List of questions
Related questions
Question 49 - SC-200 discussion
DRAG DROP
You have an Azure Sentinel deployment.
You need to query for all suspicious credential access activities.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
0 comments
Sorted by
Leave a comment first