Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam SC-100 Topic 1 Question 59 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 59
Topic #: 1
[All SC-100 Questions]

A customer has a hybrid cloud infrastructure that contains a Microsoft 365 E5 subscription and an Azure subscription.

All the on-premises servers in the perimeter network are prevented from connecting directly to the internet.

The customer recently recovered from a ransomware attack.

The customer plans to deploy Microsoft Sentinel.

You need to recommend configurations to meet the following requirements:

* Ensure that the security operations team can access the security logs and the operation logs.

* Ensure that the IT operations team can access only the operations logs, including the event logs of the servers in the perimeter network.

Which two configurations can you include in the recommendation? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Caitlin
3 days ago
This question seems straightforward. I think the key is to focus on the requirements around access to the security and operations logs. The Azure AD Conditional Access policies and resource-based RBAC seem like the most relevant configurations to meet those requirements.
upvoted 0 times
...
Pamella
5 months ago
The IT ops team is so excited about the operations logs, they're planning a special 'Log Appreciation Day' with cake and streamers. Just don't tell the security team - they might crash the party!
upvoted 0 times
...
Emilio
5 months ago
Hmm, this looks like a job for the log-wrangling, RBAC-juggling, Azure-hugging superhero! I'd go with B and C to get the job done.
upvoted 0 times
Gladis
4 months ago
The Azure Monitor agent might be a good addition to the recommendation to enhance monitoring capabilities.
upvoted 0 times
...
Selma
4 months ago
Azure Active Directory (Azure AD) Conditional Access policies could also be useful in controlling access to the logs.
upvoted 0 times
...
Cherri
4 months ago
Resource-based role-based access control (RBAC) is essential to ensure the IT operations team can access only the necessary logs.
upvoted 0 times
...
Maryanne
4 months ago
I agree, using a custom collector with the Log Analytics agent will definitely help with accessing the security and operation logs.
upvoted 0 times
...
...
Hubert
5 months ago
This is a tricky one, but I'm leaning towards B and D. The custom collector and Azure Monitor agent can handle the log collection, and RBAC can manage the access control.
upvoted 0 times
...
Detra
5 months ago
A and D seem like the way to go. Azure AD Conditional Access policies can secure access to the logs, and the Azure Monitor agent can collect the necessary data.
upvoted 0 times
Meaghan
4 months ago
A: It's important to have the right configurations in place, especially after recovering from a ransomware attack.
upvoted 0 times
...
Keneth
4 months ago
B: Yes, and deploying the Azure Monitor agent will ensure that the necessary data is collected for monitoring.
upvoted 0 times
...
Trinidad
4 months ago
A: I agree, using Azure AD Conditional Access policies can help control who has access to the logs.
upvoted 0 times
...
...
Robt
5 months ago
I think B and C would work well here. The custom collector using the Log Analytics agent can gather the security and operations logs, and resource-based RBAC can help control access to those logs.
upvoted 0 times
Arminda
4 months ago
Azure Active Directory Conditional Access policies could also be useful to further secure access to the logs.
upvoted 0 times
...
Theresia
5 months ago
Resource-based RBAC can definitely help control access to the logs based on team roles.
upvoted 0 times
...
Lashon
5 months ago
I agree, using a custom collector with Log Analytics agent can help gather the necessary logs.
upvoted 0 times
...
...
Francoise
6 months ago
I believe we should also include a custom collector that uses the Log Analytics agent to meet the requirements.
upvoted 0 times
...
Candra
6 months ago
I agree with you, Sherell. That will help ensure that the security operations team can access the security logs and the operation logs.
upvoted 0 times
...
Sherell
6 months ago
I think we should include Azure Active Directory Conditional Access policies in the recommendation.
upvoted 0 times
...

Save Cancel