ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 133 - SC-200 discussion

Report
Export

You have a Microsoft Sentinel workspace that contains the following incident.

Brute force attack against Azure Portal analytics rule has been triggered.

You need to identify the geolocation information that corresponds to the incident.

What should you do?

A.

From Overview, review the Potential malicious events map.

Answers
A.

From Overview, review the Potential malicious events map.

B.

From Incidents, review the details of the iPCustomEntity entity associated with the incident.

Answers
B.

From Incidents, review the details of the iPCustomEntity entity associated with the incident.

C.

From Incidents, review the details of the AccouncCuscomEntity entity associated with the incident.

Answers
C.

From Incidents, review the details of the AccouncCuscomEntity entity associated with the incident.

D.

From Investigation, review insights on the incident entity.

Answers
D.

From Investigation, review insights on the incident entity.

Suggested answer: A

Explanation:


Potential malicious events: When traffic is detected from sources that are known to be malicious, Microsoft Sentinel alerts you on the map. If you see orange, it is inbound traffic: someone is trying to access your organization from a known malicious IP address. If you see Outbound (red) activity, it means that data from your network is being streamed out of your organization to a known malicious IP address.

asked 05/10/2024
Sivakumar Duraimanickam
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first