SC100 - Copy1
SC100 - Copy1
Topic1 question 2
Topic1 question 3
Topic1 question 4
Topic1 question 5
Topic1 question 6
Topic1 question 7
Topic1 question 8
Topic1 question 9
Azure AD Application Registration and Access Package in Identity Governance
Topic1 question 10
Topic1 question 11
Topic1 question 12
Topic1 question 13
Topic1 question 14
Topic1 question 15
Topic1 question 16
Topic1 question 17
Topic1 question 18
Topic1 question 19
Topic1 question 20
Topic1 question 22
Topic1 question 23
Topic1 question 24
Topic1 question 25
Topic1 question 26
Topic1 question 27
Topic1 question 28
Topic1 question 29
Topic1 question 30
Topic1 question 31
Topic1 question 32
Establish Visibility
Enable Automation
Enable additional protection and detection controls
Topic2 question 1
During evaluation of existing resources, resources that match a deny policy definition are
marked as non-compliant.
Topic2 question 2
Topic2 question 3
Selection 1: Microsoft 365 Defender (Microsoft Defender for Endpoint is part of it).
Selection 2: Microsoft Defender for Cloud.
Selection 3: Microsoft Defender for Cloud.
Topic2 question 4
Topic2 question 5
Topic2 question 6
Topic2 question 7
Topic2 question 8
Topic2 question 9
Topic2 question 10
BC
Topic2 question 11
Topic2 question 12
Topic2 question 13
Topic2 question 14
Topic2 question 15
Topic2 question 16
Selection 1: NSG
Selection 2: Microsoft Defender for servers
Topic2 question 17
Topic2 question 18
Topic2 question 19
Topic2 question 20
Topic2 question 21
B
Topic2 question 22
Topic2 question 23
Topic2 question 24
Topic2 question 25
Topic2 question 26
Topic2 question 27
Topic2 question 28
Topic2 question 29
Topic2 question 30
Topic2 question 31
Topic2 question 33
Topic2 question 34
Topic2 question 36
Topic2 question 37
Topic2 question 38
Topic2 question 39
Topic2 question 40
Topic2 question 41
Topic2 question 42
1. Access Reviews.
Topic2 question 44
Topic2 question 45
Topic2 question 46
Topic2 question 47
Topic3 question 1
Topic3 question 2
AB
Topic3 question 4
Topic3 question 5
Topic3 question 6
BC
Topic3 question 8
Topic3 question 9
Topic3 question 10
Topic3 question 12
Topic3 question 13
You recommend access restrictions based on HTTP headers that have the Front Door
ID.
Topic3 question 17
Topic3 question 19
Topic3 question 21
Topic3 question 22
Topic3 question 23
Topic3 question 24
Topic3 question 25
Topic3 question 26
Topic3 question 27
Topic3 question 28
Topic3 question 29
Topic3 question 30
Topic3 question 33
Topic3 question 34
Topic3 question 36
Topic3 question 37
Topic3 question 38
Topic3 question 39
Topic4 question 2
Topic4 question 3
Topic4 question 6
Topic4 question 8
Topic4 question 9
Topic4 question 10
Topic4 question 12
Topic4 question 13
Topic4 question 14
Topic4 question 15
A
Topic4 question 16
Topic4 question 17
Topic4 question 18
Topic4 question 19
Topic4 question 20
Topic4 question 21
Topic4 question 22
Topic4 question 23
Topic4 question 24
Topic4 question 26
Topic4 question 28
Topic4 question 30
Topic4 question 31
Topic4 question 32
Topic4 question 33
Topic4 question 34
Topic4 question 35
Topic4 question 36
Topic5 question 1
Topic5 question 3
1. Azure Lighthouse
2. Azure Arc
Topic5 question 4
Topic5 question 6
Topic5 question 7
Topic5 question 9
Topic6 question 1
Topic7 question 2
Topic7 question 3
Topic7 question 4
Topic9 question 1
C
Topic9 question 2
Topic9 question 3
Topic10 question 1
Topic10 question 2
Topic11 question 1
Topic11 question 2
Topic12 question 1