exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 4 question 22 discussion

Actual exam question from Microsoft's SC-100
Question #: 22
Topic #: 4
[All SC-100 Questions]

You have a Microsoft 365 subscription that syncs with Active Directory Domain Services (AD DS).

You need to define the recovery steps for a ransomware attack that encrypted data in the subscription. The solution must follow Microsoft Security Best Practices.

What is the first step in the recovery plan?

  • A. From Microsoft Defender for Endpoint, perform a security scan.
  • B. Recover files to a cleaned computer or device.
  • C. Contact law enforcement.
  • D. Disable Microsoft OneDrive sync and Exchange ActiveSync.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Stubentiger
Highly Voted 1 year, 11 months ago
Selected Answer: D
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/recover-from-ransomware?view=o365-worldwide
upvoted 11 times
ariania
3 months ago
The first step in the recovery plan, following Microsoft Security Best Practices, would be: D. Disable Microsoft OneDrive sync and Exchange ActiveSync. This step isolates the affected devices by stopping synchronization with Microsoft services (like OneDrive and Exchange) to prevent further spread of the ransomware or data encryption across other systems. Once the environment is isolated, further investigation and recovery actions can be taken.
upvoted 1 times
...
...
MWP
Most Recent 7 months, 1 week ago
I think B is the answer. https://learn.microsoft.com/en-us/defender-xdr/playbook-responding-ransomware-m365-defender?view=o365-worldwide#step-1-verify-your-backups
upvoted 1 times
Gythms
3 months, 3 weeks ago
When you suspect you were or are currently under a ransomware attack, establish secure communications with your incident response team immediately. They can perform the following response phases to disrupt the attack and mitigate the damage: 1. Investigation and containment 2. Eradication and recovery So we have to execute containment (answer D), before we can proceed with eradication (A) and recovery (B,C)
upvoted 1 times
...
...
cris_exam
9 months, 3 weeks ago
Selected Answer: A
Contrary to what the majority voted here (D), I judge that the answer is A. I base my logic on the below MS doc which covers the exact scope of the question: Eradication and recovery. https://learn.microsoft.com/en-us/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-worldwide#eradication-and-recovery Here we find all the steps for the Recovery process in the eventuality of a successful ransomware attack. 1. Verify your backups 2. Add indicators 3. Reset compromised users 4. Isolate attacker control points 5. Remove malware 6. Recover files on a cleaned device 7. Recover files in OneDrive for Business 8. Recover deleted email 9. Re-enable Exchange ActiveSync and OneDrive sync See continuation in below reply
upvoted 3 times
cris_exam
9 months, 3 weeks ago
... Step 5, which is before re-enabling sync (of course since this is recovery, it was already disabled within the previous Containment phase on step 3) and more so before step 6, which is B, as part of the potential answers for this question, it says the below: "Run a full, current antivirus scan on all suspected computers and devices to detect and remove the payload that is associated with the ransomware." This makes me think that this is what the question is after, hence a Defender for Endpoint AV scan would be spot on from step 5 from the Recovery phase, and it's the FIRST as the question phrases it, before steps 6 and 9. If anybody has a better theory... please shoot
upvoted 2 times
whh13
3 days, 19 hours ago
It should B, according to your list, step 5 is eradiation, step 6 "Recover filess" is the recovery stage.
upvoted 1 times
...
...
...
Ramye
11 months, 1 week ago
I can understand answer should be D to the contaiment but any of the articles shared below talk about stopping sync with OneDrive and Exchange. Can anyone spot this?
upvoted 1 times
...
juanpe147
1 year ago
Sorry, the correct link for my comment is this one: https://learn.microsoft.com/en-us/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-worldwide#eradication-and-recovery
upvoted 1 times
...
juanpe147
1 year ago
i go with A, in the Security best practices for recovery the first option of the answers available is "to make a Scan", the second one is recover files to a cleaned Computer. Disable Microsoft OneDrive Sync and Exchane Active SYNC doesnt appear in the recovery Plan, only during the Attack. https://learn.microsoft.com/en-us/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-worldwide#step-3-prevent-the-spread
upvoted 2 times
Ramye
11 months ago
Disable Microsoft OneDrive Sync and Exchane Active SYNC is to containment. If not done then the compromised files will be synced to local machines and will spread. So this is a must.
upvoted 1 times
...
...
JD57005
1 year ago
I think It's B. Keyword is Recovery https://learn.microsoft.com/en-us/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-worldwide#eradication-and-recovery
upvoted 1 times
...
Argo14
1 year, 1 month ago
I would say A: Run a full, current antivirus scan https://learn.microsoft.com/en-us/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-worldwide#step-5-remove-malware
upvoted 3 times
...
rishiraval007
1 year, 1 month ago
The first step in the recovery plan for a ransomware attack, following Microsoft Security Best Practices, would be: B. Recover files to a cleaned computer or device. Recovering files to a cleaned computer or device is crucial because it ensures that you are restoring data in a safe environment, free from the ransomware infection. This step helps to prevent the re-infection of your systems and data.
upvoted 1 times
...
ConanBarb
1 year, 2 months ago
Selected Answer: B
I'd say B (since this is about "define the recovery steps" which is interpret as _after_ the attack, not during) BTW: _During_ an attack, step no 2 is: "Contact your local or federal law enforcement agencies." https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware#what-to-do-during-an-attack So not even during an attack is "Disable Exchange ActiveSync and OneDrive sync" the first step in the list.
upvoted 1 times
Ramye
11 months ago
Containment of compromised/infected files also part of the recovery process, otherwise, this could lead to much bigger problem.
upvoted 1 times
...
...
zellck
1 year, 7 months ago
Selected Answer: D
D is the answer. https://learn.microsoft.com/en-us/microsoft-365/security/defender/playbook-responding-ransomware-m365-defender?view=o365-worldwide#step-3-prevent-the-spread Use this list to keep the attack from spreading to additional entities. - Disable Exchange ActiveSync and OneDrive sync Pausing OneDrive sync helps protect your cloud data from being updated by potentially infected devices.
upvoted 2 times
...
shahnawazkhot
1 year, 8 months ago
The key point here is to stop the spread of data encryption by the ransomware. Therefore, answer "D" appears a correct option.
upvoted 1 times
ConanBarb
1 year, 2 months ago
sorry, disagree. The point is to "define the recovery steps", i.e. not stopping the spread
upvoted 1 times
...
...
Rocko1
1 year, 9 months ago
Selected Answer: D
Answer is "d" https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/recover-from-ransomware?view=o365-worldwide#step-2-disable-exchange-activesync-and-onedrive-sync
upvoted 1 times
...
SinceLaur
1 year, 9 months ago
I would go with B. D is more a preventive measure, but not a recovery process.
upvoted 2 times
...
God2029
1 year, 9 months ago
Answer make sense. First - Isolate the incident
upvoted 1 times
ConanBarb
1 year, 2 months ago
"define the recovery steps"
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago