exam questions

Exam SC-100 All Questions

View all questions & answers for the SC-100 exam

Exam SC-100 topic 1 question 24 discussion

Actual exam question from Microsoft's SC-100
Question #: 24
Topic #: 1
[All SC-100 Questions]

You have legacy operational technology (OT) devices and IoT devices.

You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.

Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

  • A. active scanning
  • B. threat monitoring
  • C. software patching
  • D. passive traffic monitoring
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
El_m_o
Highly Voted 2 years, 2 months ago
Selected Answer: BD
From MCRA slide 17 (OT): "Many well-established IT security best practices like software patching aren’t practical or fully effective in an OT environment, so they can only be selectively applied (or have a limited security effect). Basic security hygiene for OT starts with network isolation (including good maintenance/**monitoring** of that isolation boundaries), **threat monitoring**, and carefully managing vendor access risk."
upvoted 22 times
dsatizabal
3 months, 2 weeks ago
As per Jan 2025 this is slide 61 of MCRA, observe that the information is in the slide's notes, not on the slides canvas contents.
upvoted 1 times
...
...
Ajdlfasudfo0
Highly Voted 2 years, 2 months ago
Selected Answer: BC
In some legacy environments where modern authentication protocols are unavailable such as operational technology (OT), network controls may be used exclusively.  - Slide 61, MCRA Slide 17 - OT - Safety/Integrity/Availability Hardware Age: 50-100 years (mechanical + electronic overlay) Warranty length: up to 30-50 years Protocols: Industry Specific (often bridged to IP networks) Security Hygiene: Isolation, threat monitoring, managing vendor access risk, (patching rarely)
upvoted 9 times
...
danb67
Most Recent 10 months, 1 week ago
Answer correct based on slide 60 of the MCRA passive collection) – provides data gathering with passive traffic monitoring to avoid disruption of OT and IIoT operations. This passive approach is critical because active scanning can slow or disrupt business operations (potentially altering sensitive physical operation timing or potentially crashing older OT computer systems). Security Hygiene - threat monitoring
upvoted 2 times
...
emartiy
10 months, 1 week ago
Selected Answer: BD
I continue with this options based on MCRA slides... A is someting performance reducing progress so option D is more reliable and option B since question says "which security methodolgy"
upvoted 1 times
...
Baz10
1 year ago
Selected Answer: BD
On Exam 8 Apr 2024 scored 764
upvoted 4 times
...
[Removed]
1 year, 1 month ago
Selected Answer: BD
D. Passive Traffic Monitoring: Passive traffic monitoring involves observing network traffic without actively scanning or disrupting devices. This approach aligns with Zero Trust principles by allowing you to gain insights into the behavior of devices without introducing potential risks associated with active scanning. It helps in understanding the normal traffic patterns and identifying anomalies or suspicious activities without impacting the operation of OT and IoT devices. B. Threat Monitoring: Threat monitoring is essential for actively monitoring and analyzing security events to detect and respond to potential threats. Implementing threat monitoring aligns with Zero Trust principles by continuously assessing the security posture of OT and IoT devices. This proactive approach enables the identification of security incidents and allows for timely responses to mitigate risks, all while minimizing disruptions to business operations.
upvoted 3 times
...
Charly80
1 year, 3 months ago
MCRA Slide 65 "Apply zero trust principles to securing OT and industrial IoT environments" : Security Hygiene: Multi-factor authentication (MFA), patching, threat monitoring, antimalware
upvoted 2 times
...
Funkydave
1 year, 7 months ago
"The solution must minimize the risk of disrupting business operations." patching is absolutely not non-disruptive
upvoted 4 times
...
POOJI123
1 year, 8 months ago
what is mcra slide mentioned in comments how do i find it
upvoted 1 times
theplaceholder
1 year, 8 months ago
https://learn.microsoft.com/en-us/security/cybersecurity-reference-architecture/mcra
upvoted 1 times
...
...
Ario
1 year, 10 months ago
BD is correct
upvoted 1 times
...
zellck
1 year, 11 months ago
Selected Answer: BD
BD is the answer. OT Security hygiene is different because these systems frequently weren’t built with modern threats and protocols in mind (and often rely on ‘end of life’ software). Many well-established IT security best practices like software patching aren’t practical or fully effective in an OT environment, so they can only be selectively applied (or have a limited security effect). Basic security hygiene for OT starts with network isolation (including good maintenance/monitoring of that isolation boundaries), threat monitoring, and carefully managing vendor access risk.
upvoted 4 times
...
Tictactoe
1 year, 12 months ago
BD right
upvoted 1 times
...
PrettyFlyWifi
2 years ago
Selected Answer: BD
B and D seem most suitable here, both are mentioned on slide 17 of MCRA. It doesn't look like C - Software patching is a valid answer. Look at slide 17 of MCRA it states "Many well-established IT security best practices like software patching aren’t practical or fully effective in an OT environment, so they can only be selectively applied (or have a limited security effect). ", so this confirms it isn't practical, so it can't be "best practice".
upvoted 4 times
...
edurakhan
2 years ago
Selected Answer: BC
I would go with threat monitoring and patching (rarely, according to MCRA, but there is nothing about passive traffic monitoring)
upvoted 1 times
zellck
1 year, 11 months ago
Many well-established IT security best practices like software patching aren’t practical or fully effective in an OT environment, so they can only be selectively applied (or have a limited security effect).
upvoted 2 times
...
GeVanDerBe
2 years ago
Read the notes in slide 17 --> Microsoft’s approach to threat monitoring is focused on bringing modern security approaches that also deeply respects the constraints and sensitivity of these systems. The approach is based on technology developed by CyberX (recently acquired and integrated into Microsoft). The solution consists of Network TAP/SPAN (passive collection) – provides data gathering with passive traffic monitoring to avoid disruption of OT and IIoT operations.
upvoted 3 times
...
...
Fal991l
2 years, 1 month ago
Selected Answer: BD
ChatGTP: The two security methodologies that should be included in the recommendation for applying Zero Trust principles to OT and IoT devices based on the MCRA while minimizing the risk of disrupting business operations are: B. Threat monitoring: Continuous monitoring and analysis of network traffic, system logs, and other data sources can help detect and respond to threats and attacks targeting OT and IoT devices. Threat monitoring can help identify indicators of compromise (IoCs) and provide early warning of potential security incidents. D. Passive traffic monitoring: Passive traffic monitoring involves monitoring network traffic without actively sending packets or generating traffic. This approach can help minimize the risk of disrupting business operations while still providing visibility into network activity and potential security incidents. Passive traffic monitoring can also help identify anomalies and suspicious activity that may indicate a security threat.
upvoted 4 times
Fal991l
2 years, 1 month ago
Option A, active scanning, and option C, software patching, are not necessarily the best practices for applying Zero Trust principles to OT and IoT devices, as they can potentially disrupt business operations and cause compatibility issues with legacy devices. While software patching can help mitigate vulnerabilities, it should be done in a controlled and tested manner to avoid introducing new issues or downtime.
upvoted 3 times
aks_exam
1 year, 2 months ago
ChatGPT may lead you to the right answer, but please don't comment on what it explains.
upvoted 1 times
...
...
...
AJ2021
2 years, 1 month ago
Selected Answer: BD
Adapt processes to Operational Technology (OT) - Adjust your tools and processes to the constraints of OT environments as you integrate them. These environments prioritize safety and often have older systems which don't have patches available and may crash from an active scan. Focusing on approaches like passive network detections for threats and isolation of systems is often the best approach. https://learn.microsoft.com/en-us/training/modules/use-microsoft-cybersecurity-reference-architecture-azure-security-benchmarks/3-recommend-for-protecting-from-insider-external-attacks
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago