ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have Linux virtual machines on Amazon Web Services (AWS).

You deploy Azure Defender and enable auto-provisioning.

You need to monitor the virtual machines by using Azure Defender.

Solution: You enable Azure Arc and onboard the virtual machines to Azure Arc.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-machines?pivots=azure-arc

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have Linux virtual machines on Amazon Web Services (AWS).

You deploy Azure Defender and enable auto-provisioning.

You need to monitor the virtual machines by using Azure Defender.

Solution: You manually install the Log Analytics agent on the virtual machines.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-machines?pivots=azure-arc

HOTSPOT

You need to create a query for a workbook. The query must meet the following requirements:

List all incidents by incident number.

Only include the most recent log for each incident.

How should you complete the query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 123
Correct answer: Question 123

Explanation:

Reference:

https://www.drware.com/whats-new-soc-operational-metrics-now-available-in-sentinel/

DRAG DROP

You have the resources shown in the following table.

You need to prevent duplicate events from occurring in SW1.

What should you use for each action? To answer, drag the appropriate resources to the correct actions. Each resource may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 124
Correct answer: Question 124

Explanation:

Reference: https://docs.microsoft.com/en-us/azure/sentinel/connect-log-forwarder?tabs=rsyslog

DRAG DROP

You have an Azure subscription linked to an Azure Active Directory (Azure AD) tenant. The tenant contains two users named User1 and User2.

You plan to deploy Azure Defender.

You need to enable User1 and User2 to perform tasks at the subscription level as shown in the following table.

The solution must use the principle of least privilege.

Which role should you assign to each user? To answer, drag the appropriate roles to the correct users. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.


Question 125
Correct answer: Question 125

Explanation:

Box 1: Owner

Only the Owner can assign initiatives.

Box 2: Contributor

Only the Contributor or the Owner can apply security recommendations.

Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/permissions

HOTSPOT

You have a Microsoft 365 E5 subscription that contains 200 Windows 10 devices enrolled in Microsoft Defender for Endpoint.

You need to ensure that users can access the devices by using a remote shell connection directly from the Microsoft 365 Defender portal. The solution must use the principle of least privilege.

What should you do in the Microsoft 365 Defender portal? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 126
Correct answer: Question 126

Explanation:

Box 1: Turn on Live Response

Live response is a capability that gives you instantaneous access to a device by using a remote shell connection. This gives you the power to do in-depth investigative work and take immediate response actions.

Box: 2

Network assessment jobs allow you to choose network devices to be scanned regularly and added to the device inventory.

Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/respond-machine-alerts?view=o365- worldwide https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-devices?view=o365worldwide

You have a Microsoft 365 E5 subscription that uses Microsoft SharePoint Online.

You delete users from the subscription.

You need to be notified if the deleted users downloaded numerous documents from SharePoint Online sites during the month before their accounts were deleted.

What should you use?

A.

a file policy in Microsoft Defender for Cloud Apps

A.

a file policy in Microsoft Defender for Cloud Apps

Answers
B.

an access review policy

B.

an access review policy

Answers
C.

an alert policy in Microsoft Defender for Office 365

C.

an alert policy in Microsoft Defender for Office 365

Answers
D.

an insider risk policy

D.

an insider risk policy

Answers
Suggested answer: C

Explanation:


Alert policies let you categorize the alerts that are triggered by a policy, apply the policy to all users in your organization, set a threshold level for when an alert is triggered, and decide whether to receive email notifications when alerts are triggered.

Default alert policies include:

Unusual external user file activity - Generates an alert when an unusually large number of activities are performed on files in SharePoint or OneDrive by users outside of your organization. This includes activities such as accessing files, downloading files, and deleting files. This policy has a High severity setting.

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies

You have a Microsoft 365 subscription that has Microsoft 365 Defender enabled.

You need to identify all the changes made to sensitivity labels during the past seven days.

What should you use?

A.

the Incidents blade of the Microsoft 365 Defender portal

A.

the Incidents blade of the Microsoft 365 Defender portal

Answers
B.

the Alerts settings on the Data Loss Prevention blade of the Microsoft 365 compliance center

B.

the Alerts settings on the Data Loss Prevention blade of the Microsoft 365 compliance center

Answers
C.

Activity explorer in the Microsoft 365 compliance center

C.

Activity explorer in the Microsoft 365 compliance center

Answers
D.

the Explorer settings on the Email & collaboration blade of the Microsoft 365 Defender portal

D.

the Explorer settings on the Email & collaboration blade of the Microsoft 365 Defender portal

Answers
Suggested answer: C

Explanation:


Labeling activities are available in Activity explorer.

For example:

Sensitivity label applied

This event is generated each time an unlabeled document is labeled or an email is sent with a sensitivity label.

It is captured at the time of save in Office native applications and web applications.

It is captured at the time of occurrence in Azure Information protection add-ins.

Upgrade and downgrade labels actions can also be monitored via the Label event type field and filter.

Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/data-classification-activityexplorer-available-events?view=o365-worldwide

You have a Microsoft 365 subscription that uses Microsoft 365 Defender.

You need to identify all the entities affected by an incident.

Which tab should you use in the Microsoft 365 Defender portal?

A.

Investigations

A.

Investigations

Answers
B.

Devices

B.

Devices

Answers
C.

Evidence and Response

C.

Evidence and Response

Answers
D.

Alerts

D.

Alerts

Answers
Suggested answer: C

Explanation:


The Evidence and Response tab shows all the supported events and suspicious entities in the alerts in the incident.

Reference: https://docs.microsoft.com/en-us/microsoft-365/security/defender/investigate-incidents

You have five on-premises Linux servers.

You have an Azure subscription that uses Microsoft Defender for Cloud.

You need to use Defender for Cloud to protect the Linux servers.

What should you install on the servers first?

A.

the Dependency agent

A.

the Dependency agent

Answers
B.

the Log Analytics agent

B.

the Log Analytics agent

Answers
C.

the Azure Connected Machine agent

C.

the Azure Connected Machine agent

Answers
D.

the Guest Configuration extension

D.

the Guest Configuration extension

Answers
Suggested answer: B

Explanation:


Defender for Cloud depends on the Log Analytics agent.

Use the Log Analytics agent if you need to:

* Collect logs and performance data from Azure virtual machines or hybrid machines hosted outside of Azure * Etc.

Reference:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/os-coverage

https://docs.microsoft.com/en-us/azure/azure-monitor/agents/agents-overview#log-analytics-agent

Total 295 questions
Go to page: of 30