Microsoft Cybersecurity Architect Expert SC-100

Microsoft Cybersecurity Architect Expert SC-100

Get started today

Ultimate access to all questions.


A customer adheres to the Zero Trust model by verifying every attempt to access its corporate applications. The customer detects that multiple endpoints are contaminated with malware. Consequently, the customer suspends access attempts originating from these infected endpoints. After successfully removing the malware from the endpoints, which two conditions need to be fulfilled before users of these endpoints can regain access to the corporate applications? Each correct answer represents a part of the solution. NOTE: Each correct selection is worth one point.




Explanation:

To reinstate access after addressing malware infections, two key conditions must be met. First, the client access tokens must be refreshed because the previous tokens were compromised during the infection. Second, Microsoft Defender for Endpoint must report the endpoints as compliant, ensuring that the malware has been successfully removed and the endpoints are now secure. While both Intune and Conditional Access policies are part of the broader Zero Trust model, the specific scenario described does not necessitate new Conditional Access policies or solely rely on Intune compliance for re-establishing access.