Microsoft SC-200 Practice Test - Questions Answers, Page 12
List of questions
Related questions
HOTSPOT
You need to create the analytics rule to meet the Azure Sentinel requirements.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
You need to restrict cloud apps running on CLIENT1 to meet the Microsoft Defender for Endpoint requirements.
Which two configurations should you modify? Each correct answer present part of the solution.
NOTE: Each correct selection is worth one point.
the Onboarding settings from Device management in Microsoft Defender Security Center
Cloud App Security anomaly detection policies
Advanced features from Settings in Microsoft Defender Security Center
the Cloud Discovery settings in Cloud App Security
You need to restrict cloud apps running on CUENT1 to meet the Microsoft Defender for Endpoint requirements. Which two configurations should you modify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
the Cloud Discovery settings in Microsoft Defender for Cloud Apps
the Onboarding settings from Device management in Settings in Microsoft 365 Defender portal
Microsoft Defender for Cloud Apps anomaly detection policies
Advanced features from the Endpoints Settings in the Microsoft 365 Defender portal
HOTSPOT
You need to configure the Microsoft Sentinel integration to meet the Microsoft Sentinel requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
HOTSPOT
You need to implement Microsoft Defender for Cloud to meet the Microsoft Defender for Cloud requirements and the business requirements. What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
You need to implement the Azure Information Protection requirements.
What should you configure first?
Device health and compliance reports settings in Microsoft Defender Security Center
scanner clusters in Azure Information Protection from the Azure portal
content scan jobs in Azure Information Protection from the Azure portal
Advanced features from Settings in Microsoft Defender Security Center
You need to modify the anomaly detection policy settings to meet the Cloud App Security requirements.
Which policy should you modify?
Activity from suspicious IP addresses
Activity from anonymous IP addresses
Impossible travel
Risky sign-in
DRAG DROP
You need to configure DC1 to meet the business requirements.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
You have a third-party security information and event management (SIEM) solution.
You need to ensure that the SIEM solution can generate alerts for Azure Active Directory (Azure AD) sign-events in near real time.
What should you do to route events to the SIEM solution?
Create an Azure Sentinel workspace that has a Security Events connector.
Configure the Diagnostics settings in Azure AD to stream to an event hub.
Create an Azure Sentinel workspace that has an Azure Active Directory connector.
Configure the Diagnostics settings in Azure AD to archive to a storage account.
You have an Azure subscription that contains a virtual machine named VM1 and uses Azure Defender. Azure Defender has automatic provisioning enabled.
You need to create a custom alert suppression rule that will supress false positive alerts for suspicious use of PowerShell on VM1.
What should you do first?
From Azure Security Center, add a workflow automation.
On VM1, run the Get-MPThreatCatalog cmdlet.
On VM1 trigger a PowerShell alert.
From Azure Security Center, export the alerts to a Log Analytics workspace.
Question