exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 5 question 7 discussion

Actual exam question from Microsoft's SC-100
Question #: 7
Topic #: 5
[All SC-100 Questions]

You design cloud-based software as a service (SaaS) solutions.

You need to recommend a recovery solution for ransomware attacks. The solution must follow Microsoft Security Best Practices.

What should you recommend doing first?

  • A. Develop a privileged identity strategy.
  • B. Implement data protection.
  • C. Develop a privileged access strategy.
  • D. Prepare a recovery plan.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MaciekMT
Highly Voted 1 year, 1 month ago
Selected Answer: D
I vote for D - creating recovery plan. 1.Recognize different types of ransomware 2.Help an organization mitigate risk of a ransomware attack by creating a recovery plan 3.Help an organization mitigate risk of a ransomware attack by limiting the scope of damage 4.Help an organization mitigate risk of a ransomware attack by hardening key infrastructure elements https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/
upvoted 12 times
Nian
1 year, 1 month ago
Agree - as stated in the Phase 1 is the learning docs: https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-ransomware-protection-extortion-based-attacks
upvoted 1 times
...
...
rishiraval007
Most Recent 7 months, 1 week ago
D. Prepare a recovery plan. Preparing a recovery plan is essential as it lays out the specific actions and protocols to be followed in the event of a ransomware attack. A well-defined recovery plan ensures that you can quickly and effectively respond to an attack, minimize damage, and restore operations as soon as possible.
upvoted 2 times
...
zellck
1 year ago
Selected Answer: D
D is the answer. https://learn.microsoft.com/en-us/training/modules/design-resiliency-strategy-common-cyberthreats-like-ransomware/3-ransomware-protection Microsoft best practices for ransomware protection are based on a three step approach: - Prepare your recovery plan - Limit the scope of the damage - Make it hard to get in
upvoted 4 times
zellck
1 year ago
Gotten this in May 2023 exam.
upvoted 4 times
...
zellck
1 year ago
https://learn.microsoft.com/en-us/security/ransomware/protect-against-ransomware#phase-1-prepare-your-recovery-plan
upvoted 2 times
...
...
zellck
1 year ago
Selected Answer: D
D is the answer. https://learn.microsoft.com/en-us/training/modules/design-resiliency-strategy-common-cyberthreats-like-ransomware/3-ransomware-protection Microsoft best practices for ransomware protection are based on a three step approach: - Prepare your recovery plan - Limit the scope of the damage - Make it hard to get in
upvoted 3 times
...
Burnie
1 year, 1 month ago
Selected Answer: D
Phase 1 of ransomware protection is to develop a recovery plan. The first thing you should do for these attacks is prepare your organization so that it has a viable alternative to paying the ransom. https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-ransomware-protection-extortion-based-attacks
upvoted 3 times
...
Burnie
1 year, 1 month ago
Phase 1 of ransomware protection is to develop a recovery plan. The first thing you should do for these attacks is prepare your organization so that it has a viable alternative to paying the ransom. https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-ransomware-protection-extortion-based-attacks
upvoted 1 times
...
janesb
1 year, 1 month ago
Selected Answer: C
it should be privileged access strategy https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-strategy
upvoted 1 times
janesb
1 year, 1 month ago
My initial analysis was Option C, but I think , Option A is More Accurate
upvoted 1 times
...
...
shinda
1 year, 2 months ago
Selected Answer: A
https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/4-recommend-microsoft-ransomware
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...