a strategy to protect against ransomware attacks.<br \/>\nYou need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a successful ransomware attack.<br \/>\nWhich two controls should you include in the recommendation? Each correct answer presents a complete solution.<br \/>\nNOTE: Each correct selection is worth one point.<br \/>\nA. Enable soft delete for backups. Most Voted<br \/>\nB. Require PINs for critical operations.<br \/>\nC. Encrypt backups by using customer-managed keys (CMKs).\u00a0<br \/>\nD. Perform oine backups to Azure Data Box.<br \/>\nE. Use Azure Monitor notications when backup congurations change.<br \/>\n\u7b54\u6848\uff1aBE<\/p>\n<p>7.Your company has a third-party security information and event management (SIEM) solution that uses Splunk and Microsoft Sentinel.<br \/>\nYou plan to integrate Microsoft Sentinel with Splunk.<br \/>\nYou need to recommend a solution to send security events from Microsoft Sentinel to Splunk.What should you include in the recommendation?\u00a0<br \/>\nA. a Microsoft Sentinel data connector<br \/>\nB. Azure Event Hubs Most Voted<br \/>\nC. a Microsoft Sentinel workbook\u00a0<br \/>\nD. Azure Data Factory<br \/>\n\u7b54\u6848\uff1aA<\/p>\n<p>8.A customer follows the Zero Trust model and explicitly veries each attempt to access its corporate applications.<br \/>\nThe customer discovers that several endpoints are infected with malware.The customer suspends access attempts from the infected endpoints.<br \/>\nThe malware is removed from the endpoints.Which two conditions must be met before endpoint users can access the corporate applications again?<br \/>\nEach correct answer presents part of the solution.<br \/>\nNOTE: Each correct selection is worth one point.<br \/>\nA. The client access tokens are refreshed<br \/>\nB. Microsoft Intune reports the endpoints as compliant. Most Voted<br \/>\nC. A new Azure Active Directory (Azure AD) Conditional Access policy is enforced<br \/>\nD.Microsoft Defender for Endpoint reports the endpoints as compliant.<br \/>\n\u7b54\u6848\uff1aAC<\/p>\n<p>9.You have a customer that has a Microsoft 365 subscription and uses the Free edition of Azure Active Directory (Azure AD).<br \/>\nThe customer plans to obtain an Azure subscription and provision several Azure resources.<br \/>\nYou need to evaluate the customer&#8217;s security environment.What will necessitate an upgrade from the Azure AD Free edition to the Premium edition?<br \/>\nA. Azure AD Privileged Identity Management (PIM) Most Voted\u00a0<br \/>\nB. role-based authorization<br \/>\nC. resource-based authorization<br \/>\nD. Azure AD Multi-Factor Authentication<br \/>\n\u7b54\u6848\uff1aD<\/p>\n<p>10.You are designing the security standards for a new Azure environment.You need to design a privileged identity strategy based on the Zero Trust model.<br \/>\nWhich framework should you follow to create the design?<br \/>\nA. Microsoft Security Development Lifecycle (SDL)\u00a0<br \/>\nB. Enhanced Security Admin Environment (ESAE)<br \/>\nC. Rapid Modernization Plan (RaMP)<br \/>\nD. Microsoft Operational Security Assurance (OSA)<br \/>\n\u7b54\u6848\uff1aC<\/p>\n<p>11.A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription.<br \/>\nAll on-premises servers in the perimeter network are prevented from connecting directly to the internet.<br \/>\nThe customer recently recovered from a ransomware attack.<br \/>\nThe customer plans to deploy Microsoft Sentinel.You need to recommend solutions to meet the following requirements:<br \/>\n\u2711 Ensure that the security operations team can access the security logs and the operation logs.<br \/>\n\u2711 Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network.<br \/>\nWhich two solutions should you include in the recommendation? Each correct answer presents a complete solution.<br \/>\nNOTE: Each correct selection is worth one point.<br \/>\nA. a custom collector that uses the Log Analytics agent<br \/>\nB. the Azure Monitor agent<br \/>\nC. resource-based role-based access control (RBAC)<br \/>\nD. Azure Active Directory (Azure AD) Conditional Access policies<br \/>\n\u7b54\u6848\uff1aBC<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SC-100:Microsoft Cybersecurity Architect\u771f\u9898\u7ec3\u4e60 1.Your com [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[3527],"class_list":["post-6234","post","type-post","status-publish","format-standard","hentry","category-killtest","tag-sc-100"],"_links":{"self":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/6234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/comments?post=6234"}],"version-history":[{"count":1,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/6234\/revisions"}],"predecessor-version":[{"id":6235,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/6234\/revisions\/6235"}],"wp:attachment":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/media?parent=6234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/categories?post=6234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/tags?post=6234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}