Site icon TechZilica ~ On the Edge

Microsoft SC-100 Practise Test – Cybersecurity Architect #2

Microsoft SC-100 Exam

&Tab;&Tab;<div data-elementor-type&equals;"wp-post" data-elementor-id&equals;"803" class&equals;"elementor elementor-803" data-elementor-post-type&equals;"post">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-f7cbe34 e-flex e-con-boxed e-con e-parent" data-id&equals;"f7cbe34" data-element&lowbar;type&equals;"container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<div class&equals;"e-con-inner">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-ce9d3dc elementor-widget elementor-widget-heading" data-id&equals;"ce9d3dc" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"heading&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<h2 class&equals;"elementor-heading-title elementor-size-default">Intro<&sol;h2>&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-beee594 elementor-widget elementor-widget-text-editor" data-id&equals;"beee594" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"text-editor&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<p>This is the second free SC-100 practise test I have created&comma; if you haven&&num;8217&semi;t done the first one&comma; please go do that first here&colon; <a href&equals;"http&colon;&sol;&sol;techzilica&period;com&sol;microsoft-365&sol;microsoft-cybersecurity-architect-sc-100-practise-test-questions-1&sol;">Microsoft Cybersecurity Architect &lpar;SC-100&rpar; Practise Test Questions &num;1<&sol;a><&sol;p><p>In this test&comma; there is only one correct answer to each question&period;<&sol;p><p>If there is any issues that you spot&comma; please leave a comment&period;<&sol;p>&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-c116e3b elementor-widget elementor-widget-heading" data-id&equals;"c116e3b" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"heading&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<h2 class&equals;"elementor-heading-title elementor-size-default">Questions<&sol;h2>&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-18587a6 elementor-widget elementor-widget-text-editor" data-id&equals;"18587a6" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"text-editor&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<ol><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>How can you see a list of security recommendations&comma; the impact of those recommendations and the current state of security according to Microsoft best-practice&quest; <&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; Security Suggestions<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; Microsoft Secure Score<&sol;span> <br &sol;><span data-contrast&equals;"auto">c&rpar; Intune<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>How do you ensure administrative access can be maintained during an MFA outage or being unable to reach a person holding an important role to implement key changes and ensure security during an emergency&quest; <&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; Contact Microsoft Support<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; Break-Glass&sol;Emergency Access Accounts<&sol;span> <br &sol;><span data-contrast&equals;"auto">c&rpar; Microsoft Emergency Control Service<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>Which Microsoft service can fulfil Security Orchestration&comma; Automation and Response capabilities&quest; <&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; Microsoft Cloud-App Security<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; Defender for Cloud<&sol;span> <br &sol;><span data-contrast&equals;"auto">c&rpar; Microsoft Sentinel<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>A Salesperson has accidentally sent a spreadsheet containing a list of customers and their main contact to a competitor&comma; what type of security technology would help prevent this happening&quest; <&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; DLP<&sol;span> <br &sol;><span data-contrast&equals;"auto">B&rpar; DHCP<&sol;span> <br &sol;><span data-contrast&equals;"auto">C&rpar; SIEM<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><b>What is meant by defence-in-depth&quest; <&sol;b><br &sol;><span data-contrast&equals;"auto">a&rpar; Having a firewall to protect your network<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; Conditional Access<&sol;span> <br &sol;><span data-contrast&equals;"auto">c&rpar; Multiple layers of security controls<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>Which example is considered two different factors of authentication&quest;<&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; Password and a PIN code<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; PIN code and security question<&sol;span> <br &sol;><span data-contrast&equals;"auto">c&rpar; Password and push notification response<&sol;span> <br &sol;><span data-contrast&equals;"auto">d&rpar; Hardware token<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>What is a great way of securing use of Entra ID accounts with a lot of administrative power&quest;<&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; Privileged Access Workstations<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; Defender for Identity<&sol;span> <br &sol;><span data-contrast&equals;"auto">c&rpar; Defender for Cloud-Apps<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>What is Privileged Identity Management &lpar;PIM&rpar;&quest;<&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; Allows for administrative roles to be explicitly turned on for a limited time &lpar;just-in-time&rpar; and for approvals to be applied to the be used for turning on the administrative roles<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; Allows you to scan for group membership misconfiguration and apply a regular access review regime<&sol;span> <br &sol;><span data-contrast&equals;"auto">c&rpar; Allows users to be assigned roles based on their role by requesting them in a group of permissions &lpar;Access Package&rpar; by be approved by a group of package owners<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>What is the acronym for the Microsoft threat modelling elements of security breach&quest;<&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; STRAFE<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; SROMPE<&sol;span> <br &sol;><span data-contrast&equals;"auto">C&rpar; STRIDE<&sol;span> <br &sol;><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><li data-leveltext&equals;"&percnt;1&rpar;" data-font&equals;"Calibri" data-listid&equals;"2" data-list-defn-props&equals;"&lbrace;&quot&semi;335552541&quot&semi;&colon;0&comma;&quot&semi;335559683&quot&semi;&colon;0&comma;&quot&semi;335559684&quot&semi;&colon;-1&comma;&quot&semi;335559685&quot&semi;&colon;720&comma;&quot&semi;335559991&quot&semi;&colon;360&comma;&quot&semi;469769242&quot&semi;&colon;&lbrack;65533&comma;0&comma;46&rsqb;&comma;&quot&semi;469777803&quot&semi;&colon;&quot&semi;left&quot&semi;&comma;&quot&semi;469777804&quot&semi;&colon;&quot&semi;&percnt;1&rpar;&quot&semi;&comma;&quot&semi;469777815&quot&semi;&colon;&quot&semi;hybridMultilevel&quot&semi;&rcub;" aria-setsize&equals;"-1" data-aria-posinset&equals;"1" data-aria-level&equals;"1"><strong>Which Microsoft service provides DLP functionality&quest;<&sol;strong><br &sol;><span data-contrast&equals;"auto">a&rpar; Microsoft Purview<&sol;span> <br &sol;><span data-contrast&equals;"auto">b&rpar; Microsoft Priva<&sol;span><span data-ccp-props&equals;"&lbrace;&quot&semi;201341983&quot&semi;&colon;0&comma;&quot&semi;335559739&quot&semi;&colon;160&comma;&quot&semi;335559740&quot&semi;&colon;259&rcub;"> <&sol;span><&sol;li><&sol;ol>&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-11ea3aa elementor-widget elementor-widget-heading" data-id&equals;"11ea3aa" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"heading&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<h2 class&equals;"elementor-heading-title elementor-size-default">Answers Below&colon;<&sol;h2>&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-39a4164 e-flex e-con-boxed e-con e-parent" data-id&equals;"39a4164" data-element&lowbar;type&equals;"container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<div class&equals;"e-con-inner">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-12cf634 elementor-widget-divider--separator-type-pattern elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id&equals;"12cf634" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"divider&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-divider" style&equals;"--divider-pattern-url&colon; url&lpar;&quot&semi;data&colon;image&sol;svg&plus;xml&comma;&percnt;3Csvg xmlns&equals;&&num;039&semi;http&colon;&sol;&sol;www&period;w3&period;org&sol;2000&sol;svg&&num;039&semi; preserveAspectRatio&equals;&&num;039&semi;none&&num;039&semi; overflow&equals;&&num;039&semi;visible&&num;039&semi; height&equals;&&num;039&semi;100&percnt;&&num;039&semi; viewBox&equals;&&num;039&semi;0 0 24 24&&num;039&semi; fill&equals;&&num;039&semi;none&&num;039&semi; stroke&equals;&&num;039&semi;black&&num;039&semi; stroke-width&equals;&&num;039&semi;5&&num;039&semi; stroke-linecap&equals;&&num;039&semi;square&&num;039&semi; stroke-miterlimit&equals;&&num;039&semi;10&&num;039&semi;&percnt;3E&percnt;3Cpolyline points&equals;&&num;039&semi;0&comma;18 12&comma;6 24&comma;18 &&num;039&semi;&sol;&percnt;3E&percnt;3C&sol;svg&percnt;3E&quot&semi;&rpar;&semi;">&NewLine;&Tab;&Tab;&Tab;<span class&equals;"elementor-divider-separator">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;span>&NewLine;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-8d49aa8 elementor-widget elementor-widget-heading" data-id&equals;"8d49aa8" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"heading&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<h2 class&equals;"elementor-heading-title elementor-size-default">Answers<&sol;h2>&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-4d6fcf3 elementor-widget elementor-widget-text-editor" data-id&equals;"4d6fcf3" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"text-editor&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<ol><li>B &&num;8211&semi; Microsoft Secure Score provides you an easy to follow dashboard of Microsoft best-practises<&sol;li><li>B &&num;8211&semi; Break-Glass accounts are suggested as security best-practise by Microsoft&colon; <a href&equals;"https&colon;&sol;&sol;learn&period;microsoft&period;com&sol;en-us&sol;entra&sol;identity&sol;role-based-access-control&sol;security-emergency-access">Manage emergency access admin accounts &vert; Microsoft Learn<&sol;a><&sol;li><li>C &&num;8211&semi; Sentinel can be configured to automatically take actions based off of alerts from a wide range of sources&period;<&sol;li><li>A &&num;8211&semi; DLP is Data Loss Prevention&comma; more on DLP can be found here&colon; <a href&equals;"https&colon;&sol;&sol;www&period;crowdstrike&period;com&sol;cybersecurity-101&sol;data-loss-prevention-dlp&sol;">What is Data Loss Prevention &lpar;DLP&rpar;&quest;<&sol;a><&sol;li><li>C &&num;8211&semi; Multiple layers of security is what is meant by defence in depth&semi; you can learn more here&colon; <a href&equals;"https&colon;&sol;&sol;www&period;cloudflare&period;com&sol;en-gb&sol;learning&sol;security&sol;glossary&sol;what-is-defense-in-depth&sol;">What is defense in depth&quest;<&sol;a><&sol;li><li>C &&num;8211&semi; Password and push notification is the only listed answer with two distinct types of authentication&comma; read more here&colon; <a href&equals;"https&colon;&sol;&sol;csrc&period;nist&period;gov&sol;glossary&sol;term&sol;multi&lowbar;factor&lowbar;authentication">multi-factor authentication &&num;8211&semi; Glossary &vert; CSRC &lpar;nist&period;gov&rpar;<&sol;a><&sol;li><li>A &&num;8211&semi; Privileged Access Workstations&comma; are computers which are used only to do administrative functions such as a using a Global Administrator account&comma; this means that if the user cannot be phished with a malicious email&comma; as they shouldn&&num;8217&semi;t receive email on their privileged access workstation as well as other things&comma; which reduces the attack surface&comma; read more here&colon; <a href&equals;"https&colon;&sol;&sol;learn&period;microsoft&period;com&sol;en-us&sol;security&sol;privileged-access-workstations&sol;privileged-access-devices">Why are privileged access devices important<&sol;a><&sol;li><li>A &&num;8211&semi; You can read more on PIM here&colon; <a href&equals;"https&colon;&sol;&sol;learn&period;microsoft&period;com&sol;en-us&sol;entra&sol;id-governance&sol;privileged-identity-management&sol;pim-configure">What is Privileged Identity Management&quest; &vert; Microsoft Learn<&sol;a><&sol;li><li>C &&num;8211&semi; STRIDE&comma; you can find more on STRIDE here&colon; <a href&equals;"https&colon;&sol;&sol;en&period;wikipedia&period;org&sol;wiki&sol;STRIDE&lowbar;&lpar;security&rpar;">STRIDE &lpar;security&rpar; &&num;8211&semi; Wikipedia<&sol;a><&sol;li><li>A &&num;8211&semi; Microsoft Purview provides DLP functionality read more here&colon; <a href&equals;"https&colon;&sol;&sol;learn&period;microsoft&period;com&sol;en-us&sol;purview&sol;dlp-learn-about-dlp">Learn about data loss prevention<&sol;a><&sol;li><&sol;ol>&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;

Exit mobile version