SC-100 Exam Question 1

You have an Azure AD tenant that syncs with an Active Directory Domain Services (AD DS) domain.
You have an on-premises datacenter that contains 100 servers. The servers run Windows Server and are backed up by using Microsoft Azure Backup Server (MABS).
You are designing a recovery solution for ransomware attacks. The solution follows Microsoft Security Best Practices.
You need to ensure that a compromised administrator account cannot be used to delete the backups What should you do?
  • SC-100 Exam Question 2

    You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.

    SC-100 Exam Question 3

    You have a Microsoft 365 subscription.
    You are designing a user access solution that follows the Zero Trust principles of the Microsoft Cybersecurity Reference Architectures (MCRA).
    You need to recommend a solution that automatically restricts access to Microsoft Exchange Online. SharePoint Online, and Teams m near-real-lime (NRT) in response to the following Azure AD events:
    * A user account is disabled or deleted
    * The password of a user is changed or reset.
    * All the refresh tokens for a user are revoked
    * Multi-factor authentication (MFA) is enabled for a user
    Which two features should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
  • SC-100 Exam Question 4

    You need to recommend a solution to meet the AWS requirements.
    What should you include in the recommendation? To answer, select the appropriate options in the answer area.
    NOTE: Each correct selection is worth one point.

    SC-100 Exam Question 5

    Your company has on-premises Microsoft SQL Server databases.
    The company plans to move the databases to Azure.
    You need to recommend a secure architecture for the databases that will minimize operational requirements for patching and protect sensitive data by using dynamic data masking. The solution must minimize costs.
    What should you include in the recommendation?