ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











HOTSPOT

You have an Azure Storage account that will be accessed by multiple Azure Function apps during the development of an application.

You need to hide Azure Defender alerts for the storage account.

Which entity type and field should you use in a suppression rule? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 21
Correct answer: Question 21

Explanation:

Reference:

https://techcommunity.microsoft.com/t5/azure-security-center/suppression-rules-for-azure-security-center-alerts-are-now/ba-p/1404920

You create an Azure subscription.

You enable Azure Defender for the subscription.

You need to use Azure Defender to protect on-premises computers.

What should you do on the on-premises computers?

A.

Install the Log Analytics agent.

A.

Install the Log Analytics agent.

Answers
B.

Install the Dependency agent.

B.

Install the Dependency agent.

Answers
C.

Configure the Hybrid Runbook Worker role.

C.

Configure the Hybrid Runbook Worker role.

Answers
D.

Install the Connected Machine agent.

D.

Install the Connected Machine agent.

Answers
Suggested answer: A

Explanation:


Security Center collects data from your Azure virtual machines (VMs), virtual machine scale sets, IaaS containers, and non-Azure (including on-premises) machines to monitor for security vulnerabilities and threats.

Data is collected using:

The Log Analytics agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, and logged in user.

Security extensions, such as the Azure Policy Add-on for Kubernetes, which can also provide data to Security Center regarding specialized resource types.

Reference:

https://docs.microsoft.com/en-us/azure/security-center/security-center-enable-data-collection

A security administrator receives email alerts from Azure Defender for activities such as potential malware uploaded to a storage account and potential successful brute force attacks.

The security administrator does NOT receive email alerts for activities such as antimalware action failed and suspicious network activity. The alerts appear in Azure Security Center.

You need to ensure that the security administrator receives email alerts for all the activities.

What should you configure in the Security Center settings?

A.

the severity level of email notifications

A.

the severity level of email notifications

Answers
B.

a cloud connector

B.

a cloud connector

Answers
C.

the Azure Defender plans

C.

the Azure Defender plans

Answers
D.

the integration settings for Threat detection

D.

the integration settings for Threat detection

Answers
Suggested answer: A

Explanation:

Reference:

https://techcommunity.microsoft.com/t5/microsoft-365-defender/get-email-notifications-on-new-incidents-from-microsoft-365/ba-p/2012518

DRAG DROP

You have an Azure Functions app that generates thousands of alerts in Azure Security Center each day for normal activity.

You need to hide the alerts automatically in Security Center.

Which three actions should you perform in sequence in Security Center? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.


Question 24
Correct answer: Question 24

Explanation:

Reference:

https://techcommunity.microsoft.com/t5/azure-security-center/suppression-rules-for-azure-security-center-alerts-are-now/ba-p/1404920

DRAG DROP

You have an Azure subscription.

You need to delegate permissions to meet the following requirements:

Enable and disable Azure Defender.

Apply security recommendations to resource.

The solution must use the principle of least privilege.

Which Azure Security Center role should you use for each requirement? To answer, drag the appropriate roles to the correct requirements. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 25
Correct answer: Question 25

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/security-center/security-center-permissions

HOTSPOT

You have an Azure subscription that uses Azure Defender.

You plan to use Azure Security Center workflow automation to respond to Azure Defender threat alerts.

You need to create an Azure policy that will perform threat remediation automatically.

What should you include in the solution? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 26
Correct answer: Question 26

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/governance/policy/concepts/effects

https://docs.microsoft.com/en-us/azure/security-center/workflow-automation

You plan to create a custom Azure Sentinel query that will track anomalous Azure Active Directory (Azure AD) sign-in activity and present the activity as a time chart aggregated by day.

You need to create a query that will be used to display the time chart.

What should you include in the query?

A.

extend

A.

extend

Answers
B.

bin

B.

bin

Answers
C.

makeset

C.

makeset

Answers
D.

workspace

D.

workspace

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/azure-monitor/loqs/qet-started-queries

You are configuring Azure Sentinel.

You need to send a Microsoft Teams message to a channel whenever a sign-in from a suspicious IP address is detected.

Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Add a playbook.

A.

Add a playbook.

Answers
B.

Associate a playbook to an incident.

B.

Associate a playbook to an incident.

Answers
C.

Enable Entity behavior analytics.

C.

Enable Entity behavior analytics.

Answers
D.

Create a workbook.

D.

Create a workbook.

Answers
E.

Enable the Fusion rule.

E.

Enable the Fusion rule.

Answers
Suggested answer: A, B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook

You need to visualize Azure Sentinel data and enrich the data by using third-party data sources to identify indicators of compromise (loC).

What should you use?

A.

notebooks in Azure Sentinel

A.

notebooks in Azure Sentinel

Answers
B.

Microsoft Cloud App Security

B.

Microsoft Cloud App Security

Answers
C.

Azure Monitor

C.

Azure Monitor

Answers
D.

hunting queries in Azure Sentinel

D.

hunting queries in Azure Sentinel

Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/notebooks

You plan to create a custom Azure Sentinel query that will provide a visual representation of the security alerts generated by Azure Security Center.

You need to create a query that will be used to display a bar graph.

What should you include in the query?

A.

extend

A.

extend

Answers
B.

bin

B.

bin

Answers
C.

count

C.

count

Answers
D.

workspace

D.

workspace

Answers
Suggested answer: B

Explanation:


Total 295 questions
Go to page: of 30