nerdexam
MicrosoftMicrosoft

SC-100 · Question #129

SC-100 Question #129: Real Exam Question with Answer & Explanation

The correct answer is B: threat monitoring. {"question_number": 1, "correct_answer": "B, D", "explanation": "When applying Zero Trust to legacy OT and IoT devices, the key constraint is minimizing operational disruption. Legacy OT/IoT devices are often fragile and cannot tolerate disruptive interactions. Active scanning (A

Design solutions that align with security best practices and priorities

Question

You have legacy operational technology (OT) devices and IoT devices. You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations. Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Options

  • Aactive scanning
  • Bthreat monitoring
  • Csoftware patching
  • Dpassive traffic monitoring

Explanation

{"question_number": 1, "correct_answer": "B, D", "explanation": "When applying Zero Trust to legacy OT and IoT devices, the key constraint is minimizing operational disruption. Legacy OT/IoT devices are often fragile and cannot tolerate disruptive interactions. Active scanning (A) sends probes to devices and can crash or destabilize sensitive OT/ICS equipment. Software patching (C) requires downtime and testing cycles that can disrupt production operations. Passive traffic monitoring (D) observes network traffic without interacting with devices, making it completely non-disruptive. Threat monitoring (B) analyzes logs and telemetry to detect threats without touching the devices directly. The MCRA specifically recommends passive and non-invasive approaches for OT/IoT environments because availability is a primary concern and active methods risk taking critical systems offline.", "generated_by": "claude-sonnet", "llm_judge_score": 4}

Topics

#Zero Trust#OT/IoT Security#Security Monitoring#MCRA

Community Discussion

No community discussion yet for this question.

Full SC-100 PracticeBrowse All SC-100 Questions