New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-100 Exam - Topic 3 Question 22 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 22
Topic #: 3
[All SC-100 Questions]

Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security Best Practices.

You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART) approach in Microsoft Security Best Practices.

What should you include in the response plan?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
King
4 months ago
Totally agree with machine isolation, it's essential for containment!
upvoted 0 times
...
Tommy
4 months ago
Wait, can memory scanning really catch everything?
upvoted 0 times
...
Elizabeth
4 months ago
Controlled folder access really helps prevent data loss.
upvoted 0 times
...
Grover
4 months ago
I think application isolation is just as important.
upvoted 0 times
...
Mila
5 months ago
Machine isolation is a must in any response plan!
upvoted 0 times
...
Mira
5 months ago
Application isolation sounds familiar too, but I’m leaning towards machine isolation being the most effective response strategy.
upvoted 0 times
...
Cordie
5 months ago
Controlled folder access was mentioned in a practice question, but I feel like it’s more about prevention than response.
upvoted 0 times
...
Kara
5 months ago
I'm not entirely sure about user isolation. I think it might be important, but I can't recall if it was emphasized as much as other options.
upvoted 0 times
...
Chuck
5 months ago
I remember we discussed machine isolation as a key step in the DART approach. It seems crucial for containing threats.
upvoted 0 times
...
Stacey
5 months ago
The key here is understanding what data CNEA uses. I'll review the information I have on that.
upvoted 0 times
...
Xochitl
5 months ago
Hmm, I'm not sure about the correct answer here. I'll need to think through the key characteristics of XML to determine which one is incorrect.
upvoted 0 times
...
Royal
5 months ago
Okay, I've got this. The key is to identify the scenarios that involve external-facing websites or portals, rather than internal employee-only applications. I think A, B, and D are the correct answers.
upvoted 0 times
...
Kiley
5 months ago
The hierarchical topology option for L3VPNs sounds familiar; I believe it helps with managing larger networks.
upvoted 0 times
...
Linn
10 months ago
Hmm, this one's tough. I'm feeling like A) controlled folder access is the way to go. That way, we can keep the ransomware from getting its grubby little hands on our important files. Although, if it does manage to get in, I hope it at least has the decency to leave the 'Memes of the Month' folder alone.
upvoted 0 times
Lisandra
8 months ago
User isolation with E) might be necessary to limit the impact of ransomware on individual users.
upvoted 0 times
...
Desire
8 months ago
Memory scanning with C) could help detect any malicious activity in real-time.
upvoted 0 times
...
Antonio
9 months ago
We should also consider D) machine isolation to contain the spread of ransomware to other computers.
upvoted 0 times
...
Merrilee
9 months ago
I agree, A) controlled folder access is crucial to prevent ransomware from accessing important files.
upvoted 0 times
...
Luis
9 months ago
If all else fails, E) user isolation can help limit the impact of ransomware by isolating affected users.
upvoted 0 times
...
Roslyn
9 months ago
C) memory scanning can help detect any malicious activity in the system memory.
upvoted 0 times
...
Gracia
10 months ago
We should also consider D) machine isolation to contain the spread of ransomware to other computers.
upvoted 0 times
...
Evelynn
10 months ago
I agree, A) controlled folder access is crucial to prevent ransomware from accessing our important files.
upvoted 0 times
...
...
Moon
10 months ago
Ah, the classic ransomware response plan. I'd say C) memory scanning is the way to go. Gotta catch those sneaky little buggers before they can encrypt all our files. Although, I'm kinda hoping they leave the 'cat playing the piano' folder alone, that's our office treasure!
upvoted 0 times
...
Annelle
11 months ago
I think we should also consider machine isolation to contain the threat.
upvoted 0 times
...
Judy
11 months ago
Okay, let's see... I'm gonna go with B) application isolation. That way, we can keep the bad stuff contained and not let it spread like a nasty cold through the entire system. Wouldn't want the printers to get infected, that'd be a disaster!
upvoted 0 times
Claudio
9 months ago
User2: Definitely, containing the threat is key to minimizing the impact on our resources.
upvoted 0 times
...
Ocie
10 months ago
User1: I agree, B) application isolation is crucial to prevent the spread of ransomware.
upvoted 0 times
...
...
Marguerita
11 months ago
Hmm, this seems like a tricky one. I think the answer is D) machine isolation. Gotta keep those infected computers away from the rest of the network, right? I mean, who wants a ransomware party in the office?
upvoted 0 times
Florinda
9 months ago
Exactly, isolating the compromised machines is crucial in preventing further damage.
upvoted 0 times
...
Bong
9 months ago
Agreed, we can't risk spreading the ransomware to other machines.
upvoted 0 times
...
Na
9 months ago
Definitely D) machine isolation. It's important to contain the infected computers.
upvoted 0 times
...
Janella
10 months ago
E) user isolation
upvoted 0 times
...
Sabra
10 months ago
D) machine isolation
upvoted 0 times
...
Abel
10 months ago
C) memory scanning
upvoted 0 times
...
Johnna
10 months ago
B) application isolation
upvoted 0 times
...
Joanna
10 months ago
A) controlled folder access
upvoted 0 times
...
...
Paris
11 months ago
I agree with Gracia, controlled folder access can help prevent ransomware from spreading.
upvoted 0 times
...
Gracia
11 months ago
I think we should include controlled folder access in the response plan.
upvoted 0 times
...

Save Cancel