ExamGecko
Home / Microsoft / SC-200 / List of questions
Ask Question

Microsoft SC-200 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report
Export
Collapse

HOTSPOT

You have an Azure Storage account that will be accessed by multiple Azure Function apps during the development of an application.

You need to hide Azure Defender alerts for the storage account.

Which entity type and field should you use in a suppression rule? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 21 107835 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 21 107835 10052024010847000

Explanation:

Reference:

https://techcommunity.microsoft.com/t5/azure-security-center/suppression-rules-for-azure-security-center-alerts-are-now/ba-p/1404920

asked 05/10/2024
Ramon Lim
37 questions

Question 22

Report
Export
Collapse

You create an Azure subscription.

You enable Azure Defender for the subscription.

You need to use Azure Defender to protect on-premises computers.

What should you do on the on-premises computers?

Install the Log Analytics agent.

Install the Log Analytics agent.

Install the Dependency agent.

Install the Dependency agent.

Configure the Hybrid Runbook Worker role.

Configure the Hybrid Runbook Worker role.

Install the Connected Machine agent.

Install the Connected Machine agent.

Suggested answer: A

Explanation:


Security Center collects data from your Azure virtual machines (VMs), virtual machine scale sets, IaaS containers, and non-Azure (including on-premises) machines to monitor for security vulnerabilities and threats.

Data is collected using:

The Log Analytics agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis. Examples of such data are: operating system type and version, operating system logs (Windows event logs), running processes, machine name, IP addresses, and logged in user.

Security extensions, such as the Azure Policy Add-on for Kubernetes, which can also provide data to Security Center regarding specialized resource types.

Reference:

https://docs.microsoft.com/en-us/azure/security-center/security-center-enable-data-collection

asked 05/10/2024
Nelson Mira
44 questions

Question 23

Report
Export
Collapse

A security administrator receives email alerts from Azure Defender for activities such as potential malware uploaded to a storage account and potential successful brute force attacks.

The security administrator does NOT receive email alerts for activities such as antimalware action failed and suspicious network activity. The alerts appear in Azure Security Center.

You need to ensure that the security administrator receives email alerts for all the activities.

What should you configure in the Security Center settings?

the severity level of email notifications

the severity level of email notifications

a cloud connector

a cloud connector

the Azure Defender plans

the Azure Defender plans

the integration settings for Threat detection

the integration settings for Threat detection

Suggested answer: A

Explanation:

Reference:

https://techcommunity.microsoft.com/t5/microsoft-365-defender/get-email-notifications-on-new-incidents-from-microsoft-365/ba-p/2012518

asked 05/10/2024
Muhammad Hafizh
29 questions

Question 24

Report
Export
Collapse

DRAG DROP

You have an Azure Functions app that generates thousands of alerts in Azure Security Center each day for normal activity.

You need to hide the alerts automatically in Security Center.

Which three actions should you perform in sequence in Security Center? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 24 107838 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 24 107838 10052024010847000

Explanation:

Reference:

https://techcommunity.microsoft.com/t5/azure-security-center/suppression-rules-for-azure-security-center-alerts-are-now/ba-p/1404920

asked 05/10/2024
abdirashid ahmed
31 questions

Question 25

Report
Export
Collapse

DRAG DROP

You have an Azure subscription.

You need to delegate permissions to meet the following requirements:

Enable and disable Azure Defender.

Apply security recommendations to resource.

The solution must use the principle of least privilege.

Which Azure Security Center role should you use for each requirement? To answer, drag the appropriate roles to the correct requirements. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 25 107839 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 25 107839 10052024010847000

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/security-center/security-center-permissions

asked 05/10/2024
Michael Amann
41 questions

Question 26

Report
Export
Collapse

HOTSPOT

You have an Azure subscription that uses Azure Defender.

You plan to use Azure Security Center workflow automation to respond to Azure Defender threat alerts.

You need to create an Azure policy that will perform threat remediation automatically.

What should you include in the solution? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 26 107840 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 26 107840 10052024010847000

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/governance/policy/concepts/effects

https://docs.microsoft.com/en-us/azure/security-center/workflow-automation

asked 05/10/2024
Gerrit Struik
54 questions

Question 27

Report
Export
Collapse

You plan to create a custom Azure Sentinel query that will track anomalous Azure Active Directory (Azure AD) sign-in activity and present the activity as a time chart aggregated by day.

You need to create a query that will be used to display the time chart.

What should you include in the query?

extend

extend

bin

bin

makeset

makeset

workspace

workspace

Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/azure-monitor/loqs/qet-started-queries

asked 05/10/2024
Fabio Morais Melo
37 questions

Question 28

Report
Export
Collapse

You are configuring Azure Sentinel.

You need to send a Microsoft Teams message to a channel whenever a sign-in from a suspicious IP address is detected.

Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Add a playbook.

Add a playbook.

Associate a playbook to an incident.

Associate a playbook to an incident.

Enable Entity behavior analytics.

Enable Entity behavior analytics.

Create a workbook.

Create a workbook.

Enable the Fusion rule.

Enable the Fusion rule.

Suggested answer: A, B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook

asked 05/10/2024
Marcel Engelbrecht
44 questions

Question 29

Report
Export
Collapse

You need to visualize Azure Sentinel data and enrich the data by using third-party data sources to identify indicators of compromise (loC).

What should you use?

notebooks in Azure Sentinel

notebooks in Azure Sentinel

Microsoft Cloud App Security

Microsoft Cloud App Security

Azure Monitor

Azure Monitor

hunting queries in Azure Sentinel

hunting queries in Azure Sentinel

Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/notebooks

asked 05/10/2024
Rahul Chugh
38 questions

Question 30

Report
Export
Collapse

You plan to create a custom Azure Sentinel query that will provide a visual representation of the security alerts generated by Azure Security Center.

You need to create a query that will be used to display a bar graph.

What should you include in the query?

extend

extend

bin

bin

count

count

workspace

workspace

Suggested answer: B

Explanation:


asked 05/10/2024
Alysson Rodrigo Freires Neto
44 questions
Total 307 questions
Go to page: of 31
Search

Related questions