ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











You have a Microsoft 365 E5 subscription that uses Microsoft 365 Defender.

You need to review new attack techniques discovered by Microsoft and identify vulnerable resources in the subscription. The solution must minimize administrative effort

Which blade should you use in the Microsoft 365 Defender portal?

A.

Advanced hunting

A.

Advanced hunting

Answers
B.

Threat analytics

B.

Threat analytics

Answers
C.

Incidents & alerts

C.

Incidents & alerts

Answers
D.

Learning hub

D.

Learning hub

Answers
Suggested answer: B

Explanation:

To review new attack techniques discovered by Microsoft and identify vulnerable resources in the subscription, you should use the Threat Analytics blade in the Microsoft 365 Defender portal. The Threat Analytics blade provides insights into attack techniques, configuration vulnerabilities, and suspicious activities, and it can help you identify risks and prioritize threats in your environment.

Reference:Ă‚ https://docs.microsoft.com/en-us/microsoft-365/security/mtp/microsoft-365-defenderthreat-analytics

You have a Microsoft 365 subscription that uses Microsoft 365 Defender A remediation action for an automated investigation quarantines a file across multiple devices. You need to mark the file as safe and remove the file from quarantine on the devices. What should you use m the Microsoft 365 Defender portal?

A.

From Threat tracker, review the queries.

A.

From Threat tracker, review the queries.

Answers
B.

From the History tab in the Action center, revert the actions.

B.

From the History tab in the Action center, revert the actions.

Answers
C.

From the investigation page, review the AIR processes.

C.

From the investigation page, review the AIR processes.

Answers
D.

From Quarantine from the Review page, modify the rules.

D.

From Quarantine from the Review page, modify the rules.

Answers
Suggested answer: B

You have a Microsoft Sentinel workspace named Workspaces

You need to exclude a built-in. source-specific Advanced Security Information Model (ASIM) parser from a built-in unified ASIM parser.

What should you create in Workspace1?

A.

a workbook

A.

a workbook

Answers
B.

a hunting query

B.

a hunting query

Answers
C.

a watchlist

C.

a watchlist

Answers
D.

an analytic rule

D.

an analytic rule

Answers
Suggested answer: D

Explanation:

To exclude a built-in, source-specific Advanced Security Information Model (ASIM) parser from a built-in unified ASIM parser, you should create an analytic rule in the Microsoft Sentinel workspace.

An analytic rule allows you to customize the behavior of the unified ASIM parser and exclude specific source-specific parsers from being used. Reference:Ă‚ https://docs.microsoft.com/en-us/azure/sentinel/analytics-create-analytic-rule

Your company uses Microsoft Sentinel

A new security analyst reports that she cannot assign and resolve incidents in Microsoft Sentinel.

You need to ensure that the analyst can assign and resolve incidents. The solution must use the principle of least privilege.

Which role should you assign to the analyst?

A.

Microsoft Sentinel Responder

A.

Microsoft Sentinel Responder

Answers
B.

Logic App Contributor

B.

Logic App Contributor

Answers
C.

Microsoft Sentinel Reader

C.

Microsoft Sentinel Reader

Answers
D.

Microsoft Sentinel Contributor

D.

Microsoft Sentinel Contributor

Answers
Suggested answer: A

Explanation:

The Microsoft Sentinel Responder role allows users to investigate, triage, and resolve security incidents, which includes the ability to assign incidents to other users. This role is designed to provide the necessary permissions for incident management and response while still adhering to the principle of least privilege. Other roles such as Logic App Contributor and Microsoft Sentinel Contributor would have more permissions than necessary and may not be suitable for the analyst's needs. Microsoft Sentinel Reader role is not sufficient as it doesn't have permission to assign and resolve incidents.

Reference:Ă‚ https://docs.microsoft.com/en-us/azure/sentinel/role-based-access-control-rbac

You provision Azure Sentinel for a new Azure subscription.

You are configuring the Security Events connector.

While creating a new rule from a template in the connector, you decide to generate a new alert for every event.

You create the following rule query.

By which two components can you group alerts into incidents? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

a workbook

A.

a workbook

Answers
B.

a hunting query

B.

a hunting query

Answers
C.

a notebook

C.

a notebook

Answers
D.

a playbook

D.

a playbook

Answers
Suggested answer: A

Explanation:

A workbook is a data-driven interactive report in Microsoft Sentinel. You can use workbooks to create custom reports based on data from your Azure subscription. Reference:

https://docs.microsoft.com/en-us/azure/sentinel/workbooks-overview

You create an Azure subscription.

You enable Microsoft Defender for Cloud for the subscription.

You need to use Defender for Cloud to protect on-premises computers.

What should you do on the on-premises computers?

A.

Configure the Hybrid Runbook Worker role.

A.

Configure the Hybrid Runbook Worker role.

Answers
B.

Install the Connected Machine agent.

B.

Install the Connected Machine agent.

Answers
C.

Install the Log Analytics agent

C.

Install the Log Analytics agent

Answers
D.

Install the Dependency agent.

D.

Install the Dependency agent.

Answers
Suggested answer: C

Explanation:

https://docs.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboardmachines?pivots=azure-arc

DRAG DROP

You have a Microsoft Sentinel workspace that contains an Azure AD data connector.

You need to associate a bookmark with an Azure AD-related incident.

What should you do? To answer, drag the appropriate blades to the correct tasks. Each blade may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content

NOTE: Each correct selection is worth one point.


Question 167
Correct answer: Question 167

DRAG DROP

You have a Microsoft subscription that has Microsoft Defender for Cloud enabled You configure the Azure logic apps shown in the following table.

You need to configure an automatic action that will run if a Suspicious process executed alert is triggered. The solution must minimize administrative effort.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Question 168
Correct answer: Question 168

DRAG DROP

You have 50 on-premises servers.

You have an Azure subscription that uses Microsoft Defender for Cloud. The Defender for Cloud deployment has Microsoft Defender for Servers and automatic provisioning enabled.

You need to configure Defender for Cloud to support the on-premises servers. The solution must meet the following requirements:

• Provide threat and vulnerability management.

• Support data collection rules.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Question 169
Correct answer: Question 169

Explanation:

To configure Defender for Cloud to support the on-premises servers, you should perform the following three actions in sequence:

On the on-premises servers, install the Azure Connected Machine agent.

On the on-premises servers, install the Log Analytics agent.

From the Data controller settings in the Azure portal, create an Azure Arc data controller.

Once these steps are completed, the on-premises servers will be able to communicate with the

Azure Defender for Cloud deployment and will be able to support threat and vulnerability management as well as data collection rules. Reference: https://docs.microsoft.com/enus/azure/security-center/deploy-azure-security-center#on-premises-deployment

HOTSPOT

You have a Microsoft Sentinel workspace.

You need to create a KQL query that will identify successful sign-ins from multiple countries during the last three hours.

How should you complete the query? To answer, select the appropriate options in the answer area.

NOTE Each correct selection is worth one point


Question 170
Correct answer: Question 170
Total 295 questions
Go to page: of 30