exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 1 question 8 discussion

Actual exam question from Microsoft's SC-100
Question #: 8
Topic #: 1
[All SC-100 Questions]

You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases.
All resources are backed up multiple times a day by using Azure Backup.
You are developing a strategy to protect against ransomware attacks.
You need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a successful ransomware attack.
Which two controls should you include in the recommendation? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • A. Enable soft delete for backups.
  • B. Require PINs for critical operations.
  • C. Encrypt backups by using customer-managed keys (CMKs).
  • D. Perform offline backups to Azure Data Box.
  • E. Use Azure Monitor notifications when backup configurations change.
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
malone0001
Highly Voted 7 months ago
Selected Answer: AB
https://docs.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware
upvoted 34 times
ChaBum
2 years, 1 month ago
B E https://learn.microsoft.com/en-us/azure/backup/security-overview
upvoted 2 times
...
...
simonseztech
Highly Voted 2 years, 7 months ago
Selected Answer: AB
Keyword are CONTROLS and ENSURE. So A & B both are the answer. https://docs.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware
upvoted 21 times
...
svpulver
Most Recent 7 months ago
I think the correct answer is BC. The question states clearly "in the event of a successful ransomware attack". The ransomware attack does not delete backups and does not modify backup schedules. The attack purpose is to encrypt. That said by using option C (C. Encrypt backups by using customer-managed keys (CMKs)) you will guarantee that an additional encryption attempt made by Ransomware will not be successful as at that point the backups will be already encrypted.
upvoted 2 times
alessag
3 months, 1 week ago
I don't think the C is correct because this feature doesn't support backup of virtual machines (VMs); look at https://learn.microsoft.com/en-us/azure/backup/encryption-at-rest-with-cmk?tabs=portal#considerations (third bullet)
upvoted 1 times
...
...
d3an
7 months ago
Selected Answer: AB
'You need to recommend which CONTROLS must be enabled to ENSURE that Azure Backup can be used to RESTORE the resources in the event of a successful ransomware attack.' Whilst helpful for auditing purposes and detection of a malicious attack, monitoring configuration changes and alerting after a change is made does not represent a CONTROL which ENSURES Azure Backup can be used to RESTORE the resources. Answers are therefore A and B.
upvoted 6 times
ChaBum
2 years, 1 month ago
agreed, E would help detecting the attack, but has nothing to do to "ensure that Azure Backup can be used..."
upvoted 2 times
...
...
nited
7 months ago
Selected Answer: AB
Soft delete protection, even if a malicious actor deletes a backup (or backup data is accidentally deleted). Backup data is retained for 14 additional days, allowing the recovery of a backup item with no data loss. As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN before modifying online backups. https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware
upvoted 2 times
...
Gurulee
7 months ago
Selected Answer: AB
Checks have been added to make sure only valid users can perform various operations. These include adding an extra layer of authentication. As part of adding an extra layer of authentication for critical operations, you're prompted to enter a security PIN before modifying online backups. Soft delete protection, even if a malicious actor deletes a backup (or backup data is accidentally deleted). Backup data is retained for 14 additional days, allowing the recovery of a backup item with no data loss
upvoted 2 times
...
zellck
7 months ago
Selected Answer: AB
AB is the answer. https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature-cloud Concerns about security issues, like malware, ransomware, and intrusion, are increasing. These security issues can be costly, in terms of both money and data. To guard against such attacks, Azure Backup now provides security features to help protect backup data even after deletion. One such feature is soft delete. With soft delete, even if a malicious actor deletes a backup (or backup data is accidentally deleted), the backup data is retained for 14 additional days, allowing the recovery of that backup item with no data loss. The additional 14 days of retention for backup data in the "soft delete" state don't incur any cost to you. https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature#authentication-to-perform-critical-operations
upvoted 7 times
...
gujjudesi420
7 months ago
Options B (Require PINs for critical operations), D (Perform offline backups to Azure Data Box), and E (Use Azure Monitor notifications when backup configurations change) are not directly related to ensuring the availability and restore capabilities of Azure Backup in the event of a ransomware attack. Therefore, the recommended controls to include in the strategy for protecting against ransomware attacks and ensuring the usability of Azure Backup for resource restoration are: A. Enable soft delete for backups C. Encrypt backups by using customer-managed keys (CMKs)
upvoted 7 times
alessag
3 months, 1 week ago
I don't think the C is correct because this feature doesn't support backup of virtual machines (VMs); look at https://learn.microsoft.com/en-us/azure/backup/encryption-at-rest-with-cmk?tabs=portal#considerations (third bullet)
upvoted 1 times
...
...
Jonny_Cage
7 months ago
A. Enable Soft Delete for Backups: Soft delete adds an additional layer of protection for your backup data. Even if a backup is deleted (whether accidentally or maliciously), it is retained for an additional period (14 days by default for Azure VMs and 30 days for Azure Blob Storage). During this retention period, the backup data can be recovered, ensuring that you can restore from these backups even if they are targeted in a ransomware attack. B. Require PINs for Critical Operations: This control adds an extra layer of security by requiring a PIN for critical operations, such as deleting backup data or changing backup configurations. This can prevent malicious actors from easily performing destructive actions, even if they have compromised your environment. It's a form of multi-factor authentication that ensures only authorized users can perform sensitive operations on your backups.
upvoted 3 times
...
Ruttoh
7 months ago
To ensure that Azure Backup can be used to restore resources in the event of a successful ransomware attack, you should include the following controls: A. Enable soft delete for backups: This feature protects your backup data from accidental or malicious deletion by retaining deleted backup data for 14 additional days, allowing you to recover it before it’s permanently lost1. B. Require PINs for critical operations: This adds an extra layer of security by requiring a security PIN for critical operations, ensuring that only authorized users can perform such actions
upvoted 1 times
...
bxlin
11 months ago
Agreed with B and E A - enable soft delete on a resource, e.g storage account. not on backup C - does not help. D - "Store backups in offline or off-site storage" would be a perfect choice. but using Azure Data Box is incorrect, which is a data transfer device to move data from on-prem to Azure cloud. it is not a long-term data storage solution.
upvoted 1 times
alessag
3 months, 1 week ago
I don't think E is correct because when you receive a notification is too late because question require CONTROL (preliminary check) to ENSURE you can do remediation tasks (for instance recovery deleted backup).
upvoted 1 times
...
...
Bett
1 year ago
Currently the solutions published by Microsoft are BD: -Store backups in offline or off-site storage and/or immutable storage. -Require out of band steps (such as MFA or a security PIN) before permitting an online backup to be modified or erased. https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware#steps-to-take-before-an-attack About Offline Backup -> https://learn.microsoft.com/en-us/azure/backup/offline-backup-overview
upvoted 2 times
...
masby661
1 year, 1 month ago
Selected Answer: AC
https://learn.microsoft.com/en-us/azure/backup/protect-backups-from-ransomware-faq
upvoted 2 times
...
SFAY
1 year, 2 months ago
Selected Answer: BD
https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware Please refer to the section 'Steps to take before an attack'. Some of the steps mentioned are: 1. Store backups in offline or off-site storage - (Option B) 2. Require out of band steps such as MFA or a security PIN (Option D) Option A - does not seem to be a valid choice as Soft Delete is enabled by default Option C - Not mentioned in the MS link above Option E- Not mentioned in the MS link above Therefore, B & D are the correct choices as per MS article and not what the votes indicate.
upvoted 3 times
ubiquituz
1 year, 1 month ago
AB...there is no where in the steps to guard against ransomware did they say perform offline backups to azure data box...but soft delete protection and PIN/MFA use is advised https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware
upvoted 1 times
...
...
Charly80
1 year, 3 months ago
"Soft Delete" doesn't works with Storage Account : https://learn.microsoft.com/en-us/azure/backup/backup-azure-security-feature-cloud?tabs=azure-portal
upvoted 1 times
...
TomasValtor
1 year, 5 months ago
Answer: BD Check this link (slide 20). https://view.officeapps.live.com/op/view.aspx?src=https%3A%2F%2Fdownload.microsoft.com%2Fdownload%2F7%2F5%2F1%2F751682ca-5aae-405b-afa0-e4832138e436%2FRansomwareRecommendations.pptx&wdOrigin=BROWSELINK
upvoted 2 times
...
itmaster
1 year, 7 months ago
A, C, and E are best practices for ransomware attack: https://learn.microsoft.com/en-us/azure/backup/protect-backups-from-ransomware-faq The right answer is A, soft delete, and C, enabling CMK, to be able to restore after successful attack. If the attack deletes the data, enabled soft delete will restore it. If the attack encrypts the data, the backups that are encrypted by CMK cannot be tampered with and can be decrypted and restored.
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago