ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











HOTSPOT

You need to create the analytics rule to meet the Azure Sentinel requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 111
Correct answer: Question 111

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-detect-threats-custom#set-automated-responses-and-create-the-rule

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook

You need to restrict cloud apps running on CLIENT1 to meet the Microsoft Defender for Endpoint requirements.

Which two configurations should you modify? Each correct answer present part of the solution.

NOTE: Each correct selection is worth one point.

A.

the Onboarding settings from Device management in Microsoft Defender Security Center

A.

the Onboarding settings from Device management in Microsoft Defender Security Center

Answers
B.

Cloud App Security anomaly detection policies

B.

Cloud App Security anomaly detection policies

Answers
C.

Advanced features from Settings in Microsoft Defender Security Center

C.

Advanced features from Settings in Microsoft Defender Security Center

Answers
D.

the Cloud Discovery settings in Cloud App Security

D.

the Cloud Discovery settings in Cloud App Security

Answers
Suggested answer: C, D

Explanation:


All Cloud App Security unsanctioned apps must be blocked on the Windows 10 computers by using Microsoft Defender for Endpoint.

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/mde-govern

You need to restrict cloud apps running on CUENT1 to meet the Microsoft Defender for Endpoint requirements. Which two configurations should you modify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A.

the Cloud Discovery settings in Microsoft Defender for Cloud Apps

A.

the Cloud Discovery settings in Microsoft Defender for Cloud Apps

Answers
B.

the Onboarding settings from Device management in Settings in Microsoft 365 Defender portal

B.

the Onboarding settings from Device management in Settings in Microsoft 365 Defender portal

Answers
C.

Microsoft Defender for Cloud Apps anomaly detection policies

C.

Microsoft Defender for Cloud Apps anomaly detection policies

Answers
D.

Advanced features from the Endpoints Settings in the Microsoft 365 Defender portal

D.

Advanced features from the Endpoints Settings in the Microsoft 365 Defender portal

Answers
Suggested answer: A, D

HOTSPOT

You need to configure the Microsoft Sentinel integration to meet the Microsoft Sentinel requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Question 114
Correct answer: Question 114

HOTSPOT

You need to implement Microsoft Defender for Cloud to meet the Microsoft Defender for Cloud requirements and the business requirements. What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Question 115
Correct answer: Question 115

Explanation:

You need to implement the Azure Information Protection requirements.

What should you configure first?

A.

Device health and compliance reports settings in Microsoft Defender Security Center

A.

Device health and compliance reports settings in Microsoft Defender Security Center

Answers
B.

scanner clusters in Azure Information Protection from the Azure portal

B.

scanner clusters in Azure Information Protection from the Azure portal

Answers
C.

content scan jobs in Azure Information Protection from the Azure portal

C.

content scan jobs in Azure Information Protection from the Azure portal

Answers
D.

Advanced features from Settings in Microsoft Defender Security Center

D.

Advanced features from Settings in Microsoft Defender Security Center

Answers
Suggested answer: D

Explanation:

Reference:

https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview

You need to modify the anomaly detection policy settings to meet the Cloud App Security requirements.

Which policy should you modify?

A.

Activity from suspicious IP addresses

A.

Activity from suspicious IP addresses

Answers
B.

Activity from anonymous IP addresses

B.

Activity from anonymous IP addresses

Answers
C.

Impossible travel

C.

Impossible travel

Answers
D.

Risky sign-in

D.

Risky sign-in

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy

DRAG DROP

You need to configure DC1 to meet the business requirements.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Question 118
Correct answer: Question 118

Explanation:

Step 1: log in to https://portal.atp.azure.com as a global admin

Step 2: Create the instance

Step 3. Connect the instance to Active Directory

Step 4. Download and install the sensor.

Reference:

https://docs.microsoft.com/en-us/defender-for-identity/install-step1

https://docs.microsoft.com/en-us/defender-for-identity/install-step4

You have a third-party security information and event management (SIEM) solution.

You need to ensure that the SIEM solution can generate alerts for Azure Active Directory (Azure AD) sign-events in near real time.

What should you do to route events to the SIEM solution?

A.

Create an Azure Sentinel workspace that has a Security Events connector.

A.

Create an Azure Sentinel workspace that has a Security Events connector.

Answers
B.

Configure the Diagnostics settings in Azure AD to stream to an event hub.

B.

Configure the Diagnostics settings in Azure AD to stream to an event hub.

Answers
C.

Create an Azure Sentinel workspace that has an Azure Active Directory connector.

C.

Create an Azure Sentinel workspace that has an Azure Active Directory connector.

Answers
D.

Configure the Diagnostics settings in Azure AD to archive to a storage account.

D.

Configure the Diagnostics settings in Azure AD to archive to a storage account.

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/overview-monitoring

You have an Azure subscription that contains a virtual machine named VM1 and uses Azure Defender. Azure Defender has automatic provisioning enabled.

You need to create a custom alert suppression rule that will supress false positive alerts for suspicious use of PowerShell on VM1.

What should you do first?

A.

From Azure Security Center, add a workflow automation.

A.

From Azure Security Center, add a workflow automation.

Answers
B.

On VM1, run the Get-MPThreatCatalog cmdlet.

B.

On VM1, run the Get-MPThreatCatalog cmdlet.

Answers
C.

On VM1 trigger a PowerShell alert.

C.

On VM1 trigger a PowerShell alert.

Answers
D.

From Azure Security Center, export the alerts to a Log Analytics workspace.

D.

From Azure Security Center, export the alerts to a Log Analytics workspace.

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-alerts?view=o365-worldwide

Total 295 questions
Go to page: of 30