ExamGecko
Home / Microsoft / SC-200 / List of questions
Ask Question

Microsoft SC-200 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

A company uses Azure Sentinel.

You need to create an automated threat response.

What should you use?

a data connector

a data connector

a playbook

a playbook

a workbook

a workbook

a Microsoft incident creation rule

a Microsoft incident creation rule

Suggested answer: B
Explanation:

Reference:

https://docs.microsoftcom/en-us/azure/sentinel/tutorial-respond-threats-playbook

asked 05/10/2024
DANIEL DOYEN
43 questions

Question 42

Report Export Collapse

You have an Azure Sentinel deployment in the East US Azure region.

You create a Log Analytics workspace named LogsWest in the West US Azure region.

You need to ensure that you can use scheduled analytics rules in the existing Azure Sentinel deployment to generate alerts based on queries to LogsWest. What should you do first?

Deploy Azure Data Catalog to the West US Azure region.

Deploy Azure Data Catalog to the West US Azure region.

Modify the workspace settings of the existing Azure Sentinel deployment.

Modify the workspace settings of the existing Azure Sentinel deployment.

Add Microsoft Sentinel to a workspace.

Add Microsoft Sentinel to a workspace.

Create a data connector in Azure Sentinel.

Create a data connector in Azure Sentinel.

Suggested answer: C
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants

asked 05/10/2024
Matthew Farrington
40 questions

Question 43

Report Export Collapse

You create a custom analytics rule to detect threats in Azure Sentinel.

You discover that the rule fails intermittently.

What are two possible causes of the failures? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

The rule query takes too long to run and times out.

The rule query takes too long to run and times out.

The target workspace was deleted.

The target workspace was deleted.

Permissions to the data sources of the rule query were modified.

Permissions to the data sources of the rule query were modified.

There are connectivity issues between the data sources and Log Analytics

There are connectivity issues between the data sources and Log Analytics

Suggested answer: A, D
Explanation:

Incorrect Answers:

B: This would cause it to fail everytime, not just intermittently.

C: This would cause it to fail every time, not just intermittently.

asked 05/10/2024
Fabio Morais Melo
46 questions

Question 44

Report Export Collapse

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Azure Sentinel.

You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

Solution: You create a scheduled query rule for a data connector.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-security-center

asked 05/10/2024
Mogens Jensen
38 questions

Question 45

Report Export Collapse

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Azure Sentinel.

You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

Solution: You create a hunting bookmark.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-securitv-center

asked 05/10/2024
Marc Codó
48 questions

Question 46

Report Export Collapse

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Azure Sentinel.

You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

Solution: You create a Microsoft incident creation rule for a data connector.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: A
Explanation:

Reference:

https://docs.microsoft.com/en-us/azu re/sentinel/connect-azu re-security-center

asked 05/10/2024
Olugbenga Fagbohun
45 questions

Question 47

Report Export Collapse

DRAG DROP

You plan to connect an external solution that will send Common Event Format (CEF) messages to Azure Sentinel.

You need to deploy the log forwarder.

Which three actions should you perform in sequence? To answer, move the appropriate actions form the list of actions to the answer area and arrange them in the correct order.


Microsoft SC-200 image Question 47 107874 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 47 107874 10052024010847000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-cef-agent?tabs=rsyslog

asked 05/10/2024
Nicolas Del Borrello
46 questions

Question 48

Report Export Collapse

HOTSPOT

From Azure Sentinel, you open the Investigation pane for a high-severity incident as shown in the following exhibit.

Microsoft SC-200 image Question 22 107875 10052024010847000000

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 48 107875 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 48 107875 10052024010847000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-investigate-cases#use-the-investigation-graph-to-deep-dive

asked 05/10/2024
Maritza Van Der Merwe
48 questions

Question 49

Report Export Collapse

DRAG DROP

You have an Azure Sentinel deployment.

You need to query for all suspicious credential access activities.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Microsoft SC-200 image Question 49 107876 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 49 107876 10052024010847000
Explanation:

Reference:

https://davemccollough.com/2020/11/28/threat-hunting-with-azure-sentinel/

asked 05/10/2024
J. Cuylits
37 questions

Question 50

Report Export Collapse

DRAG DROP

Your company deploys Azure Sentinel.

You plan to delegate the administration of Azure Sentinel to various groups.

You need to delegate the following tasks:

Create and run playbooks

Create workbooks and analytic rules.

The solution must use the principle of least privilege.

Which role should you assign for each task? To answer, drag the appropriate roles to the correct tasks. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 50 107877 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 50 107877 10052024010847000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/roles

asked 05/10/2024
Jay Chua
48 questions
Total 323 questions
Go to page: of 33
Search

Related questions