ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











A company uses Azure Sentinel.

You need to create an automated threat response.

What should you use?

A.

a data connector

A.

a data connector

Answers
B.

a playbook

B.

a playbook

Answers
C.

a workbook

C.

a workbook

Answers
D.

a Microsoft incident creation rule

D.

a Microsoft incident creation rule

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoftcom/en-us/azure/sentinel/tutorial-respond-threats-playbook

You have an Azure Sentinel deployment in the East US Azure region.

You create a Log Analytics workspace named LogsWest in the West US Azure region.

You need to ensure that you can use scheduled analytics rules in the existing Azure Sentinel deployment to generate alerts based on queries to LogsWest. What should you do first?

A.

Deploy Azure Data Catalog to the West US Azure region.

A.

Deploy Azure Data Catalog to the West US Azure region.

Answers
B.

Modify the workspace settings of the existing Azure Sentinel deployment.

B.

Modify the workspace settings of the existing Azure Sentinel deployment.

Answers
C.

Add Microsoft Sentinel to a workspace.

C.

Add Microsoft Sentinel to a workspace.

Answers
D.

Create a data connector in Azure Sentinel.

D.

Create a data connector in Azure Sentinel.

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants

You create a custom analytics rule to detect threats in Azure Sentinel.

You discover that the rule fails intermittently.

What are two possible causes of the failures? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

The rule query takes too long to run and times out.

A.

The rule query takes too long to run and times out.

Answers
B.

The target workspace was deleted.

B.

The target workspace was deleted.

Answers
C.

Permissions to the data sources of the rule query were modified.

C.

Permissions to the data sources of the rule query were modified.

Answers
D.

There are connectivity issues between the data sources and Log Analytics

D.

There are connectivity issues between the data sources and Log Analytics

Answers
Suggested answer: A, D

Explanation:

Incorrect Answers:

B: This would cause it to fail everytime, not just intermittently.

C: This would cause it to fail every time, not just intermittently.

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Azure Sentinel.

You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

Solution: You create a scheduled query rule for a data connector.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-security-center

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Azure Sentinel.

You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

Solution: You create a hunting bookmark.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-securitv-center

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Azure Sentinel.

You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

Solution: You create a Microsoft incident creation rule for a data connector.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/azu re/sentinel/connect-azu re-security-center

DRAG DROP

You plan to connect an external solution that will send Common Event Format (CEF) messages to Azure Sentinel.

You need to deploy the log forwarder.

Which three actions should you perform in sequence? To answer, move the appropriate actions form the list of actions to the answer area and arrange them in the correct order.


Question 47
Correct answer: Question 47

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-cef-agent?tabs=rsyslog

HOTSPOT

From Azure Sentinel, you open the Investigation pane for a high-severity incident as shown in the following exhibit.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.


Question 48
Correct answer: Question 48

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-investigate-cases#use-the-investigation-graph-to-deep-dive

DRAG DROP

You have an Azure Sentinel deployment.

You need to query for all suspicious credential access activities.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Question 49
Correct answer: Question 49

Explanation:

Reference:

https://davemccollough.com/2020/11/28/threat-hunting-with-azure-sentinel/

DRAG DROP

Your company deploys Azure Sentinel.

You plan to delegate the administration of Azure Sentinel to various groups.

You need to delegate the following tasks:

Create and run playbooks

Create workbooks and analytic rules.

The solution must use the principle of least privilege.

Which role should you assign for each task? To answer, drag the appropriate roles to the correct tasks. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 50
Correct answer: Question 50

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/roles

Total 295 questions
Go to page: of 30