exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 3 question 31 discussion

Actual exam question from Microsoft's SC-100
Question #: 31
Topic #: 3
[All SC-100 Questions]

For a Microsoft cloud environment, you are designing a security architecture based on the Microsoft Cloud Security Benchmark.

What are three best practices for identity management based on the Azure Security Benchmark? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

  • A. Manage application identities securely and automatically.
  • B. Manage the lifecycle of identities and entitlements.
  • C. Protect identity and authentication systems.
  • D. Enable threat detection for identity and access management.
  • E. Use a centralized identity and authentication system.
Show Suggested Answer Hide Answer
Suggested Answer: ACE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
zellck
Highly Voted 1 year, 11 months ago
Selected Answer: ACE
ACE is the answer. https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-1-use-centralized-identity-and-authentication-system Security Principle: Use a centralized identity and authentication system to govern your organization's identities and authentications for cloud and non-cloud resources. https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-2-protect-identity-and-authentication-systems Security Principle: Secure your identity and authentication system as a high priority in your organization's cloud security practice.
upvoted 8 times
zellck
1 year, 11 months ago
https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-3-manage-application-identities-securely-and-automatically Security Principle: Use managed application identities instead of creating human accounts for applications to access resources and execute code. Managed application identities provide benefits such as reducing the exposure of credentials. Automate the rotation of credential to ensure the security of the identities.
upvoted 2 times
...
...
Delatalase
Most Recent 4 months, 1 week ago
Selected Answer: BCD
Based on the Azure Security Benchmark, here are three best practices for identity management in a Microsoft cloud environment: Manage the lifecycle of identities and entitlements (B): Ensure that identities and their access rights are managed throughout their lifecycle, from creation to deactivation, to maintain security and compliance. Protect identity and authentication systems ©: Implement strong protections for identity and authentication systems, such as multi-factor authentication (MFA), to safeguard against unauthorized access. Enable threat detection for identity and access management (D): Use tools and services to detect and respond to threats related to identity and access management, helping to identify and mitigate potential security incidents.
upvoted 1 times
...
TomRoute66
7 months ago
Selected Answer: ACE
ACE Check the following link. The answer is displayed in the beginning: IM-1, IM-2, IM-3 Link: https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management
upvoted 4 times
...
Mithu94
11 months, 3 weeks ago
Selected Answer: ACE
https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management
upvoted 3 times
...
awssecuritynewbie
2 years, 2 months ago
Selected Answer: ACE
I have tested this
upvoted 2 times
...
Ajdlfasudfo0
2 years, 2 months ago
Selected Answer: ACE
https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-identity-management
upvoted 2 times
...
Bravocado
2 years, 2 months ago
Selected Answer: ACE
The given answer is correct https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management
upvoted 3 times
...
AzureJobsTillRetire
2 years, 2 months ago
Selected Answer: ABE
I'm struggling to find "C. Protect identity and authentication systems" in the list below. IM-1: Standardize Azure Active Directory as the central identity and authentication system IM-2: Manage application identities securely and automatically IM-3: Use Azure AD single sign-on (SSO) for application access IM-4: Use strong authentication controls for all Azure Active Directory based access IM-5: Monitor and alert on account anomalies IM-6: Restrict Azure resource access based on conditions IM-7: Eliminate unintended credential exposure IM-8: Secure user access to legacy applications https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v2-identity-management
upvoted 2 times
AWSPro24
3 months, 1 week ago
You're looking at v2. This is v3 https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-1-use-centralized-identity-and-authentication-system
upvoted 1 times
...
AzureJobsTillRetire
2 years, 2 months ago
D. Enable threat detection for identity and access management. This is under Logging and threat detection, and hence this option is out. https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-logging-threat-detection
upvoted 1 times
...
AzureJobsTillRetire
2 years, 2 months ago
Sorry my bad, the answers should be ACE B. Manage the lifecycle of identities and entitlements This is under Privileged access, and hence this option is out https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-privileged-access
upvoted 1 times
...
Bravocado
2 years, 2 months ago
Look at the latest v3 instead of the v2 - https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-2-protect-identity-and-authentication-systems
upvoted 6 times
...
...
awssecuritynewbie
2 years, 2 months ago
Selected Answer: ABE
I would say A B E . The link posted does not show the rest of them .
upvoted 1 times
...
tech_rum
2 years, 2 months ago
correct https://learn.microsoft.com/en-us/security/benchmark/azure/security-controls-v2-identity-management
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago