Exam Name: | Microsoft Cybersecurity Architect | ||
Exam Code: | SC-100 Dumps | ||
Vendor: | Microsoft | Certification: | Microsoft Certified: Cybersecurity Architect Expert |
Questions: | 246 Q&A's | Shared By: | maira |
For of an Azure deployment you are designing a security architecture based on the Microsoft Cloud Security Benchmark. You need to recommend a best practice for implementing service accounts for Azure API management. What should you include in the recommendation?
You have a Microsoft Entra tenant named contoso.com.
You have an external partner that has a Microsoft Entra tenant named fabrikam.com.
You need to recommend an identity governance solution for contoso.com that meets the following requirements:
Enables the users in contoso.com and fabrikam.com to communicate by using shared Microsoft Teams channels.
Manages access to shared Teams channels in contoso.com by using groups in fabrikam.com.
Supports single sign-on (SSO).
Minimizes administrative effort.
Maximizes security.
What should you include in the recommendation?
You have an on-premises datacenter. The datacenter contains a server named Server1 that runs Windows Server 2022 and a firewall that prevents Server1 from connecting to the internet.
You have an Azure subscription named Sub1.
You need to recommend a resiliency strategy for Server1 that incorporates a backup plan to transfer the data from Server1 to Sub1.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.
The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.
You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.
Which security control should you recommend?