Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Microsoft Cybersecurity Architect Question and Answers

Microsoft Cybersecurity Architect

Last Update Nov 30, 2025
Total Questions : 246

We are offering FREE SC-100 Microsoft exam questions. All you do is to just go and sign up. Give your details, prepare SC-100 free exam questions and then go for complete pool of Microsoft Cybersecurity Architect test questions that will help you more.

SC-100 pdf

SC-100 PDF

$40.25  $114.99
SC-100 Engine

SC-100 Testing Engine

$47.25  $134.99
SC-100 PDF + Engine

SC-100 PDF + Testing Engine

$61.25  $174.99
Questions 1

You have an Azure subscription that contains multiple Azure Data Lake Storage accounts.

You need to recommend a solution to encrypt the content of the accounts by using service-side encryption and customer-managed keys. The solution must ensure that individual encryption keys are applied at the most granular level.

At which level should you recommend the encryption be applied?

Options:

A.  

account

B.  

folder

C.  

file

D.  

container

Discussion 0
Questions 2

Your company is moving all on-premises workloads to Azure and Microsoft 365. You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following requirements:

• Minimizes manual intervention by security operation analysts

• Supports Waging alerts within Microsoft Teams channels

What should you include in the strategy?

Options:

A.  

data connectors

B.  

playbooks

C.  

workbooks

D.  

KQL

Discussion 0
Questions 3

Your company uses Azure Pipelines and Azure Repos to implement continuous integration and continuous deployment (CI/CD) workflows for the deployment of applications to Azure.

You are updating the deployment process to align with DevSecOps controls guidance in the Microsoft Cloud Adoption Framework for Azure.

You need to recommend a solution to ensure that all code changes are submitted by using pull requests before being deployed by the CI/CD workflow.

What should you include in the recommendation?

Options:

A.  

custom roles in Azure Pipelines

B.  

branch policies in Azure Repos

C.  

Azure policies

D.  

custom Azure roles

Discussion 0
Questions 4

You have a Microsoft 365 E5 subscription. The subscription contains 1,000 devices that run Windows 11 Pro and are enrolled in Microsoft Intune. You need to recommend a Microsoft Defender for Cloud Apps solution that meets the following requirements:

• When a user downloads a file from Microsoft SharePoint Online, a label must be applied to the file in real time based on the file's contents.

• Only users that use Intune-compliant devices must be able to sign in to Dropbox.

Which type of policy should you recommend for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 5

You have an Azure subscription.

You plan to deploy enterprise-scale landing zones based on the Microsoft Cloud Adoption Framework for Azure. The deployment will include a single-platform landing zone for all shared services and three application landing zones that will each host a different Azure application.

You need to recommend which resource to deploy to each landing zone. The solution must meet the Cloud Adoption Framework best-practice recommendations for enterprise-scale landing zones.

What should you recommend?

Options:

A.  

an Azure Private DNS zone

B.  

an Azure key vault

C.  

an Azure firewall

D.  

an Azure virtual network gateway

Discussion 0
Questions 6

What should you create in Azure AD to meet the Contoso developer requirements?

Options:

Discussion 0
Questions 7

Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.

The company signs a contract with the United States government.

You need to review the current subscription for NIST 800-53 compliance.

What should you do first?

Options:

A.  

From Defender for Cloud, review the secure score recommendations.

B.  

From Microsoft Sentinel, configure the Microsoft Defender for Cloud data connector.

C.  

From Defender for Cloud, review the Azure security baseline for audit report.

D.  

From Defender for Cloud, add a regulatory compliance standard.

Discussion 0
Questions 8

You need to recommend a solution to meet the security requirements for the InfraSec group.

What should you use to delegate the access?

Options:

A.  

a subscription

B.  

a custom role-based access control (RBAC) role

C.  

a resource group

D.  

a management group

Discussion 0
Questions 9

You need to recommend a solution to meet the requirements for connections to ClaimsDB.

What should you recommend using for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 10

You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation? (Choose Two)

Options:

A.  

Onboard the virtual machines to Microsoft Defender for Endpoint.

B.  

Onboard the virtual machines to Azure Arc.

C.  

Create a device compliance policy in Microsoft Endpoint Manager.

D.  

Enable the Qualys scanner in Defender for Cloud.

Discussion 0
Questions 11

You need to recommend a solution to meet the security requirements for the virtual machines.

What should you include in the recommendation?

Options:

A.  

an Azure Bastion host

B.  

a network security group (NSG)

C.  

just-in-time (JIT) VM access

D.  

Azure Virtual Desktop

Discussion 0
Questions 12

You need to recommend a solution to meet the compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 13

You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements.

What should you include in the recommendation?

Options:

A.  

Transparent Data Encryption (TDE)

B.  

Always Encrypted

C.  

row-level security (RLS)

D.  

dynamic data masking

E.  

data classification

Discussion 0
Questions 14

You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 15

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Security Assertion Markup Language (SAML)

B.  

NTLMv2

C.  

certificate-based authentication

D.  

Kerberos

Discussion 0
Questions 16

You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 17

You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 18

You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements.

What should you configure for each landing zone?

Options:

A.  

Azure DDoS Protection Standard

B.  

an Azure Private DNS zone

C.  

Microsoft Defender for Cloud

D.  

an ExpressRoute gateway

Discussion 0
Questions 19

You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point.

Options:

Discussion 0
Questions 20

You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.

Options:

Discussion 0
Questions 21

You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 22

You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements.

Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.

Options:

A.  

Azure AD Conditional Access

B.  

Microsoft Defender for Cloud Apps

C.  

Microsoft Defender for Cloud

D.  

Microsoft Defender for Endpoint

E.  

access reviews in Azure AD

Discussion 0
Questions 23

A customer has a Microsoft 365 E5 subscription and an Azure subscription.

The customer wants to centrally manage security incidents, analyze log, audit activity, and search for potential threats across all deployed services.

You need to recommend a solution for the customer. The solution must minimize costs.

What should you include in the recommendation?

Options:

A.  

Microsoft 365 Defender

B.  

Microsoft Defender for Cloud

C.  

Microsoft Defender for Cloud Apps

D.  

Microsoft Sentinel

Discussion 0
Questions 24

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.

You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.

Solution: You recommend access restrictions that allow traffic from the Front Door service tags.

Does this meet the goal?

Options:

A.  

Yes

B.  

No

Discussion 0
Questions 25

You have an Azure subscription that has Microsoft Defender for Cloud enabled. Suspicious authentication activity alerts have been appearing in the Workload protections dashboard.

You need to recommend a solution to evaluate and remediate the alerts by using workflow automation. The solution must minimize development effort. What should you include in the recommendation?

Options:

A.  

Azure Monitor webhooks

B.  

Azure Logics Apps

C.  

Azure Event Hubs

D.  

Azure Functions apps

Discussion 0
Questions 26

Your company has an on-premises network, an Azure subscription, and a Microsoft 365 E5 subscription. The company uses the following devices:

• Computers that run either Windows 10 or Windows 11

• Tablets and phones that run either Android or iOS

You need to recommend a solution to classify and encrypt sensitive Microsoft Office 365 data regardless of where the data is stored. What should you include in the recommendation?

Options:

A.  

eDiscovery

B.  

retention policies

C.  

Compliance Manager

D.  

Microsoft Information Protection

Discussion 0
Questions 27

For a Microsoft cloud environment, you need to recommend a security architecture that follows the Zero Trust principles of the Microsoft Cybersecurity Reference Architectures (MCRA).

Which security methodologies should you include in the recommendation? To answer, drag the appropriate methodologies to the

correct principles. Each methodology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 28

You have an Azure subscription that contains a resources group named RG1. RG1 contains multiple Azure Files shares.

You need to recommend a solution to deploy a backup solution for the shares. The solution must meet the following requirements:

• Prevent the deletion of backups and the vault used to store the backups.

• Prevent privilege escalation attacks against the backup solution.

• Prevent the modification of the backup retention period.

Which three actions should you recommend be performed in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Options:

Discussion 0
Questions 29

You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.

The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.

You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.

Which security control should you recommend?

Options:

A.  

app discovery anomaly detection policies in Microsoft Defender for Cloud Apps

B.  

adaptive application controls in Defender for Cloud

C.  

Azure Security Benchmark compliance controls m Defender for Cloud

D.  

app protection policies in Microsoft Endpoint Manager

Discussion 0
Questions 30

You have an Azure subscription and a Microsoft 365 subscription.

Your company uses several software as a service (SaaS) applications.

To align with Microsoft cloud security benchmark (MCSB) and Microsoft Cybersecurity Reference Architectures (MCRA), you plan to design a solution to provide visibility into user activity across the applications and detect potentially risky behavior in real time.

Which service should you recommend?

Options:

A.  

Microsoft Purview Information Protection

B.  

Microsoft Defender for Cloud Apps

C.  

Microsoft Defender for Endpoint

D.  

Microsoft Sentinel

Discussion 0
Questions 31

You have a customer that has a Microsoft 365 subscription and an Azure subscription.

The customer has devices that run either Windows, iOS, Android, or macOS. The Windows devices are deployed on-premises and in Azure.

You need to design a security solution to assess whether all the devices meet the customer's compliance rules.

What should you include in the solution?

Options:

A.  

Microsoft Information Protection

B.  

Microsoft Defender for Endpoint

C.  

Microsoft Sentinel

D.  

Microsoft Intune

Discussion 0
Questions 32

You need to recommend a solution to meet the AWS requirements.

What should you include in the recommendation? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 33

You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?

Options:

A.  

Azure Key Vault

B.  

GitHub Advanced Security

C.  

Application Insights in Azure Monitor

D.  

Azure DevTest Labs

Discussion 0
Questions 34

You are evaluating the security of ClaimsApp.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.

Options:

Discussion 0