exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 5 question 27 discussion

Actual exam question from Microsoft's SC-200
Question #: 27
Topic #: 5
[All SC-200 Questions]

You have an Azure subscription that uses Microsoft Defender for Cloud.

You need to configure Defender for Cloud to mitigate the following risks:

• Vulnerabilities within the application source code
• Exploitation toolkits in declarative templates
• Operations from malicious IP addresses
• Exposed secrets

Which two Defender for Cloud services should you use? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

  • A. Microsoft Defender for APIs
  • B. Microsoft Defender for Resource Manager
  • C. Microsoft Defender for App Service
  • D. Microsoft Defender for Servers
  • E. Microsoft Defender for DevOps
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Krayzr
1 day, 19 hours ago
Selected Answer: BE
repeated Q E. Microsoft Defender for DevOps This service provides visibility across the entire development lifecycle and addresses the pre-deployment risks: Vulnerabilities within the application source code: Defender for DevOps integrates with source code management systems like Azure DevOps and GitHub to scan your code and identify security vulnerabilities before they reach production. Exposed secrets: It performs secret scanning to detect and prevent credentials, API keys, and other secrets from being committed into your source code repositories. Exploitation toolkits in declarative templates: It scans Infrastructure as Code (IaC) templates, such as ARM templates, for misconfigurations and potential security issues, helping to harden your environment from the code itself. ---
upvoted 1 times
Krayzr
1 day, 19 hours ago
B. Microsoft Defender for Resource Manager This service focuses on protecting the Azure control plane, which handles all deployment and management operations. It addresses the runtime operational risks: Operations from malicious IP addresses: Defender for Resource Manager automatically monitors all resource management operations in your subscription. It uses threat intelligence to detect and alert on suspicious activities, such as deployment or management operations originating from known malicious IP addresses or TOR exit nodes. It also provides a secondary layer of protection against exploitation toolkits in declarative templates by monitoring the actual deployment operations at runtime for malicious or anomalous behavior.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...