exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 1 question 12 discussion

Actual exam question from Microsoft's SC-100
Question #: 12
Topic #: 1
[All SC-100 Questions]

A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications.
The customer discovers that several endpoints are infected with malware.
The customer suspends access attempts from the infected endpoints.
The malware is removed from the endpoints.
Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. The client access tokens are refreshed.
  • B. Microsoft Intune reports the endpoints as compliant.
  • C. A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.
  • D. Microsoft Defender for Endpoint reports the endpoints as compliant.
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Gar23
Highly Voted 2 years, 7 months ago
Selected Answer: AB
AB looks correct to me
upvoted 39 times
424ede1
3 weeks, 5 days ago
Documents say otherwise! https://learn.microsoft.com/en-us/azure/security/fundamentals/recover-from-identity-compromise#remediate-user-and-service-account-access
upvoted 1 times
...
...
BillyB2022
Highly Voted 2 years, 7 months ago
I don't think this is correct. Zero Trust its reffering to Conditional Access, so would be Microsoft Intune reports the endpoints as compliant. https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection and I assume The client access tokens are refreshed.
upvoted 15 times
prabhjot
2 years, 7 months ago
In Identity to achieve zero trust ( we have to use Conditional access policy stating a condition as that the resource is compliant ) so i guess ans is correct ( whereas Intune is for configuring the compliance policy via MDM and MAM)
upvoted 2 times
prabhjot
2 years, 7 months ago
A second thought ( why NEW conditional access policy??) so the ans seems wrong and the correct one looks like Microsoft intune reports the endpoints as compliant and The client access token are refreshed
upvoted 11 times
...
jgvh
2 years, 7 months ago
Maybe the Conditional access already in place since he follow zero trust ? so i feel like it should be AB ?
upvoted 4 times
TJ001
2 years, 3 months ago
how the current malware is detected should have been mentioned in the question. only clue given is currently Zero Trust is implemented and each access attempt is inspected which means a conditional access policy would have been in place already to detect sign in risk (fed from Azure Identity Protection) ..
upvoted 1 times
...
...
...
ChaBum
2 years, 1 month ago
You're assuming endpoints are enrolled in Intune, and assuming is never a good idea in Microsoft exams. The question says "The customer discovers ..." and "The customer suspends ...", there is nothing about Intune.
upvoted 5 times
jasscomp
1 year, 7 months ago
Conditional Access reaches out to Intune to check if a device is seen as compliant or not. Intune will receive the risk score from Defender for Endpoint. Devices have to be managed by Intune in order for Conditional Access to get the compliance check.
upvoted 3 times
...
...
...
424ede1
Most Recent 3 weeks, 5 days ago
Selected Answer: AC
• Enforce conditional access based on trusted devices. We recommend that you enforce location-based conditional access to suit your organizational requirements. • Reset passwords after eviction for any user accounts that may have been compromised. • Revoke refresh tokens immediately after rotating your credentials. https://learn.microsoft.com/en-us/azure/security/fundamentals/recover-from-identity-compromise#remediate-user-and-service-account-access
upvoted 1 times
...
olsookie
1 month ago
Selected Answer: BD
B. Microsoft Intune reports the endpoints as compliant: Intune ensures that the endpoints meet the organization's compliance policies, verifying that they are secure and properly configured. https://learn.microsoft.com/en-us/security/zero-trust/deploy/endpoints D. Microsoft Defender for Endpoint reports the endpoints as compliant: Defender for Endpoint provides advanced threat protection and ensures that the endpoints are free from malware and other security threats. https://learn.microsoft.com/en-us/defender-endpoint/zero-trust-with-microsoft-defender-endpoint These conditions help maintain the integrity of the Zero Trust model by ensuring that only secure and compliant endpoints can access corporate applications.
upvoted 1 times
olsookie
1 month ago
after further investigation, A and B are correct because MDE does not directly report endpoints as compliant in the same way that Microsoft Intune does. MDE provides detailed reports on device health, antivirus status, and threat protection, but compliance reporting is typically managed through Intune. Therefore A + B = Correct!
upvoted 1 times
...
...
Reevs
1 month, 3 weeks ago
Selected Answer: BD
B. Microsoft Intune reports the endpoints as compliant: In a Zero Trust model, compliance is verified before granting access. Intune is used to manage device compliance policies, and the endpoints need to be reported as compliant to ensure they are safe for accessing corporate applications again. D. Microsoft Defender for Endpoint reports the endpoints as compliant: Defender for Endpoint provides security management for endpoints. After the malware is removed, Defender must report that the endpoints are secure and compliant, ensuring that they are safe for access.
upvoted 1 times
...
Ali96
2 months, 1 week ago
Selected Answer: AB
A. The client access tokens are refreshed B. Microsoft Intune reports the endpoints as compliant
upvoted 1 times
...
oscarpopi
3 months, 1 week ago
Selected Answer: AB
Agree with the given answer
upvoted 1 times
jim85
2 months, 3 weeks ago
Agree, as per the links below, MS says: n Intune, a device compliance policy is used with Microsoft Entra Conditional Access to block access to applications. In parallel, an automated investigation and remediation process is launched. A user can still use the device while the automated investigation and remediation is taking place, but access to enterprise data is blocked until the threat is fully remediated. To resolve the risk found on a device, you need to return the device to a compliant state. A device returns to a compliant state when there's no risk seen on it.
upvoted 1 times
...
...
Dirkonormalo
5 months, 3 weeks ago
Tokens need to be refreshed, when a device is marked as incompliant. The access is revoked due to the incomliance state. Answer A In Intune you configure the compliance policy. Within the compliance policy you configure the risk level for defender. Intune reports the compliance state as compliant, if the defender risk level is equal to or lower than the configured value. Answer B. Answer C: Is wrong Answer D is incorrect, because Defender does not report compliance. It reports the client risk level.
upvoted 3 times
...
Dan91
6 months ago
Selected Answer: BD
Questions asks "which 2 conditions must be met". The answer is: D: Defender must report the risk as being mitigated to Intune B: Intune reports the device as compliant
upvoted 3 times
...
Lapatiser
6 months ago
Answer should be B and C from the below key points in the question and the reference conditional access link: The customer discovers that several endpoints are infected with malware. - This comes under Microsoft intune compliance reporting. The customer suspends access attempts from the infected endpoints. - Conditional access kicks in "when a threat is seen on a device, access to sensitive content is blocked until the threat is remediated." The malware is removed from the endpoints. - "an automated investigation and remediation process is launched." https://learn.microsoft.com/en-us/defender-endpoint/conditional-access?view=o365-worldwide <<Understand the Conditional Access flow>>
upvoted 2 times
...
Ruttoh
7 months ago
To ensure that endpoint users can access the corporate applications again after malware removal, the following two conditions must be met: B. Microsoft Intune reports the endpoints as compliant: This ensures that the devices meet the organization’s compliance policies and are considered secure1. D. Microsoft Defender for Endpoint reports the endpoints as compliant: This confirms that the endpoints are free from threats and meet the security requirements1.
upvoted 2 times
...
Savitho
7 months, 1 week ago
B and D is correct answer
upvoted 2 times
...
orrery
9 months, 2 weeks ago
Selected Answer: BD
Answer: B. Microsoft Intune reports the endpoint as compliant. D. Microsoft Defender for Endpoint reports the endpoint as compliant. Reason: In a Zero Trust model, it is necessary to verify the security and compliance status of endpoints before they access corporate applications. Microsoft Intune and Microsoft Defender for Endpoint report the compliance status of endpoints and ensure that the endpoints are secure. Reasons why other answers are different: A. Client access tokens are refreshed: While refreshing tokens is important, it is not directly related to verifying the security status of endpoints. C. A new Azure Active Directory (Azure AD) Conditional Access policy is applied: Conditional access policies help with access control but are not directly related to verifying the compliance status of endpoints.
upvoted 4 times
...
crutester
9 months, 4 weeks ago
Answer is BD Source: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/conditional-access?view=o365-worldwide
upvoted 2 times
Tony416
7 months ago
According to this article, the answer should be BC and not BD.
upvoted 1 times
...
...
emartiy
10 months ago
Selected Answer: AD
Today, I read more about this question and eliminated given options based on the question scenario.. So, company uses zero trust model.. It already performed what needs to be done.. So, if some endpoints are malware infected and suspended to access company applications.. For re-access to applications (it says corporate applications not Microsoft 365 apps etc.) User's token needs to be refreshed and also Microsoft Defender for Endpoint also mark device healthy after scan etc.. So Options are; A and D.
upvoted 3 times
...
emartiy
10 months, 1 week ago
Selected Answer: AC
When you force option C, automatically Conditional Access combined with B and D options.. So, there is last option with option C that is A.
upvoted 2 times
emartiy
10 months ago
Update for given selection above: Today, I read more about this question and eliminated given options based on the question scenario.. So, company uses zero trust model.. It already performed what needs to be done.. So, if some endpoints are malware infected and suspended to access company applications.. For re-access to applications (it says corporate applications not Microsoft 365 apps etc.) User's token needs to be refreshed and also Microsoft Defender for Endpoint also mark device healthy after scan etc.. So Options are; A and D.
upvoted 1 times
...
...
JHJ44
1 year ago
Selected Answer: BD
To ensure that endpoint users can access the corporate applications again after the malware removal, consider the following two conditions: Microsoft Intune Reports Endpoints as Compliant (Option B): Microsoft Intune is a cloud-based endpoint management solution that helps manage and secure devices. After malware removal, the endpoints should be scanned and verified by Microsoft Intune to ensure compliance. If Intune reports the endpoints as compliant, it indicates that they meet security and policy requirements, allowing users to access corporate applications. Microsoft Defender for Endpoint Reports Endpoints as Compliant (Option D): Microsoft Defender for Endpoint (formerly Windows Defender ATP) provides advanced threat protection for endpoints. After malware removal, Microsoft Defender for Endpoint should verify that the endpoints are free from threats. If Defender reports the endpoints as compliant, it confirms that they are secure and can safely access corporate resources.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago