ExamGecko
Home / Microsoft / SC-200 / List of questions
Ask Question

Microsoft SC-200 Practice Test - Questions Answers, Page 12

List of questions

Question 111

Report
Export
Collapse

HOTSPOT

You need to create the analytics rule to meet the Azure Sentinel requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 111 107849 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 111 107849 10052024010847000

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-detect-threats-custom#set-automated-responses-and-create-the-rule

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook

asked 05/10/2024
Tom Nice
30 questions

Question 112

Report
Export
Collapse

You need to restrict cloud apps running on CLIENT1 to meet the Microsoft Defender for Endpoint requirements.

Which two configurations should you modify? Each correct answer present part of the solution.

NOTE: Each correct selection is worth one point.

the Onboarding settings from Device management in Microsoft Defender Security Center

the Onboarding settings from Device management in Microsoft Defender Security Center

Cloud App Security anomaly detection policies

Cloud App Security anomaly detection policies

Advanced features from Settings in Microsoft Defender Security Center

Advanced features from Settings in Microsoft Defender Security Center

the Cloud Discovery settings in Cloud App Security

the Cloud Discovery settings in Cloud App Security

Suggested answer: C, D

Explanation:


All Cloud App Security unsanctioned apps must be blocked on the Windows 10 computers by using Microsoft Defender for Endpoint.

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/mde-govern

asked 05/10/2024
Marie Joyce Candice Dancel
42 questions

Question 113

Report
Export
Collapse

You need to restrict cloud apps running on CUENT1 to meet the Microsoft Defender for Endpoint requirements. Which two configurations should you modify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

the Cloud Discovery settings in Microsoft Defender for Cloud Apps

the Cloud Discovery settings in Microsoft Defender for Cloud Apps

the Onboarding settings from Device management in Settings in Microsoft 365 Defender portal

the Onboarding settings from Device management in Settings in Microsoft 365 Defender portal

Microsoft Defender for Cloud Apps anomaly detection policies

Microsoft Defender for Cloud Apps anomaly detection policies

Advanced features from the Endpoints Settings in the Microsoft 365 Defender portal

Advanced features from the Endpoints Settings in the Microsoft 365 Defender portal

Suggested answer: A, D
asked 05/10/2024
bijay ghimire
37 questions

Question 114

Report
Export
Collapse

HOTSPOT

You need to configure the Microsoft Sentinel integration to meet the Microsoft Sentinel requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 114 107852 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 114 107852 10052024010847000
asked 05/10/2024
Zahidul Haque
47 questions

Question 115

Report
Export
Collapse

HOTSPOT

You need to implement Microsoft Defender for Cloud to meet the Microsoft Defender for Cloud requirements and the business requirements. What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 115 107853 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 115 107853 10052024010847000

Explanation:

asked 05/10/2024
Razan Althubaiti
42 questions

Question 116

Report
Export
Collapse

You need to implement the Azure Information Protection requirements.

What should you configure first?

Device health and compliance reports settings in Microsoft Defender Security Center

Device health and compliance reports settings in Microsoft Defender Security Center

scanner clusters in Azure Information Protection from the Azure portal

scanner clusters in Azure Information Protection from the Azure portal

content scan jobs in Azure Information Protection from the Azure portal

content scan jobs in Azure Information Protection from the Azure portal

Advanced features from Settings in Microsoft Defender Security Center

Advanced features from Settings in Microsoft Defender Security Center

Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview

asked 05/10/2024
BISWARUP KUNDU
41 questions

Question 117

Report
Export
Collapse

You need to modify the anomaly detection policy settings to meet the Cloud App Security requirements.

Which policy should you modify?

Activity from suspicious IP addresses

Activity from suspicious IP addresses

Activity from anonymous IP addresses

Activity from anonymous IP addresses

Impossible travel

Impossible travel

Risky sign-in

Risky sign-in

Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy

asked 05/10/2024
Ange YAO
38 questions

Question 118

Report
Export
Collapse

DRAG DROP

You need to configure DC1 to meet the business requirements.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Microsoft SC-200 image Question 118 107774 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 118 107774 10052024010847000

Explanation:

Step 1: log in to https://portal.atp.azure.com as a global admin

Step 2: Create the instance

Step 3. Connect the instance to Active Directory

Step 4. Download and install the sensor.

Reference:

https://docs.microsoft.com/en-us/defender-for-identity/install-step1

https://docs.microsoft.com/en-us/defender-for-identity/install-step4

asked 05/10/2024
Ali Alaqoul
34 questions

Question 119

Report
Export
Collapse

You have a third-party security information and event management (SIEM) solution.

You need to ensure that the SIEM solution can generate alerts for Azure Active Directory (Azure AD) sign-events in near real time.

What should you do to route events to the SIEM solution?

Create an Azure Sentinel workspace that has a Security Events connector.

Create an Azure Sentinel workspace that has a Security Events connector.

Configure the Diagnostics settings in Azure AD to stream to an event hub.

Configure the Diagnostics settings in Azure AD to stream to an event hub.

Create an Azure Sentinel workspace that has an Azure Active Directory connector.

Create an Azure Sentinel workspace that has an Azure Active Directory connector.

Configure the Diagnostics settings in Azure AD to archive to a storage account.

Configure the Diagnostics settings in Azure AD to archive to a storage account.

Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring

asked 05/10/2024
Luis Campoy
41 questions

Question 120

Report
Export
Collapse

You have an Azure subscription that contains a virtual machine named VM1 and uses Azure Defender. Azure Defender has automatic provisioning enabled.

You need to create a custom alert suppression rule that will supress false positive alerts for suspicious use of PowerShell on VM1.

What should you do first?

From Azure Security Center, add a workflow automation.

From Azure Security Center, add a workflow automation.

On VM1, run the Get-MPThreatCatalog cmdlet.

On VM1, run the Get-MPThreatCatalog cmdlet.

On VM1 trigger a PowerShell alert.

On VM1 trigger a PowerShell alert.

From Azure Security Center, export the alerts to a Log Analytics workspace.

From Azure Security Center, export the alerts to a Log Analytics workspace.

Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-alerts?view=o365-worldwide

asked 05/10/2024
garima sharma
51 questions
Total 307 questions
Go to page: of 31
Search

Related questions