Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam SC-100 Topic 2 Question 28 Discussion

Actual exam question for Microsoft's SC-100 exam
Question #: 28
Topic #: 2
[All SC-100 Questions]

You have a Microsoft 365 subscription and an Azure subscription. Microsoft 365 Defender and Microsoft Defender for Cloud are enabled.

The Azure subscription contains 50 virtual machines. Each virtual machine runs different applications on Windows Server 2019.

You need to recommend a solution to ensure that only authorized applications can run on the virtual machines. If an unauthorized application attempts to run or be installed, the application must be blocked automatically until an administrator authorizes the application.

Which security control should you recommend?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Ronald
5 days ago
This looks like a pretty straightforward question about application control policies. I think I'll go with option D - Microsoft Defender for Endpoint's application control policies. That seems like the most direct way to control which apps can run on the VMs.
upvoted 0 times
...
Mel
5 days ago
Hmm, I'm a bit unsure about this one. The question mentions Microsoft 365 Defender and Microsoft Defender for Cloud, so I'm wondering if one of those solutions might be a better fit. Maybe I should look into the OAuth app policies in Microsoft Defender for Cloud Apps (option B) as well.
upvoted 0 times
...
Arlyne
7 days ago
I'm pretty confident about this one. The Schema Centralization pattern is all about having a shared schema that multiple services can depend on, so the answer has to be True.
upvoted 0 times
...
Leatha
10 days ago
Okay, let's see... I know there are things like condition, error, and timeout, but I'm not sure about the other options. I'll have to review my notes on exception handling.
upvoted 0 times
...
Elly
14 days ago
I'm a bit confused by the question. Superscan and NBTscan don't seem like the right tools for this task. I'll have to review my notes on network reconnaissance and OS detection to make the best choice.
upvoted 0 times
...
Wilda
14 days ago
I've got this! The query is updating the "name" field for all documents where the "id" is between 1 and 3, so the answer is 3 documents.
upvoted 0 times
...
Denise
17 days ago
Hmm, I'm not totally sure about this one. I know there are a few group techniques, but I can't remember the exact names. I'll have to think it through carefully.
upvoted 0 times
...
Dorathy
5 months ago
I bet the correct answer is B. Adaptive application controls in Defender for Cloud. It's like the bouncer at the virtual nightclub, keeping the unwanted apps out!
upvoted 0 times
...
Nina
5 months ago
B. Adaptive application controls in Defender for Cloud is the way to go! Easy to set up and will keep those rogue apps in check. No more 'unauthorized app of the day' surprises!
upvoted 0 times
Effie
4 months ago
I've had success with adaptive application controls in Defender for Cloud, it's effective.
upvoted 0 times
...
Truman
4 months ago
Definitely, it's a simple solution to keep those unauthorized apps at bay.
upvoted 0 times
...
Chaya
4 months ago
I agree, adaptive application controls are a great way to ensure only authorized apps run.
upvoted 0 times
...
Blondell
4 months ago
I've had success with adaptive application controls in Defender for Cloud, it's a reliable security control.
upvoted 0 times
...
Glennis
4 months ago
Definitely, it's a simple solution to ensure only authorized applications run on the virtual machines.
upvoted 0 times
...
Louann
5 months ago
I agree, adaptive application controls are great for keeping unauthorized apps in check.
upvoted 0 times
...
...
Leonora
5 months ago
Hmm, I'm leaning towards D. app protection policies in Microsoft Endpoint Manager. Seems like a comprehensive solution to manage and secure the applications across the VMs.
upvoted 0 times
France
4 months ago
What about A) app discovery anomaly detection policies in Microsoft Defender for Cloud Apps? It could help identify unauthorized applications before they even run.
upvoted 0 times
...
Margery
4 months ago
I see your point, but I still think D) app protection policies in Microsoft Endpoint Manager is the way to go. It offers a centralized approach to application management.
upvoted 0 times
...
Dominga
5 months ago
I disagree, C) Azure Security Benchmark compliance controls in Defender for Cloud would be my choice. It ensures that the virtual machines meet security best practices.
upvoted 0 times
...
Luisa
5 months ago
I think B) adaptive application controls in Defender for Cloud would be a better option. It provides more granular control over which applications can run.
upvoted 0 times
...
...
Suzan
6 months ago
I'm not sure about option B). I think option A) app discovery anomaly detection policies in Microsoft Defender for Cloud Apps might be a better choice. It could help us detect unauthorized applications more effectively.
upvoted 0 times
...
Yasuko
6 months ago
I agree with Kenneth. Option B) seems like the best choice to ensure only authorized applications can run on the virtual machines. It provides the control we need.
upvoted 0 times
...
Terina
6 months ago
I'd say C. Azure Security Benchmark compliance controls in Defender for Cloud. That way, we can ensure the VMs meet the security standards and prevent unauthorized apps.
upvoted 0 times
Nan
5 months ago
I think B might also work well to control which applications can run on the virtual machines.
upvoted 0 times
...
Jeanice
5 months ago
I agree, C sounds like the best option to ensure security standards are met.
upvoted 0 times
...
...
Karan
6 months ago
Definitely go with B. Adaptive application controls in Defender for Cloud. That's the perfect solution to control and monitor the authorized applications on the VMs.
upvoted 0 times
...
Kenneth
6 months ago
I think we should go with option B) adaptive application controls in Defender for Cloud. It sounds like it will help us control which applications can run on the virtual machines.
upvoted 0 times
...

Save Cancel