Microsoft Certified: Cybersecurity Architect Expert - (SC-100) Logo
Microsoft Logo

Microsoft Certified: Cybersecurity Architect Expert - (SC-100) Exam Questions

80

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 11 Single Choice

Your company has an on-premises environment. They want to migrate this environment to Azure. The on-premises environment consists of applications that need to be migrated to the cloud. The applications currently issue requests via the use of LDAP queries against an existing service. You have to migrate the applications to Azure. Which of the following identity service can be used to issue LDAP queries against?

Question 12 Single Choice

Your company is planning on developing and deploying a web application. The application would allow users to log in with the usage of their external identities such as Facebook and Google. You have to ensure that a separate store is created on Azure for storage and management of the identities. Which of the following can be used for this requirement?

Question 13 Single Choice

Your company has just setup an Azure AD tenant and an Azure subscription. They are currently using the Free edition of Azure Active Directory. Which of the following feature would require the use of Azure AD Premium-based licences?

Question 14 Single Choice

Which of the following can be used as a guidance when it comes to validating trust for all of your identities, endpoints and applications?

Question 15 Single Choice

Your team has a setup for Microsoft Sentinel in place. They have the Data connectors setup and the Analytics rules in place.

The security engineers want to create views based on the information collected by Microsoft Sentinel, so that they can further analyse the events. Which of the following can be used for this requirement?

Question 16 Single Choice

Your team is developing a web application. They want to follow the best practices when it comes to developing security within the application.

Which of the following can be performed to check for security vulnerabilities such as cross-site scripting, user privilege issues, SQL injection?

Question 17 Single Choice

Your team is developing a web application. They want to follow the best practices when it comes to developing security within the application.

Which of the following can be performed to check for potential vulnerabilities in non-running code?

Question 18 Single Choice

Your company wants to deploy a web application onto Azure. It would be hosted on an Azure Web App. They want to protect the web application against internet-based attacks, especially when it comes to bots trying to scan the web application. Which of the following could be deployed along with the Azure Web app for this requirement?

Question 19 Single Choice

Your company has a set of servers in their on-premises environment. The company is planning on using the Azure Backup service to backup the data on the servers. You have to protect the backups against ransomware attacks. Which of the following can be included in the implementation for the backup process?

Question 20 Single Choice

Your company has an Azure subscription and Microsoft 365 licences. They want to evaluate the security posture of their Windows 10 devices and Azure storage accounts.

Which of the following can be used to evaluate the security posture of the Azure Storage accounts?

Page: 2 / 8