SX-100

SX-100

Professional Development

8 Qs

quiz-placeholder

Similar activities

Microsoft fabric

Microsoft fabric

Professional Development

6 Qs

Inside Sales Trivia

Inside Sales Trivia

Professional Development

10 Qs

Microsoft 365 Core Fundamental

Microsoft 365 Core Fundamental

Professional Development

9 Qs

Ncomputing: Taking Virtualization Desktop to New Heights

Ncomputing: Taking Virtualization Desktop to New Heights

Professional Development

7 Qs

Know your VQ

Know your VQ

Professional Development

10 Qs

Stuff You Should Know By Now (Or After This Quiz)

Stuff You Should Know By Now (Or After This Quiz)

Professional Development

10 Qs

Day 3 Quiz

Day 3 Quiz

Professional Development

10 Qs

AZ-900 Quiz1

AZ-900 Quiz1

Professional Development

12 Qs

SX-100

SX-100

Assessment

Quiz

Other

Professional Development

Hard

Created by

Jancker jancker

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has a Microsoft 365 ES subscription.
The Chief Compliance Officer plans to enhance privacy management in the working environment.
You need to recommend a solution to enhance the privacy management. The solution must meet the following requirements:
✑ Identify unused personal data and empower users to make smart data handling decisions.
✑ Provide users with noti¬cations and guidance when a user sends personal data in Microsoft Teams.
✑ Provide users with recommendations to mitigate privacy risks.
What should you include in the recommendation?

communication compliance in insider risk management

Microsoft Viva Insights

Privacy Risk Management in Microsoft Priva

Advanced eDiscovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have an Azure subscription that has Microsoft Defender for Cloud enabled.
Suspicious authentication activity alerts have been appearing in the Workload protections dashboard.
You need to recommend a solution to evaluate and remediate the alerts by using work­ow automation. The solution must minimize development effort.
What should you include in the recommendation?

Azure Monitor webhooks

Azure Event Hubs

Azure Functions apps

Azure Logics Apps

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Your company is moving a big data solution to Azure.
The company plans to use the following storage workloads:
✑ Azure Storage blob containers
✑ Azure Data Lake Storage Gen2
Azure Storage ¬le shares -
✑ Azure Disk Storage

Which two storage workloads support authentication by using Azure Active Directory (Azure AD)? Each correct answer presents a complete
solution.
NOTE: Each correct selection is worth one point.

Azure Storage ¬le shares

Azure Disk Storage

Azure Storage blob containers

Azure Data Lake Storage Gen2

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

HOTSPOT -
Your company is migrating data to Azure. The data contains Personally Identi¬able Information (PII).
The company plans to use Microsoft Information Protection for the PII data store in Azure.
You need to recommend a solution to discover PII data at risk in the Azure resources.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:


ox 1: Azure Purview -
Microsoft Purview is a uni¬ed data governance service that helps you manage and govern your on-premises, multi-cloud, and software-as-a
service (SaaS) data.
Microsoft Purview allows you to:
Create a holistic, up-to-date map of your data landscape with automated data discovery, sensitive data classi¬cation, and end-to-end data
lineage.
Enable data curators to manage and secure your data estate.
Empower data consumers to ¬nd valuable, trustworthy data.
Box 2: Microsoft Defender for Cloud
Microsoft Purview provides rich insights into the sensitivity of your data. This makes it valuable to security teams using Microsoft Defender for


Cloud to manage the organization's security posture and protect against threats to their workloads. Data resources remain a popular target for
malicious actors, making it crucial for security teams to identify, prioritize, and secure sensitive data resources across their cloud
environments. The integration with Microsoft Purview expands visibility into the data layer, enabling security teams to prioritize resources that
contain sensitive data.
References:
https://docs.microsoft.com/en-us/azure/purview/overview
https://docs.microsoft.com/en-us/azure/purview/how-to-integrate-with-azure-security-products

You have a Microsoft 365 E5 subscription and an Azure subscription.
You are designing a Microsoft deployment.
You need to recommend a solution for the security operations team. The solution must include custom views and a dashboard for analyzing
security events.
What should you recommend using in Microsoft Sentinel?

notebooks

playbooks

workbooks

threat intelligence

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has a Microsoft 365 subscription and uses Microsoft Defender for Identity.
You are informed about incidents that relate to compromised identities.
You need to recommend a solution to expose several accounts for attackers to exploit. When the attackers attempt to exploit the accounts, an
alert must be triggered.
Which Defender for Identity feature should you include in the recommendation?

sensitivity labels

custom user tags

standalone sensors

honeytoken entity tags

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company is moving all on-premises workloads to Azure and Microsoft 365.
You need to design a security orchestration, automation, and response (SOAR) strategy in Microsoft Sentinel that meets the following
requirements:
✑ Minimizes manual intervention by security operation analysts
✑ Supports triaging alerts within Microsoft Teams channels
What should you include in the strategy?

KQL

playbooks

data connectors

workbooks

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases.
All resources are backed up multiple times a day by using Azure Backup.
You are developing a strategy to protect against ransomware attacks.
You need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a successful ransomware attack.
Which two controls should you include in the recommendation? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

Enable soft delete for backups

Require PINs for critical operations.

Encrypt backups by using customer-managed keys (CMKs).

Perform o¯ine backups to Azure Data Box.

Use Azure Monitor noti¬cations when backup con¬gurations change.

8.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

HOTSPOT -
You are creating the security recommendations for an Azure App Service web app named App1. App1 has the following speci¬cations:
✑ Users will request access to App1 through the My Apps portal. A human resources manager will approve the requests.
✑ Users will authenticate by using Azure Active Directory (Azure AD) user accounts.
You need to recommend an access security architecture for App1.
What should you include in the recommendation? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Box 1: A managed identity in Azure AD
Use a managed identity. You use Azure AD as the identity provider.
Box 2: An access review in Identity Governance
Access to groups and applications for employees and guests changes over time. To reduce the risk associated with stale access assignments,
administrators can use Azure Active Directory (Azure AD) to create access reviews for group members or application access.
Reference:
https://docs.microsoft.com/en-us/azure/app-service/scenario-secure-app-authentication-app-service https://docs.microsoft.com/enus/azure/active-directory/governance/create-access-review

A managed identity in Azure AD

An access review in Identity Governance