ExamGecko
Home / Microsoft / SC-200 / List of questions
Ask Question

Microsoft SC-200 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

HOTSPOT

You use Azure Sentinel to monitor irregular Azure activity.

You create custom analytics rules to detect threats as shown in the following exhibit.

Microsoft SC-200 image Question 25 107878 10052024010847000000

You do NOT define any incident settings as part of the rule definition.

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 51 107878 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 51 107878 10052024010847000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-detect-threats-custom

asked 05/10/2024
Aleksandar Burdin
28 questions

Question 52

Report Export Collapse

HOTSPOT

You deploy Azure Sentinel.

You need to implement connectors in Azure Sentinel to monitor Microsoft Teams and Linux virtual machines in Azure. The solution must minimize administrative effort.

Which data connector type should you use for each workload? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Microsoft SC-200 image Question 52 107879 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 52 107879 10052024010847000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-office-365

https://docs.microsoft.com/en-us/azure/sentinel/connect-syslog

asked 05/10/2024
Fatmata Kabba
58 questions

Question 53

Report Export Collapse

You are investigating an incident in Azure Sentinel that contains more than 127 alerts.

You discover eight alerts in the incident that require further investigation.

You need to escalate the alerts to another Azure Sentinel administrator.

What should you do to provide the alerts to the administrator?

Create a Microsoft incident creation rule

Create a Microsoft incident creation rule

Share the incident URL

Share the incident URL

Create a scheduled query rule

Create a scheduled query rule

Assign the incident

Assign the incident

Suggested answer: D
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/investigate-cases

asked 05/10/2024
Narender B
38 questions

Question 54

Report Export Collapse

You are configuring Azure Sentinel.

You need to send a Microsoft Teams message to a channel whenever an incident representing a sign-in risk event is activated in Azure Sentinel.

Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Enable Entity behavior analytics.

Enable Entity behavior analytics.

Associate a playbook to the analytics rule that triggered the incident.

Associate a playbook to the analytics rule that triggered the incident.

Enable the Fusion rule.

Enable the Fusion rule.

Add a playbook.

Add a playbook.

Create a workbook.

Create a workbook.

Suggested answer: A, B
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/enable-entity-behavior-analytics

https://docs.microsoft.com/en-us/azure/sentinel/automate-responses-with-playbooks

asked 05/10/2024
DIPESH JAISWAL
40 questions

Question 55

Report Export Collapse

DRAG DROP

You need to use an Azure Sentinel analytics rule to search for specific criteria in Amazon Web Services (AWS) logs and to generate incidents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Microsoft SC-200 image Question 55 107882 10052024010847000
Correct answer: Microsoft SC-200 image answer Question 55 107882 10052024010847000
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/detect-threats-custom

asked 05/10/2024
David Wang
31 questions

Question 56

Report Export Collapse

You have the following environment:

Azure Sentinel

A Microsoft 365 subscription

Microsoft Defender for Identity

An Azure Active Directory (Azure AD) tenant

You configure Azure Sentinel to collect security logs from all the Active Directory member servers and domain controllers.

You deploy Microsoft Defender for Identity by using standalone sensors.

You need to ensure that you can detect when sensitive groups are modified in Active Directory.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Configure the Advanced Audit Policy Configuration settings for the domain controllers.

Configure the Advanced Audit Policy Configuration settings for the domain controllers.

Modify the permissions of the Domain Controllers organizational unit (OU).

Modify the permissions of the Domain Controllers organizational unit (OU).

Configure auditing in the Microsoft 365 compliance center.

Configure auditing in the Microsoft 365 compliance center.

Configure Windows Event Forwarding on the domain controllers.

Configure Windows Event Forwarding on the domain controllers.

Suggested answer: A, D
Explanation:

Reference:

https://docs.microsoft.com/en-us/defender-for-identity/configure-windows-event-collection

https://docs.microsoft.com/en-us/defender-for-identity/configure-event-collection

asked 05/10/2024
Kaisheng Wang
32 questions

Question 57

Report Export Collapse

You use Azure Sentinel.

You need to use a built-in role to provide a security analyst with the ability to edit the queries of custom Azure Sentinel workbooks. The solution must use the principle of least privilege.

Which role should you assign to the analyst?

Azure Sentinel Contributor

Azure Sentinel Contributor

Security Administrator

Security Administrator

Azure Sentinel Responder

Azure Sentinel Responder

Logic App Contributor

Logic App Contributor

Suggested answer: C
Explanation:


Azure Sentinel Contributor can create and edit workbooks, analytics rules, and other Azure Sentinel resources.

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/roles

asked 05/10/2024
David Fernando del Villar
47 questions

Question 58

Report Export Collapse

You create a hunting query in Azure Sentinel.

You need to receive a notification in the Azure portal as soon as the hunting query detects a match on the query. The solution must minimize effort.

What should you use?

a playbook

a playbook

a notebook

a notebook

a livestream

a livestream

a bookmark

a bookmark

Suggested answer: C
Explanation:


Use livestream to run a specific query constantly, presenting results as they come in.

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/hunting

asked 05/10/2024
Zachary Janssen
39 questions

Question 59

Report Export Collapse

You have an Azure subscription named Sub1 and a Microsoft 365 subscription. Sub1 is linked to an Azure Active Directory (Azure AD) tenant named contoso.com.

You create an Azure Sentinel workspace named workspace1. In workspace1, you activate an Azure AD connector for contoso.com and an Office 365 connector for the Microsoft 365 subscription.

You need to use the Fusion rule to detect multi-staged attacks that include suspicious sign-ins to contoso.com followed by anomalous Microsoft Office 365 activity.

Which two actions should you perform? Each correct answer present part of the solution.

NOTE: Each correct selection is worth one point.

Create custom rule based on the Office 365 connector templates.

Create custom rule based on the Office 365 connector templates.

Create a Microsoft incident creation rule based on Microsoft Defender for Cloud.

Create a Microsoft incident creation rule based on Microsoft Defender for Cloud.

Create a Microsoft Cloud App Security connector.

Create a Microsoft Cloud App Security connector.

Create an Azure AD Identity Protection connector.

Create an Azure AD Identity Protection connector.

Suggested answer: A, B
Explanation:


asked 05/10/2024
Michele Lorengo
43 questions

Question 60

Report Export Collapse

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Azure Sentinel.

You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

Solution: You create a livestream from a query.

Does this meet the goal?

Yes

Yes

No

No

Suggested answer: B
Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-security-center

asked 05/10/2024
Shaun Kilmartin
31 questions
Total 323 questions
Go to page: of 33
Search

Related questions