SC-100 · Question #129
SC-100 Question #129: Real Exam Question with Answer & Explanation
The correct answer is B: threat monitoring. {"question_number": 1, "correct_answer": "B, D", "explanation": "When applying Zero Trust to legacy OT and IoT devices, the key constraint is minimizing operational disruption. Legacy OT/IoT devices are often fragile and cannot tolerate disruptive interactions. Active scanning (A
Question
You have legacy operational technology (OT) devices and IoT devices. You need to recommend best practices for applying Zero Trust principles to the OT and IoT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations. Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Options
- Aactive scanning
- Bthreat monitoring
- Csoftware patching
- Dpassive traffic monitoring
Explanation
{"question_number": 1, "correct_answer": "B, D", "explanation": "When applying Zero Trust to legacy OT and IoT devices, the key constraint is minimizing operational disruption. Legacy OT/IoT devices are often fragile and cannot tolerate disruptive interactions. Active scanning (A) sends probes to devices and can crash or destabilize sensitive OT/ICS equipment. Software patching (C) requires downtime and testing cycles that can disrupt production operations. Passive traffic monitoring (D) observes network traffic without interacting with devices, making it completely non-disruptive. Threat monitoring (B) analyzes logs and telemetry to detect threats without touching the devices directly. The MCRA specifically recommends passive and non-invasive approaches for OT/IoT environments because availability is a primary concern and active methods risk taking critical systems offline.", "generated_by": "claude-sonnet", "llm_judge_score": 4}
Topics
Community Discussion
No community discussion yet for this question.