Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-100 Exam - Topic 9 Question 32 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 32
Topic #: 9
[All SC-100 Questions]

You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.)

After remediating the threat which policy definition should you assign to prevent the threat from reoccurring?

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Contribute your Thoughts:

0/2000 characters
Sarina
4 months ago
Agreed, A is the way to go for preventing future threats!
upvoted 0 times
...
Glennis
4 months ago
B sounds good, but I’m not convinced it’s the best choice.
upvoted 0 times
...
Carlee
4 months ago
Wait, are we sure D is even relevant here?
upvoted 0 times
...
Cherelle
5 months ago
I think C makes more sense, shared keys can be a vulnerability.
upvoted 0 times
...
Caitlin
5 months ago
Definitely A, public access is a big risk!
upvoted 0 times
...
Maryanne
5 months ago
I thought we covered the importance of not expiring storage account keys, but that seems more like a maintenance issue than a prevention strategy. I'm leaning towards option A.
upvoted 0 times
...
Sue
5 months ago
I have a vague recollection of shared key access being a security risk. Option C sounds familiar, but I can't recall the specifics.
upvoted 0 times
...
Ozell
5 months ago
I remember a practice question about Azure Key Vault and purge protection. It feels relevant, but I don't think that's the right answer here.
upvoted 0 times
...
Ivette
5 months ago
I think we discussed something about public access in storage accounts during our last study session. It might be option A, but I'm not entirely sure.
upvoted 0 times
...
Adelle
5 months ago
Whoa, this is a tricky one. There are a lot of details to consider, and the options seem pretty similar. I'll need to really focus and analyze this step-by-step to make the right choice.
upvoted 0 times
...
Sharika
5 months ago
Hmm, I'm a bit unsure about this one. The exhibit doesn't provide much context, and the options seem similar. I'll need to think this through carefully to make sure I select the right policy.
upvoted 0 times
...
Shenika
5 months ago
This looks like a straightforward security policy question. I'll carefully review the exhibit and the options to determine the best policy to prevent the threat from reoccurring.
upvoted 0 times
...
Merissa
6 months ago
Ah, I've seen this type of question before. The key is to identify the specific threat and then choose the policy that directly addresses it. I think I've got this one figured out.
upvoted 0 times
...
Jill
6 months ago
I think I've got a good handle on this. The key is to make sure the Lambda function can securely access the Aurora database in the private subnet. Option A looks like the way to go - configure the Lambda function for VPC1 access and use a security group to allow the necessary TCP traffic.
upvoted 0 times
...
Darell
6 months ago
Hmm, I'm a bit unsure about this one. I know DHCP Spoofing is when an attacker impersonates a DHCP server, but I'm not sure if that's the same as exhausting IP addresses. Let me think this through a bit more.
upvoted 0 times
...
Ruby
6 months ago
I'm a bit confused about the difference between using

with a style attribute versus the

element.
upvoted 0 times
...
Novella
6 months ago
I'm a little confused on this one. I'll need to review my notes on cost accounting to make sure I understand the relationships between these different cost elements.
upvoted 0 times
...
Freeman
6 months ago
I'm pretty confident that option B is the way to go. Copying the existing schemes and associating them with new projects for TV and Radio seems like the most straightforward solution.
upvoted 0 times
...
Lisha
6 months ago
Cloud Datastore is definitely the way to go here. It's a fully managed NoSQL database that can automatically scale to handle the expected growth, which is exactly what the question is asking for. I feel pretty confident about this one.
upvoted 0 times
...
Thaddeus
10 months ago
Haha, you guys are off the mark. The answer is clearly B - enabling purge protection on the Azure Key Vault Managed HSM. That's the only way to really lock down the security of this system.
upvoted 0 times
...
Lelia
10 months ago
Ha! I bet the answer is A. Disallowing public access to the storage account seems like the most obvious solution here. What do you think, Candidate D?
upvoted 0 times
Suzi
9 months ago
Candidate D, what do you think? Which policy definition do you believe should be assigned to prevent the threat from reoccurring?
upvoted 0 times
...
Colby
9 months ago
I'm not sure, but I think B could also be a valid option. Enabling purge protection for Azure Key Vault Managed HSM could enhance security.
upvoted 0 times
...
Minna
9 months ago
I think the answer might be C. Preventing shared key access could also help prevent the threat from reoccurring.
upvoted 0 times
...
Felix
9 months ago
I agree with you, User A. Disallowing public access to the storage account is a good security measure.
upvoted 0 times
...
...
Peggy
10 months ago
Wait, is this a trick question? I'm pretty sure the answer is D - storage account keys should not be expired. That would be the best way to prevent this threat from reoccurring.
upvoted 0 times
Erick
9 months ago
Definitely, keeping the storage account keys from expiring would be a good way to maintain security.
upvoted 0 times
...
Dominic
9 months ago
I agree, D seems like the most logical choice to prevent the threat from happening again.
upvoted 0 times
...
Armando
9 months ago
D) Storage account keys should not be expired
upvoted 0 times
...
Zoila
9 months ago
C) Storage accounts should prevent shared key access
upvoted 0 times
...
Lashanda
10 months ago
B) Azure Key Vault Managed HSM should have purge protection enabled
upvoted 0 times
...
Lenna
10 months ago
A) Storage account public access should be disallowed
upvoted 0 times
...
...
Jesusita
11 months ago
Hmm, this looks like a tricky one. I think the correct answer is C, since the security alert is about preventing shared key access to the storage account.
upvoted 0 times
Krystal
10 months ago
User 3: Yes, I think C is the right choice to prevent the threat from reoccurring.
upvoted 0 times
...
Henriette
10 months ago
I'm not sure, but I think option D could also help by ensuring the storage account keys are not expired.
upvoted 0 times
...
Lisha
10 months ago
I think option A might also be a good choice to disallow public access to the storage account.
upvoted 0 times
...
Fernanda
10 months ago
User 2: I agree, that makes sense. Shared key access should be prevented to enhance security.
upvoted 0 times
...
Mitzie
10 months ago
I agree with you, option C seems like the best choice to prevent shared key access.
upvoted 0 times
...
Ernest
10 months ago
User 1: I think the correct answer is C, since the security alert is about preventing shared key access to the storage account.
upvoted 0 times
...
...
Shayne
11 months ago
Hmm, that makes sense too. We should consider all options before making a decision.
upvoted 0 times
...
Katie
11 months ago
I disagree, I believe the correct answer is C) Storage accounts should prevent shared key access.
upvoted 0 times
...
Shayne
11 months ago
I think the answer is A) Storage account public access should be disallowed.
upvoted 0 times
...
Rusty
11 months ago
Hmm, that makes sense too. We should consider all options before making a decision.
upvoted 0 times
...
Pa
12 months ago
I disagree, I believe the correct answer is C) Storage accounts should prevent shared key access.
upvoted 0 times
...
Rusty
12 months ago
I think the answer is A) Storage account public access should be disallowed.
upvoted 0 times
...

Save Cancel