exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 1 question 23 discussion

Actual exam question from Microsoft's SC-100
Question #: 23
Topic #: 1
[All SC-100 Questions]

29 DRAG DROP

For a Microsoft cloud environment, you need to recommend a security architecture that follows the Zero Trust principles of the Microsoft Cybersecurity Reference Architectures (MCRA).

Which security methodologies should you include in the recommendation? To answer, drag the appropriate methodologies to the correct principles. Each methodology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
zellck
Highly Voted 1 year, 11 months ago
1. Segmenting access 2. Data classification 3. JIT access https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-overview#guiding-principles-of-zero-trust - Assume breach Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses. - Verify explicitly Always authenticate and authorize based on all available data points. - Use least privilege access Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.
upvoted 21 times
zellck
1 year, 11 months ago
Gotten this in May 2023 exam.
upvoted 4 times
...
...
Baz10
Highly Voted 1 year ago
On Exam 8 Apr 2024 scored 764 1. Segmenting access 2. Data classification 3. JIT access
upvoted 6 times
...
Er_01
Most Recent 2 months, 2 weeks ago
1 - segment access - assume breach means contain attacker 2- JIT - slide 31 JIT / JEA under explicit and least privileged. The issue is they left out JEA as an option but per slide 31 it infers both. Misleading question that requires more clarity and accuracy for such a fundamental concept.
upvoted 1 times
...
Lapatiser
6 months ago
From page 31 of MCRA, correct answer is: Business continuity Segmenting Access Just-in-time (JIT)
upvoted 2 times
alessag
3 months, 1 week ago
I don't think it is correct because slide #31 doesn't mention Business continuity, but business enablement. It is a bit different. Question is: please help me to understand why do you think behind enablement = business continuity?
upvoted 1 times
...
...
emartiy
10 months, 1 week ago
I have checked MCRA presentation (Pages 31-32) Source: aka.ms/MCRA(Download presentation file from link bottom of page on the link aka) 1-Business continuity - Assume breach 2 -Segmenting - Verify explicitly 3 -Just-intime (JIT) - Use least privilege access
upvoted 1 times
alessag
3 months, 1 week ago
I don't think it is correct because slide #31 doesn't mention Business continuity, but business enablement. It is a bit different. Question is: please help me to understand why do you think behind enablement = business continuity?
upvoted 2 times
...
...
cris_exam
1 year, 2 months ago
Answer seems correct. Slide 31 of the MCRA. https://github.com/MicrosoftDocs/security/blob/main/Downloads/mcra-december-2023.pptx?raw=true
upvoted 2 times
...
Ario
1 year, 9 months ago
Segmenting access is an important methodology for implementing a least privileged access approach within a Zero Trust architecture
upvoted 2 times
...
edurakhan
1 year, 11 months ago
Exam question 5/25/2023
upvoted 4 times
...
PrettyFlyWifi
2 years ago
Slide 20 of the MCRA, answer looks correct!
upvoted 3 times
...
God2029
2 years, 2 months ago
Segmentation will contain the breach with the specific instance - This will help to isolate the breach. Enforcing Principle 1 : Assume Breach Data Classification helps to determine the most sentive data and labeling them, enforcing RBAC based access control on the data will help to enforce the Principle 2 Verify Explicitly. Finally JIT is providing access based on time period, Enforcing the 3rd in the list, Principles of Least Previlage
upvoted 4 times
...
Ceuse
2 years, 2 months ago
Answer Looks Good : https://www.microsoft.com/en-us/security/business/zero-trust Zero Trust principles Verify explicitly Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies. Use least-privilege access Limit user access with just-in-time and just-enough-access (JIT/JEA), risk-based adaptive polices, and data protection to help secure both data and productivity. Assume breach Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
upvoted 3 times
...
Jame
2 years, 2 months ago
I think Answer is correct. https://www.microsoft.com/en-us/security/business/zero-trust Zero Trust principles Verify explicitly Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies. Use least-privilege access Limit user access with just-in-time and just-enough-access (JIT/JEA), risk-based adaptive polices, and data protection to help secure both data and productivity. Assume breach Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago