Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam SC-100 Topic 5 Question 18 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 18
Topic #: 5
[All SC-100 Questions]

You have an Azure subscription that contains virtual machines, storage accounts, and Azure SQL databases. All resources are backed up multiple times a day by using Azure Backup. You are developing a strategy to protect against ransomware attacks.

You need to recommend which controls must be enabled to ensure that Azure Backup can be used to restore the resources in the event of a successful ransomware attack.

Which two controls should you include in the recommendation? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Mari
1 months ago
I'm eyeing that Azure Data Box like a kid in a candy store. Offline backups are the way to go, no matter what the hackers throw at us.
upvoted 0 times
Lili
10 days ago
We should also consider encrypting backups with customer-managed keys for added security.
upvoted 0 times
...
Brendan
13 days ago
I agree, it's a reliable way to protect against ransomware attacks.
upvoted 0 times
...
Odelia
18 days ago
Offline backups to Azure Data Box are definitely a good idea.
upvoted 0 times
...
...
Deeanna
2 months ago
I'm just glad they're not asking us to enable two-factor authentication on our backup accounts. That would be too much work!
upvoted 0 times
Dierdre
14 days ago
Yeah, two-factor authentication would definitely be a hassle.
upvoted 0 times
...
Ronny
19 days ago
D) Encrypt backups by using customer-managed keys (CMKs).
upvoted 0 times
...
Flo
20 days ago
A) Use Azure Monitor notifications when backup configurations change.
upvoted 0 times
...
...
Leonida
2 months ago
I believe using Azure Monitor notifications when backup configurations change can help us detect any suspicious activity.
upvoted 0 times
...
Charlene
2 months ago
I agree with Eladia. Encrypting backups with customer-managed keys is also important for security.
upvoted 0 times
...
Ezekiel
2 months ago
B and D are also important controls. PINs for critical operations and CMK-encrypted backups add an extra layer of security.
upvoted 0 times
Cecily
1 months ago
That's a good point. Having multiple layers of protection is key in safeguarding against ransomware attacks.
upvoted 0 times
...
Trinidad
2 months ago
I think enabling soft delete for backups could also be useful in case of accidental deletions or corruption.
upvoted 0 times
...
Victor
2 months ago
Yes, I agree. PINs can help prevent unauthorized access and CMK encryption adds another level of protection.
upvoted 0 times
...
Chaya
2 months ago
B and D are also important controls. PINs for critical operations and CMK-encrypted backups add an extra layer of security.
upvoted 0 times
...
...
Lucy
2 months ago
C and E are essential to protect against ransomware. Offline backups and soft delete ensure that your data is safe even if your cloud resources are compromised.
upvoted 0 times
...
Eladia
2 months ago
I think we should enable soft delete for backups to protect against ransomware attacks.
upvoted 0 times
...

Save Cancel