Microsoft SC-200 Practice Test - Questions Answers, Page 13

List of questions
Question 121

You have a Microsoft 365 E5 subscription that uses Microsoft Copilot for Security. You plan to run the following code to create a custom Copilot for Security plugin.
You need to specify a format and complete the code segment. Which format should you use for the <target> variable?
API
GPT
KQL
SQL
Question 122

You have a Microsoft 365 B5 subscription that contains two groups named Group! and Group2 and uses Microsoft Copilot for Security. You need to configure Copilot for Security role assignments to meet the following requirements:
* Ensure that members of Group1 can run prompts and respond to Microsoft Defender XDR security incidents.
* Ensure that members of Group2 can run prompts.
* Follow the principle of least privilege.
You remove Everyone from the Copilot Contributor role.
Which two actions should you perform next? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
Assign the Copilot Contributor role to Group2.
Assign the Security Operator role to Group1.
Assign the Copilot Owner role to Group1.
Assign the Security Operator role to Group2.
Assign the Copilot Owner role to Group2.
Question 123

You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an incident.
You need to review the incident tasks that were performed. The solution must include a query that will display the incidents in a workbook, and then display the tasks of each incident in another grid.
Which table should you target in the query?
Securitylncident
SecurityEvent
Sentine1Audit
SecurityAlert
Question 124

HOTSPOT
You have a Microsoft 365 subscription that contains three users named User1. User2 and User3 and the resources shown in the following table.
You have a Microsoft Defender XDR detection rule named Rule1 that has the following configurations:
* Scope: DevGroup1
* File hash: File1.exe
* Actions
o Devices: Collect investigation package
o User: Mark as compromised o Files: Block
Each user attempts to run File1.exe on their device.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Question 125

You have 1,000 on-premises Windows 11 Pro devices that are onboarded to Microsoft Defender for Endpoint. You have a Microsoft 365 subscription that uses Microsoft Defender XDR. You identify that an attacker performed the following actions on a device:
* Modified the file system path of a registry-based antivirus exclusion
* Downloaded a malicious file to the file system path
You initiate a live response session on the device. You need to undo the registry change. Which command should you run?
analyze
registry
remediate
scan
Question 126

You have a Microsoft 365 B5 subscription. You have a PowerShell script that queries the unified audit log.
You discover that the query returns only the first page of results due to server-side paging. You need to ensure that you get all the results. Which property should you query in the results?
@odata.nextlink
@odata.deltaLink
@odata.context
@odata.count
Question 127

HOTSPOT
You have a Microsoft Sentinel workbook that contains the following KQL query.
You need to create a visual that will change the color of the errCount column based on the value returned. How should you configure the visual? To answer, select the appropriate options in the answer are a. NOTE: Each correct selection is worth one point.
Question 128

HOTSPOT
You have an Azure subscription named Sub1 that contains the resources shown in the following table.
You plan to configure Rule1 to trigger Lapp1 when an incident is generated.
You need to recommend the role-based access control (RBAC) role that you should assign to WS1, and the scope at which should you assign the role. The solution must follow the principle of least privilege.
What should you recommend? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Question 129

You have an Azure subscription that contains a Microsoft Sentinel workspace named Workspace1 and a user named User1.
You need to ensure that User1 can investigate incidents by using Workspace1. The solution must follow the principle of least privilege.
Which role should you assign to User1?
Microsoft Sentinel Responder
Microsoft Sentinel Reader
Microsoft Sentinel Automation Contributor
Microsoft Sentinel Contributor
Question 130

You have a Microsoft 365 B5 subscription that contains a user named User1. The subscription uses Microsoft 365 Copilot for Security. Copilot for Security uses the Sentinel plugin. User1 is assigned the Copilot Contributor role.
During an investigation, User1 submits a prompt and receives a notification that Copilot for Security cannot respond to requests because the security compute unit (SCU) usage is nearing the provisioned capacity limit.
You need to ensure that User1 can use Copilot for Security to generate a successful response.
What should User1 do?
Open a second Copilot for Security session and submit the prompt.
Wait one hour and resubmit the prompt.
Run the Microsoft Sentinel Optimization Workbook.
Update the provisioned SCUs.
Question