Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Microsoft Cybersecurity Architect Question and Answers

Microsoft Cybersecurity Architect

Last Update Jun 14, 2025
Total Questions : 215

We are offering FREE SC-100 Microsoft exam questions. All you do is to just go and sign up. Give your details, prepare SC-100 free exam questions and then go for complete pool of Microsoft Cybersecurity Architect test questions that will help you more.

SC-100 pdf

SC-100 PDF

$40.25  $114.99
SC-100 Engine

SC-100 Testing Engine

$47.25  $134.99
SC-100 PDF + Engine

SC-100 PDF + Testing Engine

$61.25  $174.99
Questions 1

What should you create in Azure AD to meet the Contoso developer requirements?

Options:

Discussion 0
Questions 2

You need to recommend a SIEM and SOAR strategy that meets the hybrid requirements, the Microsoft Sentinel requirements, and the regulatory compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 3

You need to recommend a solution for securing the landing zones. The solution must meet the landing zone requirements and the business requirements.

What should you configure for each landing zone?

Options:

A.  

Azure DDoS Protection Standard

B.  

an Azure Private DNS zone

C.  

Microsoft Defender for Cloud

D.  

an ExpressRoute gateway

Discussion 0
Questions 4

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance. You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.

Solution: You recommend access restrictions based on HTTP headers that have the Front Door ID.

Does this meet the goal?

Options:

A.  

Yes

B.  

No

Discussion 0
Questions 5

You need to recommend a solution to meet the requirements for connections to ClaimsDB.

What should you recommend using for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 6

You need to recommend a solution to meet the security requirements for the InfraSec group.

What should you use to delegate the access?

Options:

A.  

a subscription

B.  

a custom role-based access control (RBAC) role

C.  

a resource group

D.  

a management group

Discussion 0
Questions 7

You need to recommend a solution to resolve the virtual machine issue. What should you include in the recommendation? (Choose Two)

Options:

A.  

Onboard the virtual machines to Microsoft Defender for Endpoint.

B.  

Onboard the virtual machines to Azure Arc.

C.  

Create a device compliance policy in Microsoft Endpoint Manager.

D.  

Enable the Qualys scanner in Defender for Cloud.

Discussion 0
Questions 8

You need to recommend a solution to meet the security requirements for the virtual machines.

What should you include in the recommendation?

Options:

A.  

an Azure Bastion host

B.  

a network security group (NSG)

C.  

just-in-time (JIT) VM access

D.  

Azure Virtual Desktop

Discussion 0
Questions 9

You need to recommend a solution to secure the MedicalHistory data in the ClaimsDetail table. The solution must meet the Contoso developer requirements.

What should you include in the recommendation?

Options:

A.  

Transparent Data Encryption (TDE)

B.  

Always Encrypted

C.  

row-level security (RLS)

D.  

dynamic data masking

E.  

data classification

Discussion 0
Questions 10

You are evaluating the security of ClaimsApp.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.

Options:

Discussion 0
Questions 11

You need to recommend a solution to meet the AWS requirements.

What should you include in the recommendation? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 12

You need to recommend a solution to meet the compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 13

You need to recommend a solution to scan the application code. The solution must meet the application development requirements. What should you include in the recommendation?

Options:

A.  

Azure Key Vault

B.  

GitHub Advanced Security

C.  

Application Insights in Azure Monitor

D.  

Azure DevTest Labs

Discussion 0
Questions 14

Your company is developing an invoicing application that will use Azure Active Directory (Azure AD) B2C. The application will be deployed as an App Service web app. You need to recommend a solution to the application development team to secure the application from identity related attacks. Which two configurations should you recommend? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Options:

A.  

Azure AD Conditional Access integration with user flows and custom policies

B.  

Azure AD workbooks to monitor risk detections

C.  

custom resource owner password credentials (ROPC) flows in Azure AD B2C

D.  

access packages in Identity Governance

E.  

smart account lockout in Azure AD B2C

Discussion 0
Questions 15

You have a Microsoft Entra tenant. The tenant contains 500 Windows devices that have the Global Secure Access client deployed.

You have a third-party software as a service (SaaS) app named App1.

You plan to implement Global Secure Access to manage access to App1.

You need to recommend a solution to manage connections to App1. The solution must ensure that users authenticate by using their Microsoft Entra credentials before they can connect to App1.

What should you include the recommendation?

Options:

A.  

a Global Secure Access app

B.  

a private access traffic forwarding profile

C.  

an internet access traffic forwarding profile

D.  

a Quick Access app

Discussion 0
Questions 16

Your company has an office in Seattle.

The company has two Azure virtual machine scale sets hosted on different virtual networks.

The company plans to contract developers in India.

You need to recommend a solution provide the developers with the ability to connect to the virtual machines over SSL from the Azure portal. The solution must meet the following requirements:

• Prevent exposing the public IP addresses of the virtual machines.

• Provide the ability to connect without using a VPN.

• Minimize costs.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Deploy Azure Bastion to one virtual network.

B.  

Deploy Azure Bastion to each virtual network.

C.  

Enable just-in-time VM access on the virtual machines.

D.  

Create a hub and spoke network by using virtual network peering.

E.  

Create NAT rules and network rules in Azure Firewall.

Discussion 0
Questions 17

Your company has two offices named Office1 and Office2. The offices contain 1,000 on-premises Windows 11 devices that are Microsoft Entra joined.

You have a Microsoft 365 subscription and use Microsoft Intune.

You plan to deploy Microsoft Entra Internet Access from the offices to Microsoft 365.

You enable the Microsoft 365 profile and configure the following:

• A traffic policy for all Microsoft 365 traffic

• A linked Conditional Access policy that has the following configurations:

° Applies to all users

° Performs compliant network checks

o Allows Microsoft 365 traffic from compliant devices

• An assignment to all devices

• An assignment to the remote network associated with Office1

You deploy the Global Secure Access client to all the devices in Office2 and establish connections.

Which users can access Microsoft 365 services from compliant devices, and which users are blocket1 from accessing Microsoft 365 services when using noncompliar devices? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 18

You are designing a security strategy for providing access to Azure App Service web apps through an Azure Front Door instance.

You need to recommend a solution to ensure that the web apps only allow access through the Front Door instance.

Solution: You recommend access restrictions to allow traffic from the backend IP address of the Front Door instance.

Does this meet the goal?

Options:

A.  

Yes

B.  

No

Discussion 0
Questions 19

You need to recommend a strategy for securing the litware.com forest. The solution must meet the identity requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE; Each correct selection is worth one point.

Options:

Discussion 0
Questions 20

You have an Azure subscription.

You plan to deploy a storage account named storage1 that will store confidential data. You will assign tags to the confidential data.

You need to ensure that access to storage1 can be defined by using the assigned tags.

Which authorization mechanism should you enable, and which type of resource should you use to store the data? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 21

Your company is moving all on-premises workloads to Azure and Microsoft 365. You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following requirements:

• Minimizes manual intervention by security operation analysts

• Supports Waging alerts within Microsoft Teams channels

What should you include in the strategy?

Options:

A.  

data connectors

B.  

playbooks

C.  

workbooks

D.  

KQL

Discussion 0
Questions 22

You have a Microsoft 365 tenant named contoso.com.

You need to ensure that users can authenticate only to contoso.com. The solution must meet the following requirements:

• Prevent the users from authenticating to other Microsoft 365 tenants.

• Minimize administrative effort.

What should you use?

Options:

A.  

Microsoft Defender for Endpoint

B.  

Microsoft Entra Internet Access

C.  

Microsoft Entra Private Access

D.  

Microsoft Defender for Cloud Apps

Discussion 0
Questions 23

You are designing a new Azure environment based on the security best practices of the Microsoft Cloud Adoption Framework for Azure. The environment will contain one subscription for shared infrastructure components and three separate subscriptions for applications.

You need to recommend a deployment solution that includes network security groups (NSGs) Azure Key Vault, and Azure Bastion. The solution must minimize deployment effort and follow security best practices of the Microsoft Cloud Adoption Framework for Azure.

What should you include in the recommendation?

Options:

A.  

the Azure landing zone accelerator

B.  

the Azure Will-Architected Framework

C.  

Azure Security Benchmark v3

D.  

Azure Advisor

Discussion 0
Questions 24

You use Azure Pipelines with Azure Repos to implement continuous integration and continuous deployment (O/CD) workflows for the deployment of applications to Azure. You need to recommend what to include in dynamic application security testing (DAST) based on the principles of the Microsoft Cloud Adoption Framework for Azure. What should you recommend?

Options:

A.  

unit testing

B.  

penetration testing

C.  

dependency testing

D.  

threat modeling

Discussion 0
Questions 25

You need to recommend a strategy for App Service web app connectivity. The solution must meet the landing zone requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.

Options:

Discussion 0
Questions 26

Your company has a hybrid cloud infrastructure.

Data and applications are moved regularly between cloud environments.

The company's on-premises network is managed as shown in the following exhibit.

You are designing security operations to support the hybrid cloud infrastructure. The solution must meet the following requirements:

    Govern virtual machines and servers across multiple environments.

    Enforce standards for all the resources across all the environment across the Azure policy.

Which two components should you recommend for the on-premises network? Each correct answer presents part of the solution.

NOTE Each correct selection is worth one point.

Options:

A.  

Azure VPN Gateway

B.  

guest configuration in Azure Policy

C.  

on-premises data gateway

D.  

Azure Bastion

E.  

Azure Arc

Discussion 0
Questions 27

You need to recommend an identity security solution for the Azure AD tenant of Litware. The solution must meet the identity requirements and the regulatory compliance requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 28

You need to recommend a multi-tenant and hybrid security solution that meets to the business requirements and the hybrid requirements. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Options:

Discussion 0
Questions 29

You need to design a strategy for securing the SharePoint Online and Exchange Online data. The solution must meet the application security requirements.

Which two services should you leverage in the strategy? Each correct answer presents part of the solution. NOTE; Each correct selection is worth one point.

Options:

A.  

Azure AD Conditional Access

B.  

Microsoft Defender for Cloud Apps

C.  

Microsoft Defender for Cloud

D.  

Microsoft Defender for Endpoint

E.  

access reviews in Azure AD

Discussion 0
Questions 30

To meet the application security requirements, which two authentication methods must the applications support? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

Options:

A.  

Security Assertion Markup Language (SAML)

B.  

NTLMv2

C.  

certificate-based authentication

D.  

Kerberos

Discussion 0
Questions 31

You need to recommend a solution to evaluate regulatory compliance across the entire managed environment. The solution must meet the regulatory compliance requirements and the business requirements.

What should you recommend? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Discussion 0