ExamGecko
Home / Microsoft / SC-200 / List of questions
Ask Question

Microsoft SC-200 Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report
Export
Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You have a virtual machine that runs Windows 10 and has the Log Analytics agent installed.

You need to simulate an attack on the virtual machine that will generate an alert.

What should you do first?

Run the Log Analytics Troubleshooting Tool.

Run the Log Analytics Troubleshooting Tool.

Copy a executable and rename the file as ASC_AlerTest_662jf10N,exe

Copy a executable and rename the file as ASC_AlerTest_662jf10N,exe

Modify the settings of the Microsoft Monitoring Agent.

Modify the settings of the Microsoft Monitoring Agent.

Run the MMASetup executable and specify the -foo argument

Run the MMASetup executable and specify the -foo argument

Suggested answer: B
asked 05/10/2024
Max Lenin Dos Santos Torres
50 questions

Question 152

Report
Export
Collapse

HOTSPOT

You have the following KQL query.

Microsoft SC-200 image Question 34 107921 10052024010847000000


Microsoft SC-200 image Question 152 107921 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 152 107921 10052024010847000
asked 05/10/2024
James Valdivia
30 questions

Question 153

Report
Export
Collapse

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.

You need to add threat indicators for all the IP addresses in a range of 171.23.3432-171.2334.63. The solution must minimize administrative effort.

What should you do in the Microsoft 365 Defender portal?

Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.

Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.

Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.

Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.

Select Add indicator and set the IP address to 171.23.34.32/27

Select Add indicator and set the IP address to 171.23.34.32/27

Create an import file that contains the individual IP addresses in the range. Select Import and import the file.

Create an import file that contains the individual IP addresses in the range. Select Import and import the file.

Suggested answer: D

Explanation:

This will add all the IP addresses in the range of 171.23.34.32/27 as threat indicators. This is the simplest and most efficient way to add all the IP addresses in the range.Reference: [1] https://docs.microsoft.com/en-us/windows/security/ threat-protection/microsoft- defender-atp/threat-intelligence-manage-indicators

asked 05/10/2024
Dasaret Tillman
40 questions

Question 154

Report
Export
Collapse

Your company has an on-premises network that uses Microsoft Defender for Identity.

The Microsoft Secure Score for the company includes a security assessment associated with unsecure Kerberos delegation.

You need remediate the security risk.

What should you do?

Install the Local Administrator Password Solution (LAPS) extension on the computers listed as exposed entities.

Install the Local Administrator Password Solution (LAPS) extension on the computers listed as exposed entities.

Modify the properties of the computer objects listed as exposed entities.

Modify the properties of the computer objects listed as exposed entities.

Disable legacy protocols on the computers listed as exposed entities.

Disable legacy protocols on the computers listed as exposed entities.

Enforce LDAP signing on the computers listed as exposed entities.

Enforce LDAP signing on the computers listed as exposed entities.

Suggested answer: B

Explanation:


asked 05/10/2024
Tuukka Valkeasuo
33 questions

Question 155

Report
Export
Collapse

HOTSPOT

You have a Microsoft Sentinel workspace named Workspaces

You configure Workspace1 to collect DNS events and deploy the Advanced Security information Model (ASIM) unifying parser for the DNS schema.

You need to query the ASIM DNS schema to list all the DNS events from the last 24 hours that have a response code of 'NXDOMAIN' and were aggregated by the source IP address in 15-minute intervals.

The solution must maximize query performance.

How should you complete the query? To answer, select the appropriate options in the answer area

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 155 107924 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 155 107924 10052024010847000
asked 05/10/2024
Subramaniam Pratheep
39 questions

Question 156

Report
Export
Collapse

HOTSPOT

You have an Azure subscription that contains an Microsoft Sentinel workspace.

You need to create a hunting query using Kusto Query Language (KQL) that meets the following requirements:

• Identifies an anomalous number of changes to the rules of a network security group (NSG) made by the same security principal

• Automatically associates the security principal with an Microsoft Sentinel entity

How should you complete the query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 156 107925 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 156 107925 10052024010847000
asked 05/10/2024
Olanrewaju Abolanle
31 questions

Question 157

Report
Export
Collapse

You have an Azure subscription that uses Microsoft Sentinel.

You detect a new threat by using a hunting query.

You need to ensure that Microsoft Sentinel automatically detects the threat. The solution must minimize administrative effort.

What should you do?

Create a playbook.

Create a playbook.

Create a watchlist.

Create a watchlist.

Create an analytics rule.

Create an analytics rule.

Add the query to a workbook.

Add the query to a workbook.

Suggested answer: A

Explanation:


asked 05/10/2024
gregory damon
39 questions

Question 158

Report
Export
Collapse

You have an Azure subscription that uses Microsoft Defender for Cloud and contains a storage account named storage1. You receive an alert that there was an unusually high volume of delete operations on the blobs in storage1. You need to identify which blobs were deleted. What should you review?

the activity logs of storage1

the activity logs of storage1

the Azure Storage Analytics logs

the Azure Storage Analytics logs

the alert details

the alert details

the related entities of the alert

the related entities of the alert

Suggested answer: A

Explanation:

To identify which blobs were deleted, you should review the activity logs of the storage account. The activity logs contain information about all the operations that have taken place in the storage account, including delete operations. These logs can be accessed in the Azure portal by navigating to the storage account, selecting "Activity log" under the "Monitoring" section, and filtering by the appropriate time range. You can also use

Azure Monitor and Log Analytics to query and analyze the activity logs data.

Reference:

https://docs.microsoft.com/en-us/azure/storage/common/storage-activity-logs

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/activity-log-azure-storage

asked 05/10/2024
Bill May
45 questions

Question 159

Report
Export
Collapse

You have a Microsoft Sentinel workspace.

You have a query named Query1 as shown in the following exhibit.

Microsoft SC-200 image Question 41 107928 10052024010847000000

You plan to create a custom parser named Parser 1. You need to use Query1 in Parser1. What should you do first?

Remove line 2.

Remove line 2.

In line 4. remove the TimeGenerated predicate.

In line 4. remove the TimeGenerated predicate.

Remove line 5.

Remove line 5.

In line 3, replace the 'contains operator with the !has operator.

In line 3, replace the 'contains operator with the !has operator.

Suggested answer: A
asked 05/10/2024
Umesh Hirji
28 questions

Question 160

Report
Export
Collapse

You have an Azure subscription that contains a Microsoft Sentinel workspace. The workspace contains a Microsoft Defender for Cloud data connector. You need to customize which details will be included when an alert is created for a specific event. What should you do?

Modify the properties of the connector.

Modify the properties of the connector.

Create a Data Collection Rule (DCR).

Create a Data Collection Rule (DCR).

Create a scheduled query rule.

Create a scheduled query rule.

Enable User and Entity Behavior Analytics (UEBA)

Enable User and Entity Behavior Analytics (UEBA)

Suggested answer: D
asked 05/10/2024
Pamela Joanne Ang
31 questions
Total 307 questions
Go to page: of 31
Search

Related questions