ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You have a virtual machine that runs Windows 10 and has the Log Analytics agent installed.

You need to simulate an attack on the virtual machine that will generate an alert.

What should you do first?

A.

Run the Log Analytics Troubleshooting Tool.

A.

Run the Log Analytics Troubleshooting Tool.

Answers
B.

Copy a executable and rename the file as ASC_AlerTest_662jf10N,exe

B.

Copy a executable and rename the file as ASC_AlerTest_662jf10N,exe

Answers
C.

Modify the settings of the Microsoft Monitoring Agent.

C.

Modify the settings of the Microsoft Monitoring Agent.

Answers
D.

Run the MMASetup executable and specify the -foo argument

D.

Run the MMASetup executable and specify the -foo argument

Answers
Suggested answer: B

HOTSPOT

You have the following KQL query.


Question 152
Correct answer: Question 152

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.

You need to add threat indicators for all the IP addresses in a range of 171.23.3432-171.2334.63. The solution must minimize administrative effort.

What should you do in the Microsoft 365 Defender portal?

A.

Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.

A.

Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.

Answers
B.

Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.

B.

Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.

Answers
C.

Select Add indicator and set the IP address to 171.23.34.32/27

C.

Select Add indicator and set the IP address to 171.23.34.32/27

Answers
D.

Create an import file that contains the individual IP addresses in the range. Select Import and import the file.

D.

Create an import file that contains the individual IP addresses in the range. Select Import and import the file.

Answers
Suggested answer: D

Explanation:

This will add all the IP addresses in the range of 171.23.34.32/27 as threat indicators. This is the simplest and most efficient way to add all the IP addresses in the range.Reference: [1] https://docs.microsoft.com/en-us/windows/security/ threat-protection/microsoft- defender-atp/threat-intelligence-manage-indicators

Your company has an on-premises network that uses Microsoft Defender for Identity.

The Microsoft Secure Score for the company includes a security assessment associated with unsecure Kerberos delegation.

You need remediate the security risk.

What should you do?

A.

Install the Local Administrator Password Solution (LAPS) extension on the computers listed as exposed entities.

A.

Install the Local Administrator Password Solution (LAPS) extension on the computers listed as exposed entities.

Answers
B.

Modify the properties of the computer objects listed as exposed entities.

B.

Modify the properties of the computer objects listed as exposed entities.

Answers
C.

Disable legacy protocols on the computers listed as exposed entities.

C.

Disable legacy protocols on the computers listed as exposed entities.

Answers
D.

Enforce LDAP signing on the computers listed as exposed entities.

D.

Enforce LDAP signing on the computers listed as exposed entities.

Answers
Suggested answer: B

Explanation:


HOTSPOT

You have a Microsoft Sentinel workspace named Workspaces

You configure Workspace1 to collect DNS events and deploy the Advanced Security information Model (ASIM) unifying parser for the DNS schema.

You need to query the ASIM DNS schema to list all the DNS events from the last 24 hours that have a response code of 'NXDOMAIN' and were aggregated by the source IP address in 15-minute intervals.

The solution must maximize query performance.

How should you complete the query? To answer, select the appropriate options in the answer area

NOTE: Each correct selection is worth one point.


Question 155
Correct answer: Question 155

HOTSPOT

You have an Azure subscription that contains an Microsoft Sentinel workspace.

You need to create a hunting query using Kusto Query Language (KQL) that meets the following requirements:

• Identifies an anomalous number of changes to the rules of a network security group (NSG) made by the same security principal

• Automatically associates the security principal with an Microsoft Sentinel entity

How should you complete the query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.


Question 156
Correct answer: Question 156

You have an Azure subscription that uses Microsoft Sentinel.

You detect a new threat by using a hunting query.

You need to ensure that Microsoft Sentinel automatically detects the threat. The solution must minimize administrative effort.

What should you do?

A.

Create a playbook.

A.

Create a playbook.

Answers
B.

Create a watchlist.

B.

Create a watchlist.

Answers
C.

Create an analytics rule.

C.

Create an analytics rule.

Answers
D.

Add the query to a workbook.

D.

Add the query to a workbook.

Answers
Suggested answer: A

Explanation:


You have an Azure subscription that uses Microsoft Defender for Cloud and contains a storage account named storage1. You receive an alert that there was an unusually high volume of delete operations on the blobs in storage1. You need to identify which blobs were deleted. What should you review?

A.

the activity logs of storage1

A.

the activity logs of storage1

Answers
B.

the Azure Storage Analytics logs

B.

the Azure Storage Analytics logs

Answers
C.

the alert details

C.

the alert details

Answers
D.

the related entities of the alert

D.

the related entities of the alert

Answers
Suggested answer: A

Explanation:

To identify which blobs were deleted, you should review the activity logs of the storage account. The activity logs contain information about all the operations that have taken place in the storage account, including delete operations. These logs can be accessed in the Azure portal by navigating to the storage account, selecting "Activity log" under the "Monitoring" section, and filtering by the appropriate time range. You can also use

Azure Monitor and Log Analytics to query and analyze the activity logs data.

Reference:

https://docs.microsoft.com/en-us/azure/storage/common/storage-activity-logs

https://docs.microsoft.com/en-us/azure/azure-monitor/platform/activity-log-azure-storage

You have a Microsoft Sentinel workspace.

You have a query named Query1 as shown in the following exhibit.

You plan to create a custom parser named Parser 1. You need to use Query1 in Parser1. What should you do first?

A.

Remove line 2.

A.

Remove line 2.

Answers
B.

In line 4. remove the TimeGenerated predicate.

B.

In line 4. remove the TimeGenerated predicate.

Answers
C.

Remove line 5.

C.

Remove line 5.

Answers
D.

In line 3, replace the 'contains operator with the !has operator.

D.

In line 3, replace the 'contains operator with the !has operator.

Answers
Suggested answer: A

You have an Azure subscription that contains a Microsoft Sentinel workspace. The workspace contains a Microsoft Defender for Cloud data connector. You need to customize which details will be included when an alert is created for a specific event. What should you do?

A.

Modify the properties of the connector.

A.

Modify the properties of the connector.

Answers
B.

Create a Data Collection Rule (DCR).

B.

Create a Data Collection Rule (DCR).

Answers
C.

Create a scheduled query rule.

C.

Create a scheduled query rule.

Answers
D.

Enable User and Entity Behavior Analytics (UEBA)

D.

Enable User and Entity Behavior Analytics (UEBA)

Answers
Suggested answer: D
Total 295 questions
Go to page: of 30