New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-100 Exam - Topic 13 Question 9 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 9
Topic #: 13
[All SC-100 Questions]

Your on-premises network contains an e-commerce web app that was developed in Angular and Nodejs. The web app uses a MongoDB database. You plan to migrate the web app to Azure. The solution architecture team proposes the following architecture as an Azure landing zone.

You need to provide recommendations to secure the connection between the web app and the database. The solution must follow the Zero Trust model.

Solution: You recommend implementing Azure Key Vault to store credentials.

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Hillary
4 months ago
I thought there were better options for securing DB connections.
upvoted 0 times
...
Carmen
4 months ago
Key Vault is essential for Zero Trust, good call!
upvoted 0 times
...
Catherin
4 months ago
Wait, isn't Key Vault just for secrets? What about other security measures?
upvoted 0 times
...
Sharita
5 months ago
Totally agree, it enhances security big time.
upvoted 0 times
...
Devon
5 months ago
Storing credentials in Azure Key Vault is a solid move!
upvoted 0 times
...
Marya
5 months ago
I vaguely recall that just using Key Vault might not cover all aspects of securing the connection. We might need to consider network security groups or private endpoints too.
upvoted 0 times
...
Celia
5 months ago
I feel like while Key Vault is important, there might be additional steps needed to fully align with the Zero Trust model.
upvoted 0 times
...
Gladis
5 months ago
I think we practiced a similar question where we had to secure app connections, and Key Vault was part of the solution, right?
upvoted 0 times
...
Xuan
5 months ago
I remember we discussed using Azure Key Vault for managing secrets, but I'm not sure if it's enough for securing the database connection.
upvoted 0 times
...
Louann
5 months ago
This one seems straightforward. I think the answer is B - we want to reduce the coupling of the service logic to the service contract to keep the contract decoupled.
upvoted 0 times
...
Junita
5 months ago
This question seems straightforward. I'll focus on the key tasks like inventory data sources and reviewing network topology.
upvoted 0 times
...
Ettie
5 months ago
Okay, let me think this through. I think the penetration testing would provide the most useful information for identifying security control gaps on an application server. That's my best guess.
upvoted 0 times
...
Anissa
5 months ago
This is a straightforward question about process mapping terminology. NVA means non-value add, so I'll confidently select A as the answer.
upvoted 0 times
...

Save Cancel