ExamGecko
Home / Microsoft / SC-200 / List of questions
Ask Question

Microsoft SC-200 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

DRAG DROP

A company wants to analyze by using Microsoft 365 Apps.

You need to describe the connected experiences the company can use.

Which connected experiences should you describe? To answer, drag the appropriate connected experiences to the correct description. Each connected experience may be used once, more than once, or not at all. You may need to drag the split between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 161 107914 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 161 107914 10052024010847000
asked 05/10/2024
Arun kumar
41 questions

Question 162

Report Export Collapse

You have a custom Microsoft Sentinel workbook named Workbooks.

You need to add a grid to Workbook1. The solution must ensure that the grid contains a maximum of 100 rows.

What should you do?

In the query editor interface, configure Settings.

In the query editor interface, configure Settings.

In the query editor interface, select Advanced Editor

In the query editor interface, select Advanced Editor

In the grid query, include the project operator.

In the grid query, include the project operator.

In the grid query, include the take operator.

In the grid query, include the take operator.

Suggested answer: B
asked 05/10/2024
Jose Alberto Vecino Pacheco
38 questions

Question 163

Report Export Collapse

You have an Azure subscription that uses Microsoft Defender for Cloud and contains a resource group named RG1. RG1. You need to configure just in time (JIT) VM access for the virtual machines in RG1.

The solution must meet the following

β€’ Limit the maximum request time to two hours.

β€’ Limit protocol access to Remote Desktop Protocol (RDP) only.

β€’ Minimize administrative effort.

What should you use?

Azure AD Privileged Identity Management (PIM)

Azure AD Privileged Identity Management (PIM)

Azure Policy

Azure Policy

Azure Front Door

Azure Front Door

Azure Bastion

Azure Bastion

Suggested answer: A
asked 05/10/2024
Ryan Shannon
44 questions

Question 164

Report Export Collapse

You have a Microsoft Sentinel workspace named Workspace1.

You need to exclude a built-in, source-specific Advanced Security information Model (ASIM) parse from a built-in unified ASIM parser.

What should you create in Workspace1?

a watch list

a watch list

an analytic rule

an analytic rule

a hunting query

a hunting query

a workbook

a workbook

Suggested answer: A
asked 05/10/2024
Pedro Pereira
45 questions

Question 165

Report Export Collapse

You have an Azure subscription that uses Microsoft Defender for Endpoint.

You need to ensure that you can allow or block a user-specified range of IP addresses and URLs.

What should you enable first in the advanced features from the Endpoints Settings in the Microsoft 365 Defender portal?

endpoint detection and response (EDR) in block mode

endpoint detection and response (EDR) in block mode

custom network indicators

custom network indicators

web content filtering

web content filtering

Live response for servers

Live response for servers

Suggested answer: A
asked 05/10/2024
Rolf Johannesen
46 questions

Question 166

Report Export Collapse

You have an Azure subscription that uses Microsoft Defender for Cloud and contains a storage account named storage1. You receive an alert that there was an unusually high volume of delete operations on the blobs in storage1.

You need to identify which blobs were deleted.

What should you review?

the Azure Storage Analytics logs

the Azure Storage Analytics logs

the activity logs of storage1

the activity logs of storage1

the alert details

the alert details

the related entities of the alert

the related entities of the alert

Suggested answer: B
asked 05/10/2024
Kefash White
45 questions

Question 167

Report Export Collapse

You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You have a virtual machine that runs Windows 10 and has the Log Analytics agent installed.

You need to simulate an attack on the virtual machine that will generate an alert.

What should you do first?

Run the Log Analytics Troubleshooting Tool.

Run the Log Analytics Troubleshooting Tool.

Copy a executable and rename the file as ASC_AlerTest_662jf10N,exe

Copy a executable and rename the file as ASC_AlerTest_662jf10N,exe

Modify the settings of the Microsoft Monitoring Agent.

Modify the settings of the Microsoft Monitoring Agent.

Run the MMASetup executable and specify the -foo argument

Run the MMASetup executable and specify the -foo argument

Suggested answer: B
asked 05/10/2024
Max Lenin Dos Santos Torres
52 questions

Question 168

Report Export Collapse

HOTSPOT

You have the following KQL query.

Microsoft SC-200 image Question 34 107921 10052024010847000000


Microsoft SC-200 image Question 168 107921 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 168 107921 10052024010847000
asked 05/10/2024
James Valdivia
35 questions

Question 169

Report Export Collapse

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.

You need to add threat indicators for all the IP addresses in a range of 171.23.3432-171.2334.63. The solution must minimize administrative effort.

What should you do in the Microsoft 365 Defender portal?

Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.

Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.

Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.

Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.

Select Add indicator and set the IP address to 171.23.34.32/27

Select Add indicator and set the IP address to 171.23.34.32/27

Create an import file that contains the individual IP addresses in the range. Select Import and import the file.

Create an import file that contains the individual IP addresses in the range. Select Import and import the file.

Suggested answer: D
Explanation:

This will add all the IP addresses in the range of 171.23.34.32/27 as threat indicators. This is the simplest and most efficient way to add all the IP addresses in the range.Reference: [1] https://docs.microsoft.com/en-us/windows/security/ threat-protection/microsoft- defender-atp/threat-intelligence-manage-indicators

asked 05/10/2024
Dasaret Tillman
43 questions

Question 170

Report Export Collapse

Your company has an on-premises network that uses Microsoft Defender for Identity.

The Microsoft Secure Score for the company includes a security assessment associated with unsecure Kerberos delegation.

You need remediate the security risk.

What should you do?

Install the Local Administrator Password Solution (LAPS) extension on the computers listed as exposed entities.

Install the Local Administrator Password Solution (LAPS) extension on the computers listed as exposed entities.

Modify the properties of the computer objects listed as exposed entities.

Modify the properties of the computer objects listed as exposed entities.

Disable legacy protocols on the computers listed as exposed entities.

Disable legacy protocols on the computers listed as exposed entities.

Enforce LDAP signing on the computers listed as exposed entities.

Enforce LDAP signing on the computers listed as exposed entities.

Suggested answer: B
Explanation:


asked 05/10/2024
Tuukka Valkeasuo
40 questions
Total 323 questions
Go to page: of 33
Search

Related questions