exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 2 question 14 discussion

Actual exam question from Microsoft's SC-100
Question #: 14
Topic #: 2
[All SC-100 Questions]

You receive a security alert in Microsoft Defender for Cloud as shown in the exhibit. (Click the Exhibit tab.)

After remediating the threat, which policy definition should you assign to prevent the threat from reoccurring?

  • A. Storage account public access should be disallowed
  • B. Azure Key Vault Managed HSM should have purge protection enabled
  • C. Storage accounts should prevent shared key access
  • D. Storage account keys should not be expired
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
walkaway
Highly Voted 2 years, 4 months ago
Selected Answer: C
C is the correct answer. You should read Microburst toolkit - it is an open-source tool. Find Get-AZStorageKeysREST.ps1 it tries to enumerate all storage accounts then the respective storage keys. There is nothing to do with anonymous access here. Even if a storage account allows public acces you can't get the key without being authenticated and authorized. The preventive control here is to manage Shared Key Authorization.
upvoted 32 times
...
Alex_Burlachenko
Highly Voted 2 years, 9 months ago
I would select "Storage accounts should prevent shared key access"
upvoted 17 times
purek77
2 years, 4 months ago
... by applying read-only lock.
upvoted 1 times
...
...
Onimole
Most Recent 9 months, 1 week ago
MicroBurst exploitation toolkit used to extract keys to your storage accounts (ARM_MicroBurst.AZStorageKeysREST) Description: A PowerShell script was run in your subscription and performed a suspicious pattern of extracting keys to Storage Account(s). Threat actors use automated scripts, like MicroBurst, to list keys and use them to access sensitive data in your Storage Account(s). This was detected by analyzing Azure Resource Manager operations in your subscription. This operation might indicate that an identity in your organization was breached, and that the threat actor is trying to compromise your environment for malicious intentions. IF IT NEEDS TO BE BREACHED, THEN MAYBE SHARED KEY ACCESS WILL BE THE ANSWER
upvoted 1 times
...
Socgen1
11 months ago
Option C - When you disallow Shared Key authorization for a storage account, Azure Storage rejects all subsequent requests to that account that are authorized with the account access keys. Only secured requests that are authorized with Microsoft Entra ID will succeed.
upvoted 1 times
...
Neverwinter
1 year, 2 months ago
Selected Answer: A
The Correct Answer is A. According to Microsoft Public storage accounts have a URL of a public endpoint (more information in the Background section), which means that it's possible to guess storage accounts names by performing DNS queries on the URL and examining the response. The way to prevent this is to remove Public access. https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/protect-your-storage-resources-against-blob-hunting/ba-p/3735238
upvoted 2 times
...
ayadmawla
1 year, 3 months ago
Selected Answer: A
Not sure why preventing shared key access would be better than blocking public access. After all there are far more hackers in the outer world that would rather push an open door than test shared keys. Just my own two pennies
upvoted 1 times
Ragdoll
1 year, 1 month ago
Remember that threats could come from inside, not just outside. That's why C is the right answer. If no key is available, there is nothing to steal.
upvoted 1 times
...
...
SFAY
1 year, 4 months ago
Selected Answer: A
Not sure how 80% voted for the wrong answer. The correct answer is A. https://hacknowledge.com/blog-post/azure-blob-storage-detect-and-prevent-public-accesses/
upvoted 3 times
...
sehlohomoletsane
1 year, 4 months ago
Selected Answer: C
After remediating the threat, to prevent it from reoccurring, you should assign the following policy definition: C. Storage accounts should prevent shared key access This policy ensures that shared keys are not used for access to storage accounts, which aligns with security best practices and helps prevent similar threats in the future .
upvoted 2 times
...
Arockia
1 year, 5 months ago
MicroBurst leverages the Get-AZStorageKeysREST.ps1 script to brute-force enumerate storage accounts and subsequently attempt to retrieve their keys using REST API calls. Public access isn't directly targeted by this script. While disallowing public access (option A) is a generally good security practice, it wouldn't specifically prevent the MicroBurst exploitation technique that relies on shared key access. Even with public access blocked, the script could still enumerate accounts and try brute-forcing shared keys. Preventing shared key access (option C) directly addresses the vulnerability exploited by the script. By disabling this access method, storage accounts become protected from unauthorized key retrieval attempts using Get-AZStorageKeysREST.ps1 or similar tools.
upvoted 4 times
...
Joe1126
1 year, 6 months ago
Selected Answer: C
is the right answer
upvoted 1 times
...
slobav
1 year, 8 months ago
Selected Answer: A From the picture above you can see access from IP 0.0.0.0 that means from internet (public access). SAS token allow limited access to storage.
upvoted 2 times
...
zellck
2 years ago
Selected Answer: C
C is the answer. https://learn.microsoft.com/en-us/azure/storage/common/shared-key-authorization-prevent?tabs=portal Every secure request to an Azure Storage account must be authorized. By default, requests can be authorized with either Azure Active Directory (Azure AD) credentials, or by using the account access key for Shared Key authorization. Of these two types of authorization, Azure AD provides superior security and ease of use over Shared Key, and is recommended by Microsoft. To require clients to use Azure AD to authorize requests, you can disallow requests to the storage account that are authorized with Shared Key.
upvoted 7 times
TomRoute66
8 months, 2 weeks ago
Adding more from the same page: "When you disallow Shared Key authorization for a storage account, Azure Storage rejects all subsequent requests to that account that are authorized with the account access keys. Only secured requests that are authorized with Microsoft Entra ID will succeed. "
upvoted 1 times
...
...
valeriafarias
2 years, 1 month ago
The correct is C, see the docs: https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference
upvoted 2 times
...
etblue
2 years, 2 months ago
My answer would be C. Note that the question is asking "After remediating the threat, which policy definition should you assign to prevent the threat from reoccurring". Answer A mitigate the attack by limiting exploit only thru private network links. However, to entirely prevent threat from re-occuring, simply stop using preShare key authorization.
upvoted 3 times
...
vins_vins_vins
2 years, 3 months ago
I vote for C. Azure AD provides superior security and ease of use over Shared Key, and is recommended by Microsoft. here the link: https://learn.microsoft.com/en-us/azure/storage/common/shared-key-authorization-prevent?tabs=portal
upvoted 1 times
...
KrisDeb
2 years, 4 months ago
I am torn between A and C, in my opinion it should be both that would make sense. I really don't know what to choose for the exam now - A or C.
upvoted 1 times
...
Azzzurrre
2 years, 5 months ago
"... By default, requests can be authorized with either Azure Active Directory credentials, or by using the account access key for Shared Key authorization. Of these two types of authorization, Azure AD provides superior security and ease of use over Shared Key, and is recommended by Microsoft." https://github.com/Azure/azure-policy/blob/master/built-in-policies/policyDefinitions/Storage/StorageAccountAllowSharedKeyAccess_Audit.json
upvoted 3 times
maku067
2 years, 4 months ago
I agree. C is correct.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...