exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 3 question 6 discussion

Actual exam question from Microsoft's SC-100
Question #: 6
Topic #: 3
[All SC-100 Questions]

Your company has a Microsoft 365 E5 subscription.
The company plans to deploy 45 mobile self-service kiosks that will run Windows 10.
You need to provide recommendations to secure the kiosks. The solution must meet the following requirements:
✑ Ensure that only authorized applications can run on the kiosks.
✑ Regularly harden the kiosks against new threats.
Which two actions should you include in the recommendations? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. Implement Automated investigation and Remediation (AIR) in Microsoft Defender for Endpoint.
  • B. Onboard the kiosks to Microsoft intune and Microsoft Defender for Endpoint.
  • C. Implement threat and vulnerability management in Microsoft Defender for Endpoint.
  • D. Onboard the kiosks to Azure Monitor.
  • E. Implement Privileged Access Workstation (PAW) for the kiosks.
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Jasper666
Highly Voted 2 years, 3 months ago
I would go for B and C. Vuln management sits on top of defender for endpoint. (https://docs.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide)
upvoted 49 times
cdizzle
2 years ago
Agree with you, I think PAW could get the job done as well but the spirit of the question is for kiosks endpoint. PAW implementations are typical for admin workstations.
upvoted 21 times
...
...
HardcodedCloud
Highly Voted 2 years, 3 months ago
Selected Answer: BC
B & C based on the requirements.
upvoted 25 times
...
masby661
Most Recent 9 months ago
Selected Answer: BC
B. Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint: Onboarding the kiosks to Microsoft Intune allows for centralized management of device configurations, compliance policies, and application control to ensure that only authorized applications can run on the kiosks. Onboarding to Microsoft Defender for Endpoint provides advanced threat protection, endpoint security, and vulnerability management to regularly harden the kiosks against new threats. C. Implement threat and vulnerability management in Microsoft Defender for Endpoint: Implementing threat and vulnerability management in Microsoft Defender for Endpoint enables continuous monitoring, detection, and remediation of security vulnerabilities and threats on the kiosks, ensuring proactive security measures are in place
upvoted 3 times
...
JG56
1 year ago
in exam Nov 23, Answer, B,C
upvoted 6 times
...
theplaceholder
1 year, 2 months ago
Selected Answer: BC
B&C for sure.
upvoted 4 times
...
WRITER00347
1 year, 4 months ago
The requirements provided emphasize controlling the applications that can run on the kiosks and regularly hardening them against new threats. With this focus on application control and threat protection, the correct actions would be: B. Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint. Microsoft Intune can manage and configure the kiosks, allowing control over which applications can run. Microsoft Defender for Endpoint will help to protect the kiosks against threats. C. Implement threat and vulnerability management in Microsoft Defender for Endpoint. This feature of Microsoft Defender for Endpoint helps to discover, prioritize, and remediate threats and vulnerabilities, helping to harden the kiosks against new and emerging threats. So the correct answers are: B. Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint. C. Implement threat and vulnerability management in Microsoft Defender for Endpoint.
upvoted 2 times
...
sbnpj
1 year, 4 months ago
Selected Answer: BC
it has to be BC, other options dont provide the best solution.
upvoted 3 times
...
Ario
1 year, 5 months ago
Selected Answer: BC
Microsoft Intune and Microsoft Defender for Endpoint provide a comprehensive set of security capabilities to manage and protect the Windows 10 kiosks, while threat and vulnerability management helps to proactively identify and remediate vulnerabilities.
upvoted 3 times
...
imsidrai
1 year, 5 months ago
recommended solution is not asking for least privilege, so no for PAW B&C definitely correct
upvoted 1 times
...
Gurulee
1 year, 7 months ago
Selected Answer: BC
PAW are for admin privileged purposes.
upvoted 5 times
...
JayLearn2022
1 year, 8 months ago
Answer: BC B. Onboard the kiosks to Microsoft Intune and Microsoft Defender for Endpoint to ensure that only authorized applications can run on the kiosks. This allows for the creation of a custom device configuration profile that can restrict which apps are allowed to run on the kiosks. Intune can also be used to regularly harden the kiosks against new threats. C. Implement threat and vulnerability management in Microsoft Defender for Endpoint to provide a centralized view of the security posture of the kiosks. This feature identifies potential vulnerabilities and provides guidance on how to mitigate them, allowing for regular hardening of the kiosks against new threats. Option E (Implement Privileged Access Workstation (PAW) for the kiosks) is not a suitable recommendation for securing the mobile self-service kiosks. PAWs are typically used for highly privileged users who need access to sensitive information or systems, and not for standard kiosks. Instead, implementing Microsoft Intune and Microsoft Defender for Endpoint as suggested in option B would provide better security measures for the kiosks.
upvoted 2 times
...
OK2020
1 year, 8 months ago
I would go B & E: B: Microsoft Defender for Endpoint Intune integration Microsoft Defender for Endpoint and Microsoft Intune work together to help prevent security breaches. They can also limit the impact of breaches. ATP capabilities provide real-time threat detection as well as enable extensive auditing and logging of the end-point devices. https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-deployment E: PAW A Privileged workstation provides a hardened workstation that has clear application control and application guard. The workstation uses credential guard, device guard, app guard, and exploit guard to protect the host from malicious behavior. All local disks are encrypted with BitLocker and web traffic is restricted to a limit set of permitted destinations (Deny all). https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-devices
upvoted 2 times
...
awssecuritynewbie
1 year, 9 months ago
Selected Answer: BC
It has to be B because you do need to onboard MDE come on guys C = it has vulnerability scanning enabled
upvoted 4 times
...
Mo22
1 year, 10 months ago
Selected Answer: BC
B and C are the recommended actions to secure the kiosks. Implementing threat and vulnerability management in Microsoft Defender for Endpoint and onboarding the kiosks to Microsoft Intune and Microsoft Defender for Endpoint will help ensure that only authorized applications can run on the kiosks and that the kiosks are regularly hardened against new threats.
upvoted 4 times
...
m7medcs
1 year, 10 months ago
B & C 100%
upvoted 3 times
...
walkaway
1 year, 10 months ago
Selected Answer: BC
kiosks are NOT administrative workstations lol. We don't need PAW for kiosks.
upvoted 4 times
...
yaza85
1 year, 10 months ago
Selected Answer: BC
PAW is the name of the admin workstation concept. Its not a technology and has nothing to do with kiosk. B and C
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...