ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











You have an Azure subscription that uses Microsoft Defender for Cloud.

You have an Amazon Web Services (AWS) subscription. The subscription contains multiple virtual machines that run Windows Server.

You need to enable Microsoft Defender for Servers on the virtual machines.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct answer is worth one point.

A.

From Defender for Cloud, enable agentless scanning.

A.

From Defender for Cloud, enable agentless scanning.

Answers
B.

Install the Azure Virtual Machine Agent (VM Agent) on each virtual machine.

B.

Install the Azure Virtual Machine Agent (VM Agent) on each virtual machine.

Answers
C.

Onboard the virtual machines to Microsoft Defender for Endpoint.

C.

Onboard the virtual machines to Microsoft Defender for Endpoint.

Answers
D.

From Defender for Cloud, configure auto-provisioning.

D.

From Defender for Cloud, configure auto-provisioning.

Answers
E.

From Defender for Cloud, configure the AWS connector.

E.

From Defender for Cloud, configure the AWS connector.

Answers
Suggested answer: B, C

You have a Microsoft 365 E5 subscription that contains 100 Linux devices. The devices are onboarded to Microsoft Defender 365. You need to initiate the collection of investigation packages from the devices by using the Microsoft 365 Defender portal. Which response action should you use?

A.

Run antivirus scan

A.

Run antivirus scan

Answers
B.

Initiate Automated Investigation

B.

Initiate Automated Investigation

Answers
C.

Collect investigation package

C.

Collect investigation package

Answers
D.

Initiate Live Response Session

D.

Initiate Live Response Session

Answers
Suggested answer: D

You have a Microsoft Sentinel workspace that uses the Microsoft 365 Defender data connector.

From Microsoft Sentinel, you investigate a Microsoft 365 incident.

You need to update the incident to include an alert generated by Microsoft Defender for Cloud Apps.

What should you use?

A.

the entity side panel of the Timeline card in Microsoft Sentinel

A.

the entity side panel of the Timeline card in Microsoft Sentinel

Answers
B.

the investigation graph on the Incidents page of Microsoft Sentinel

B.

the investigation graph on the Incidents page of Microsoft Sentinel

Answers
C.

the Timeline tab on the Incidents page of Microsoft Sentinel

C.

the Timeline tab on the Incidents page of Microsoft Sentinel

Answers
D.

the Alerts page in the Microsoft 365 Defender portal

D.

the Alerts page in the Microsoft 365 Defender portal

Answers
Suggested answer: A

OTSPOT

You have four Azure subscriptions. One of the subscriptions contains a Microsoft Sentinel workspace.

You need to deploy Microsoft Sentinel data connectors to collect data from the subscriptions by using Azure Policy. The solution must ensure that the policy will apply to new and existing resources in the subscriptions.

Which type of connectors should you provision, and what should you use to ensure that all the resources are monitored? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 234
Correct answer: Question 234

You have a Microsoft Sentinel playbook that is triggered by using the Azure Activity connector.

You need to create a new near-real-time (NRT) analytics rule that will use the playbook.

What should you configure for the rule?

A.

the Incident automation settings

A.

the Incident automation settings

Answers
B.

entity mapping

B.

entity mapping

Answers
C.

the query rule

C.

the query rule

Answers
D.

the Alert automation settings

D.

the Alert automation settings

Answers
Suggested answer: B

HOTSPOT

You have an Azure subscription that uses Microsoft Sentinel and contains a user named User1.

You need to ensure that User1 can enable User and Entity Behavior Analytics (UEBA) for entity behavior in the Microsoft Entra tenant. The solution must use the principle of least privilege.

Which roles should you assign to User1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 236
Correct answer: Question 236

HOTSPOT

You have a Microsoft Sentinel workspace that contains a custom workbook.

You need to query the number of daily security alerts. The solution must meet the following requirements:

* Identify alerts that occurred during the last 30 days.

* Display the results in a timechart.

How should you complete the query? To answer, select the appropriate options in the answer are a. NOTE: Each correct selection is worth one point.


Question 237
Correct answer: Question 237

You have an Azure subscription that uses Microsoft Sentinel and contains 100 Linux virtual machines.

You need to monitor the virtual machines by using Microsoft Sentinel. The solution must meet the fallowing requirements:

* Minimize administrative effort

* Minimize the parsing required to read log data

What should you configure?

A.

REST API integration

A.

REST API integration

Answers
B.

a SysJog connector

B.

a SysJog connector

Answers
C.

a Log Analytics Data Collector API

C.

a Log Analytics Data Collector API

Answers
D.

a Common Event Format (CEF) connector

D.

a Common Event Format (CEF) connector

Answers
Suggested answer: B

HOTSPOT

You have an Microsoft Sentinel workspace named SW1.

You plan to create a custom workbook that will include a time chart.

You need to create a query that will identify the number of security alerts per day for each provider.

How should you complete the query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 239
Correct answer: Question 239

HOTSPOT

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint. You need to create a detection rule that meets the following requirements:

* Is triggered when a device that has critical software vulnerabilities was active during the last hour

* Limits the number of duplicate results

How should you complete the KQL query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 240
Correct answer: Question 240
Total 295 questions
Go to page: of 30