New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-100 Exam - Topic 14 Question 17 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 17
Topic #: 14
[All SC-100 Questions]

Your company has an Azure subscription that has enhanced security enabled for Microsoft Defender for Cloud.

The company signs a contract with the United States government.

You need to review the current subscription for NIST 800-53 compliance.

What should you do first?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Titus
4 months ago
I agree, the secure score is key for compliance checks!
upvoted 0 times
...
Anglea
4 months ago
Wait, can we really trust the secure score for NIST compliance?
upvoted 0 times
...
Honey
4 months ago
Adding a compliance standard seems like a good start too!
upvoted 0 times
...
Roslyn
4 months ago
I think reviewing the audit report is more important.
upvoted 0 times
...
Pauline
5 months ago
Gotta check the secure score first!
upvoted 0 times
...
Leonida
5 months ago
I feel like adding a regulatory compliance standard is a good first step, but I also wonder if we should check the secure score first. It's tough to decide!
upvoted 0 times
...
Andra
5 months ago
I practiced a similar question where we had to check the security baseline first. That makes me lean towards option C, but I'm not completely confident.
upvoted 0 times
...
Mattie
5 months ago
I'm not entirely sure, but I remember something about secure score recommendations being important for compliance. Could that be option A?
upvoted 0 times
...
Eric
5 months ago
I think we might need to start by reviewing the compliance standards, so maybe option D is the right choice?
upvoted 0 times
...
Marylyn
5 months ago
Usability testing was covered a lot in our sessions, so perhaps C is the best choice? I hope I'm recalling it correctly!
upvoted 0 times
...
Julianna
5 months ago
Hmm, this seems straightforward. I think I'll go with blob storage since that's typically used for unstructured data like files.
upvoted 0 times
...
Bernardo
5 months ago
This question seems straightforward, I think I can handle it.
upvoted 0 times
...
Fausto
5 months ago
Okay, let's see here. The key can be stored in the database, the config file, or a separate secure file on the server. I'll need to consider the security implications of each location to determine the best option.
upvoted 0 times
...
Oretha
5 months ago
Okay, I think I've got this. The question is asking whether the application of those two patterns would prevent the unauthorized access that was discovered. Based on the information provided, the answer is likely True, since those patterns are designed to address those kinds of security issues.
upvoted 0 times
...

Save Cancel