ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You use Azure Security Center.

You receive a security alert in Security Center.

You need to view recommendations to resolve the alert in Security Center.

Solution: From Security alerts, you select the alert, select Take Action, and then expand the Prevent future attacks section.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

You need to resolve the existing alert, not prevent future alerts. Therefore, you need to select the 'Mitigate the threat' option.

Reference:

https://docs.microsoft.com/en-us/azure/security-center/security-center-manaqinq-and-respondinq-alerts

You receive an alert from Azure Defender for Key Vault.

You discover that the alert is generated from multiple suspicious IP addresses.

You need to reduce the potential of Key Vault secrets being leaked while you investigate the issue. The solution must be implemented as soon as possible and must minimize the impact on legitimate users.

What should you do first?

A.

Modify the access control settings for the key vault.

A.

Modify the access control settings for the key vault.

Answers
B.

Enable the Key Vault firewall.

B.

Enable the Key Vault firewall.

Answers
C.

Create an application security group.

C.

Create an application security group.

Answers
D.

Modify the access policy for the key vault.

D.

Modify the access policy for the key vault.

Answers
Suggested answer: B

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/security-center/defender-for-kev-vault-usaQe

You have a Microsoft 365 subscription that uses Azure Defender.

You have 100 virtual machines in a resource group named RG1.

You assign the Security Admin roles to a new user named Sec Adm in 1.

You need to ensure that SecAdminl can apply quick fixes to the virtual machines by using Azure Defender. The solution must use the principle of least privilege.

Which role should you assign to SecAdminl?

A.

the Security Reader role for the subscription

A.

the Security Reader role for the subscription

Answers
B.

the Contributor for the subscription

B.

the Contributor for the subscription

Answers
C.

the Contributor role for RG1

C.

the Contributor role for RG1

Answers
D.

the Owner role for RG1

D.

the Owner role for RG1

Answers
Suggested answer: C

You provision a Linux virtual machine in a new Azure subscription.

You enable Azure Defender and onboard the virtual machine to Azure Defender.

You need to verify that an attack on the virtual machine triggers an alert in Azure Defender.

Which two Bash commands should you run on the virtual machine? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

cp /bin/echo ./asc_alerttest_662jfi039n

A.

cp /bin/echo ./asc_alerttest_662jfi039n

Answers
B.

./alerttest testing eicar pipe

B.

./alerttest testing eicar pipe

Answers
C.

cp /bin/echo ./alerttest

C.

cp /bin/echo ./alerttest

Answers
D.

./asc_alerttest_662jfi039n testing eicar pipe

D.

./asc_alerttest_662jfi039n testing eicar pipe

Answers
Suggested answer: A, D

Explanation:

Reference:

https://docs.mic rosoft.com/en-us/azure/securitv-center/security-c enter-ale rt-validation#simulate-alerts-on-your-azure-vms-linux-

You create an Azure subscription named sub1.

In sub1, you create a Log Analytics workspace named workspace*!.

You enable Azure Security Center and configure Security Center to use workspace*!.

You need to colect security event logs from the Azure virtual machines that report to workspace 1.

What should you do?

A.

From Security Center, enable data colection

A.

From Security Center, enable data colection

Answers
B.

In sub*!, register a provider.

B.

In sub*!, register a provider.

Answers
C.

From Security Center, create a Workflow automation.

C.

From Security Center, create a Workflow automation.

Answers
D.

In workspace*!, create a workbook.

D.

In workspace*!, create a workbook.

Answers
Suggested answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/security-center/security-center-enable-data-colection

Your company uses Azure Security Center and Azure Defender.

The security operations team at the company informs you that it does NOT receive email notifications for security alerts.

What should you configure in Security Center to enable the email notifications?

A.

Security solutions

A.

Security solutions

Answers
B.

Security policy

B.

Security policy

Answers
C.

Pricing & settings

C.

Pricing & settings

Answers
D.

Security alerts

D.

Security alerts

Answers
E.

Azure Defender

E.

Azure Defender

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/securitv-center/securitv-center-provide-security-contact-details

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You use Azure Security Center.

You receive a security alert in Security Center.

You need to view recommendations to resolve the alert in Security Center.

Solution: From Regulatory compliance, you download the report.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/security-center/security-center-managing-and-respondinq-alerts

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You use Azure Security Center.

You receive a security alert in Security Center.

You need to view recommendations to resolve the alert in Security Center.

Solution: From Security alerts, you select the alert, select Take Action, and then expand the Mitigate the threat section.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/security-center/security-center-manaqinq-and-respondinq-alerts

You have an Azure subscription that has Azure Defender enabled for all supported resource types.

You need to configure the continuous export of high-severity alerts to enable their retrieval from a third-party security information and event management (SIEM) solution.

To which service should you export the alerts?

A.

Azure Cosmos DB

A.

Azure Cosmos DB

Answers
B.

Azure Event Grid

B.

Azure Event Grid

Answers
C.

Azure Event Hubs

C.

Azure Event Hubs

Answers
D.

Azure Data Lake

D.

Azure Data Lake

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.mic rosoft. co m/en-us/azure/security-center/continuous-export?tabs=azure-portal

You are responsible for responding to Azure Defender for Key Vault alerts.

During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.

What should you configure to mitigate the threat?

A.

Key Vault firewals and virtual networks

A.

Key Vault firewals and virtual networks

Answers
B.

Azure Active Directory (Azure AD) permissions

B.

Azure Active Directory (Azure AD) permissions

Answers
C.

role-based access control (RBAC) for the key vault

C.

role-based access control (RBAC) for the key vault

Answers
D.

the access policy settings of the key vault

D.

the access policy settings of the key vault

Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/key-vault/qeneral/network-security

Total 295 questions
Go to page: of 30