exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 4 question 32 discussion

Actual exam question from Microsoft's SC-100
Question #: 32
Topic #: 4
[All SC-100 Questions]

You have a Microsoft 365 tenant.

Your company uses a third-party software as a service (SaaS) app named App1 that is integrated with an Azure AD tenant.

You need to design a security strategy to meet the following requirements:

• Users must be able to request access to App1 by using a self-service request.
• When users request access to App1, they must be prompted to provide additional information about their request.
• Every three months, managers must verify that the users still require access to App1.

What should you include in the design?

  • A. Microsoft Entra Identity Governance
  • B. connected apps in Microsoft Defender for Cloud Apps
  • C. access policies in Microsoft Defender for Cloud Apps
  • D. Azure AD Application Proxy
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Victory007
Highly Voted 10 months ago
Selected Answer: A
Microsoft Entra Identity Governance allows you to balance your organization’s need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources. https://learn.microsoft.com/en-us/azure/active-directory/governance/identity-governance-overview
upvoted 8 times
...
sherifhamed
Highly Voted 8 months, 3 weeks ago
Selected Answer: A
A. Microsoft Entra Identity Governance Microsoft Entitlement Management, part of Azure AD Identity Governance, allows you to implement access reviews and request workflows for applications, including third-party SaaS apps like App1. With this solution, you can configure self-service access requests, request approval workflows, and access reviews. Users can request access to App1, provide additional information during the request, and managers can periodically review and verify access. B. Connected apps in Microsoft Defender for Cloud Apps and C. Access policies in Microsoft Defender for Cloud Apps are more focused on the security and monitoring aspects of cloud applications but do not provide the specific access request and review workflows required for this scenario.
upvoted 7 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...