Microsoft Cybersecurity Architect Expert SC-100

Microsoft Cybersecurity Architect Expert SC-100

Get started today

Ultimate access to all questions.


Your organization is planning to implement a new virtual desktop infrastructure (VDI) to support remote work for employees across various departments. As a cybersecurity architect, you are tasked with specifying the security requirements for the VDI environment. The solution must comply with industry standards, ensure data protection, and support scalability for future growth. Considering these requirements, which of the following measures should you prioritize to ensure the security of the VDI environment? (Choose one correct option)




Explanation:

A comprehensive security strategy for a VDI environment must address multiple layers of security, including the virtual desktops, the underlying infrastructure, and data in transit and at rest. Secure access controls ensure that only authorized users can access the VDI, encryption protects sensitive data from unauthorized access, and continuous monitoring and logging enable the detection and response to security incidents in real-time. Option A is incorrect because it overlooks the importance of securing the underlying infrastructure and network communications. Option B is incorrect because default security features may not suffice to meet all compliance and security requirements. Option D is incorrect because it compromises security for the sake of simplicity and cost, potentially exposing the organization to data breaches and compliance violations.