ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 273 - SC-200 discussion

Report
Export

You have a Microsoft 365 subscription that uses Microsoft Defender XDR.

You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.

You need to search for malicious activities in your organization.

Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?

A.

Tactic? only

Answers
A.

Tactic? only

B.

Tactic1 and Tactic2 only

Answers
B.

Tactic1 and Tactic2 only

C.

Tac1ic2 and Tactic3 only

Answers
C.

Tac1ic2 and Tactic3 only

D.

Taclic1. Tac1ic2. andTactic3

Answers
D.

Taclic1. Tac1ic2. andTactic3

Suggested answer: B
asked 05/10/2024
Christian Gyssels
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first