Microsoft SC-200 Practice Test - Questions Answers, Page 17

List of questions
Question 161

DRAG DROP
A company wants to analyze by using Microsoft 365 Apps.
You need to describe the connected experiences the company can use.
Which connected experiences should you describe? To answer, drag the appropriate connected experiences to the correct description. Each connected experience may be used once, more than once, or not at all. You may need to drag the split between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Question 162

You have a custom Microsoft Sentinel workbook named Workbooks.
You need to add a grid to Workbook1. The solution must ensure that the grid contains a maximum of 100 rows.
What should you do?
In the query editor interface, configure Settings.
In the query editor interface, select Advanced Editor
In the grid query, include the project operator.
In the grid query, include the take operator.
Question 163

You have an Azure subscription that uses Microsoft Defender for Cloud and contains a resource group named RG1. RG1. You need to configure just in time (JIT) VM access for the virtual machines in RG1.
The solution must meet the following
β’ Limit the maximum request time to two hours.
β’ Limit protocol access to Remote Desktop Protocol (RDP) only.
β’ Minimize administrative effort.
What should you use?
Azure AD Privileged Identity Management (PIM)
Azure Policy
Azure Front Door
Azure Bastion
Question 164

You have a Microsoft Sentinel workspace named Workspace1.
You need to exclude a built-in, source-specific Advanced Security information Model (ASIM) parse from a built-in unified ASIM parser.
What should you create in Workspace1?
a watch list
an analytic rule
a hunting query
a workbook
Question 165

You have an Azure subscription that uses Microsoft Defender for Endpoint.
You need to ensure that you can allow or block a user-specified range of IP addresses and URLs.
What should you enable first in the advanced features from the Endpoints Settings in the Microsoft 365 Defender portal?
endpoint detection and response (EDR) in block mode
custom network indicators
web content filtering
Live response for servers
Question 166

You have an Azure subscription that uses Microsoft Defender for Cloud and contains a storage account named storage1. You receive an alert that there was an unusually high volume of delete operations on the blobs in storage1.
You need to identify which blobs were deleted.
What should you review?
the Azure Storage Analytics logs
the activity logs of storage1
the alert details
the related entities of the alert
Question 167

You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You have a virtual machine that runs Windows 10 and has the Log Analytics agent installed.
You need to simulate an attack on the virtual machine that will generate an alert.
What should you do first?
Run the Log Analytics Troubleshooting Tool.
Copy a executable and rename the file as ASC_AlerTest_662jf10N,exe
Modify the settings of the Microsoft Monitoring Agent.
Run the MMASetup executable and specify the -foo argument
Question 168

HOTSPOT
You have the following KQL query.
Question 169

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.
You need to add threat indicators for all the IP addresses in a range of 171.23.3432-171.2334.63. The solution must minimize administrative effort.
What should you do in the Microsoft 365 Defender portal?
Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.
Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.
Select Add indicator and set the IP address to 171.23.34.32/27
Create an import file that contains the individual IP addresses in the range. Select Import and import the file.
This will add all the IP addresses in the range of 171.23.34.32/27 as threat indicators. This is the simplest and most efficient way to add all the IP addresses in the range.Reference: [1] https://docs.microsoft.com/en-us/windows/security/ threat-protection/microsoft- defender-atp/threat-intelligence-manage-indicators
Question 170

Your company has an on-premises network that uses Microsoft Defender for Identity.
The Microsoft Secure Score for the company includes a security assessment associated with unsecure Kerberos delegation.
You need remediate the security risk.
What should you do?
Install the Local Administrator Password Solution (LAPS) extension on the computers listed as exposed entities.
Modify the properties of the computer objects listed as exposed entities.
Disable legacy protocols on the computers listed as exposed entities.
Enforce LDAP signing on the computers listed as exposed entities.
Question