exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 1 question 12 discussion

Actual exam question from Microsoft's SC-100
Question #: 12
Topic #: 1
[All SC-100 Questions]

A customer follows the Zero Trust model and explicitly verifies each attempt to access its corporate applications.
The customer discovers that several endpoints are infected with malware.
The customer suspends access attempts from the infected endpoints.
The malware is removed from the endpoints.
Which two conditions must be met before endpoint users can access the corporate applications again? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. The client access tokens are refreshed.
  • B. Microsoft Intune reports the endpoints as compliant.
  • C. A new Azure Active Directory (Azure AD) Conditional Access policy is enforced.
  • D. Microsoft Defender for Endpoint reports the endpoints as compliant.
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Gar23
Highly Voted 2 years, 9 months ago
Selected Answer: AB
AB looks correct to me
upvoted 40 times
424ede1
2 months, 2 weeks ago
Documents say otherwise! https://learn.microsoft.com/en-us/azure/security/fundamentals/recover-from-identity-compromise#remediate-user-and-service-account-access
upvoted 2 times
Gagi79
1 month, 1 week ago
Wrong. Defender for Endpoint alone does not directly mark a device as "compliant" in Conditional Access. Instead, it assesses the device's security state and shares that with Intune, which then determines compliance based on its policies. So the integration between Defender for Endpoint and Intune is critical to the compliance process. Microsoft Defender for Endpoint (MDE) integrates with Microsoft Intune through a compliance connector. This integration allows MDE to share device risk level data with Intune. Intune is the authority that determines and reports device compliance based on Defender for Endpoint’s input. It's a trick question.
upvoted 1 times
...
...
...
BillyB2022
Highly Voted 2 years, 9 months ago
I don't think this is correct. Zero Trust its reffering to Conditional Access, so would be Microsoft Intune reports the endpoints as compliant. https://docs.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection and I assume The client access tokens are refreshed.
upvoted 15 times
prabhjot
2 years, 9 months ago
In Identity to achieve zero trust ( we have to use Conditional access policy stating a condition as that the resource is compliant ) so i guess ans is correct ( whereas Intune is for configuring the compliance policy via MDM and MAM)
upvoted 2 times
prabhjot
2 years, 9 months ago
A second thought ( why NEW conditional access policy??) so the ans seems wrong and the correct one looks like Microsoft intune reports the endpoints as compliant and The client access token are refreshed
upvoted 11 times
...
jgvh
2 years, 8 months ago
Maybe the Conditional access already in place since he follow zero trust ? so i feel like it should be AB ?
upvoted 5 times
TJ001
2 years, 5 months ago
how the current malware is detected should have been mentioned in the question. only clue given is currently Zero Trust is implemented and each access attempt is inspected which means a conditional access policy would have been in place already to detect sign in risk (fed from Azure Identity Protection) ..
upvoted 1 times
...
...
...
ChaBum
2 years, 3 months ago
You're assuming endpoints are enrolled in Intune, and assuming is never a good idea in Microsoft exams. The question says "The customer discovers ..." and "The customer suspends ...", there is nothing about Intune.
upvoted 5 times
jasscomp
1 year, 8 months ago
Conditional Access reaches out to Intune to check if a device is seen as compliant or not. Intune will receive the risk score from Defender for Endpoint. Devices have to be managed by Intune in order for Conditional Access to get the compliance check.
upvoted 3 times
...
...
...
Gagi79
Most Recent 1 month, 1 week ago
Selected Answer: AB
A. The client access tokens are refreshed. Once access is suspended (e.g., via Conditional Access), any existing tokens may still be valid. After remediation, refreshing the tokens ensures that the new compliant state is recognized and access can be restored. B. Microsoft Intune reports the endpoints as compliant. Intune is the authority that determines and reports device compliance based on Defender for Endpoint’s input. Defender for Endpoint alone does not directly mark a device as "compliant" in Conditional Access. Instead, it assesses the device's security state and shares that with Intune, which then determines compliance based on its policies. So the integration between Defender for Endpoint and Intune is critical to the compliance process.
upvoted 1 times
...
sborrone
1 month, 2 weeks ago
Selected Answer: AD
Devices must be marked as compliant before Intune policies will allow them to access the network
upvoted 1 times
...
424ede1
2 months, 2 weeks ago
Selected Answer: AC
• Enforce conditional access based on trusted devices. We recommend that you enforce location-based conditional access to suit your organizational requirements. • Reset passwords after eviction for any user accounts that may have been compromised. • Revoke refresh tokens immediately after rotating your credentials. https://learn.microsoft.com/en-us/azure/security/fundamentals/recover-from-identity-compromise#remediate-user-and-service-account-access
upvoted 1 times
...
olsookie
2 months, 3 weeks ago
Selected Answer: BD
B. Microsoft Intune reports the endpoints as compliant: Intune ensures that the endpoints meet the organization's compliance policies, verifying that they are secure and properly configured. https://learn.microsoft.com/en-us/security/zero-trust/deploy/endpoints D. Microsoft Defender for Endpoint reports the endpoints as compliant: Defender for Endpoint provides advanced threat protection and ensures that the endpoints are free from malware and other security threats. https://learn.microsoft.com/en-us/defender-endpoint/zero-trust-with-microsoft-defender-endpoint These conditions help maintain the integrity of the Zero Trust model by ensuring that only secure and compliant endpoints can access corporate applications.
upvoted 1 times
olsookie
2 months, 3 weeks ago
after further investigation, A and B are correct because MDE does not directly report endpoints as compliant in the same way that Microsoft Intune does. MDE provides detailed reports on device health, antivirus status, and threat protection, but compliance reporting is typically managed through Intune. Therefore A + B = Correct!
upvoted 1 times
...
...
Reevs
3 months, 1 week ago
Selected Answer: BD
B. Microsoft Intune reports the endpoints as compliant: In a Zero Trust model, compliance is verified before granting access. Intune is used to manage device compliance policies, and the endpoints need to be reported as compliant to ensure they are safe for accessing corporate applications again. D. Microsoft Defender for Endpoint reports the endpoints as compliant: Defender for Endpoint provides security management for endpoints. After the malware is removed, Defender must report that the endpoints are secure and compliant, ensuring that they are safe for access.
upvoted 1 times
...
Ali96
3 months, 3 weeks ago
Selected Answer: AB
A. The client access tokens are refreshed B. Microsoft Intune reports the endpoints as compliant
upvoted 2 times
...
oscarpopi
4 months, 3 weeks ago
Selected Answer: AB
Agree with the given answer
upvoted 1 times
jim85
4 months, 1 week ago
Agree, as per the links below, MS says: n Intune, a device compliance policy is used with Microsoft Entra Conditional Access to block access to applications. In parallel, an automated investigation and remediation process is launched. A user can still use the device while the automated investigation and remediation is taking place, but access to enterprise data is blocked until the threat is fully remediated. To resolve the risk found on a device, you need to return the device to a compliant state. A device returns to a compliant state when there's no risk seen on it.
upvoted 1 times
...
...
Dirkonormalo
7 months, 1 week ago
Tokens need to be refreshed, when a device is marked as incompliant. The access is revoked due to the incomliance state. Answer A In Intune you configure the compliance policy. Within the compliance policy you configure the risk level for defender. Intune reports the compliance state as compliant, if the defender risk level is equal to or lower than the configured value. Answer B. Answer C: Is wrong Answer D is incorrect, because Defender does not report compliance. It reports the client risk level.
upvoted 3 times
...
Dan91
7 months, 3 weeks ago
Selected Answer: BD
Questions asks "which 2 conditions must be met". The answer is: D: Defender must report the risk as being mitigated to Intune B: Intune reports the device as compliant
upvoted 3 times
...
Lapatiser
7 months, 3 weeks ago
Answer should be B and C from the below key points in the question and the reference conditional access link: The customer discovers that several endpoints are infected with malware. - This comes under Microsoft intune compliance reporting. The customer suspends access attempts from the infected endpoints. - Conditional access kicks in "when a threat is seen on a device, access to sensitive content is blocked until the threat is remediated." The malware is removed from the endpoints. - "an automated investigation and remediation process is launched." https://learn.microsoft.com/en-us/defender-endpoint/conditional-access?view=o365-worldwide <<Understand the Conditional Access flow>>
upvoted 2 times
...
Ruttoh
8 months, 3 weeks ago
To ensure that endpoint users can access the corporate applications again after malware removal, the following two conditions must be met: B. Microsoft Intune reports the endpoints as compliant: This ensures that the devices meet the organization’s compliance policies and are considered secure1. D. Microsoft Defender for Endpoint reports the endpoints as compliant: This confirms that the endpoints are free from threats and meet the security requirements1.
upvoted 2 times
...
Savitho
8 months, 3 weeks ago
B and D is correct answer
upvoted 2 times
...
orrery
11 months ago
Selected Answer: BD
Answer: B. Microsoft Intune reports the endpoint as compliant. D. Microsoft Defender for Endpoint reports the endpoint as compliant. Reason: In a Zero Trust model, it is necessary to verify the security and compliance status of endpoints before they access corporate applications. Microsoft Intune and Microsoft Defender for Endpoint report the compliance status of endpoints and ensure that the endpoints are secure. Reasons why other answers are different: A. Client access tokens are refreshed: While refreshing tokens is important, it is not directly related to verifying the security status of endpoints. C. A new Azure Active Directory (Azure AD) Conditional Access policy is applied: Conditional access policies help with access control but are not directly related to verifying the compliance status of endpoints.
upvoted 4 times
...
crutester
11 months, 2 weeks ago
Answer is BD Source: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/conditional-access?view=o365-worldwide
upvoted 2 times
Tony416
8 months, 3 weeks ago
According to this article, the answer should be BC and not BD.
upvoted 1 times
...
...
emartiy
11 months, 3 weeks ago
Selected Answer: AD
Today, I read more about this question and eliminated given options based on the question scenario.. So, company uses zero trust model.. It already performed what needs to be done.. So, if some endpoints are malware infected and suspended to access company applications.. For re-access to applications (it says corporate applications not Microsoft 365 apps etc.) User's token needs to be refreshed and also Microsoft Defender for Endpoint also mark device healthy after scan etc.. So Options are; A and D.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...