exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 1 question 18 discussion

Actual exam question from Microsoft's SC-100
Question #: 18
Topic #: 1
[All SC-100 Questions]

HOTSPOT
-

You are planning the security levels for a security access strategy.

You need to identify which job roles to configure at which security levels. The solution must meet security best practices of the Microsoft Cybersecurity Reference Architectures (MCRA).

Which security level should you configure for each job role? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Jacquesvz
Highly Voted 1 year, 9 months ago
Correct Answer: reference = https://learn.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra (check page 59 of the MCRA powerpoint deck)
upvoted 17 times
lt9898
9 months, 1 week ago
Now on slide 84 as of the Dec 2023 update
upvoted 4 times
billo79152718
8 months ago
Correct. Thanks.
upvoted 1 times
...
...
TomasValtor
11 months, 1 week ago
check page 60 of the MCRA powerpoint deck
upvoted 2 times
TomasValtor
11 months, 1 week ago
https://learn.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra
upvoted 1 times
...
...
...
zellck
Highly Voted 1 year, 5 months ago
1. Specialised security 2. Enterprise security 3. Privileged security https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-security-levels#specialized Specialized security provides increased security controls for roles with an elevated business impact (if compromised by an attacker or malicious insider). Specialized roles typically include: - Developers of business critical systems. https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-security-levels#enterprise Enterprise security is suitable for all enterprise users and productivity scenarios. In the progression of the rapid modernization plan, enterprise also serves as the starting point for specialized and privileged access as they progressively build on the security controls in enterprise security.
upvoted 6 times
zellck
1 year, 5 months ago
https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-security-levels#privileged Privileged security is the highest level of security designed for roles that could easily cause a major incident and potential material damage to the organization in the hands of an attacker or malicious insider. This level typically includes technical roles with administrative permissions on most or all enterprise systems (and sometimes includes a select few business critical roles)
upvoted 2 times
...
...
dsatizabal
Most Recent 3 months, 1 week ago
The only problem with slide 84 of MCRA PPT is that devs and admins show both on specialized and privileged accounts
upvoted 1 times
...
[Removed]
1 year, 6 months ago
This mentioned above reference architecture is really a hardcore.
upvoted 1 times
...
God2029
1 year, 8 months ago
An Easy pick, based on the insider threat logic
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago