ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











You need to receive a security alert when a user attempts to sign in from a location that was nevsr used by the other users in your organization to sign in.

Which anomaly detection policy should you use?

A.

Impossible travel

A.

Impossible travel

Answers
B.

Activity from anonymous IP addresses

B.

Activity from anonymous IP addresses

Answers
C.

Activity from infrequent country

C.

Activity from infrequent country

Answers
D.

Malware detection

D.

Malware detection

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/cloud-app-security/anomalv-detection-policy

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.

You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters.

You need to create a data loss prevention (DLP) policy to protect the sensitive documents.

What should you use to detect which documents are sensitive?

A.

SharePoint search

A.

SharePoint search

Answers
B.

a hunting query in Microsoft 365 Defender

B.

a hunting query in Microsoft 365 Defender

Answers
C.

Azure Information Protection

C.

Azure Information Protection

Answers
D.

RegEx pattern matching

D.

RegEx pattern matching

Answers
Suggested answer: C

Explanation:

Reference:

https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection

Your company uses line-of-business apps that contain Microsoft Office VBA macros.

You plan to enable protection against downloading and running additional payloads from the Office VBA macros as additional child processes.

You need to identify which Office VBA macros might be affected.

Which two commands can you run to achieve the goal? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B, C

Explanation:

Reference:

https://docs.microsoft.com/en-us/windows/securitv/threat-protection/microsoft-defender-atp/attack-surface-reduction

Your company uses Microsoft Defender for Endpoint.

The company has Microsoft Word documents that contain macros. The documents are used frequently on the devices of the company's accounting team.

You need to hide false positive in the Alerts queue, while maintaining the existing security posture.

Which three actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Resolve the alert automatically.

A.

Resolve the alert automatically.

Answers
B.

Hide the alert.

B.

Hide the alert.

Answers
C.

Create a suppression rule scoped to any device.

C.

Create a suppression rule scoped to any device.

Answers
D.

Create a suppression rule scoped to a device group.

D.

Create a suppression rule scoped to a device group.

Answers
E.

Generate the alert.

E.

Generate the alert.

Answers
Suggested answer: B, C, E

Explanation:

Reference:

https://docs.microsoft.com/en-us/windows/securitv/threat-protection/microsoft-defender-atp/manaqe-alerts

You have the following advanced hunting query in Microsoft 365 Defender.

You need to receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Create a detection rule.

A.

Create a detection rule.

Answers
B.

Create a suppression rule.

B.

Create a suppression rule.

Answers
C.

Add | order by Timestamp to the query.

C.

Add | order by Timestamp to the query.

Answers
D.

Replace DeviceProcessEvents with DeviceNetworkEvents.

D.

Replace DeviceProcessEvents with DeviceNetworkEvents.

Answers
E.

Add Deviceld and Reportldto the output of the query.

E.

Add Deviceld and Reportldto the output of the query.

Answers
Suggested answer: A, E

Explanation:

Reference:

https://docs.mic rosoftcom/en-us/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules

You are investigating a potential attack that deploys a new ransomware strain.

You plan to perform automated actions on a group of highly valuable machines that contain sensitive information.

You have three custom device groups.

You need to be able to temporarily group the machines to perform actions on the devices.

Which three actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Assign a tag to the device group.

A.

Assign a tag to the device group.

Answers
B.

Add the device users to the admin role.

B.

Add the device users to the admin role.

Answers
C.

Add a tag to the machines.

C.

Add a tag to the machines.

Answers
D.

Create a new device group that has a rank of 1.

D.

Create a new device group that has a rank of 1.

Answers
E.

Create a new admin role.

E.

Create a new admin role.

Answers
F.

Create a new device group that has a rank of 4.

F.

Create a new device group that has a rank of 4.

Answers
Suggested answer: A, C, D

Explanation:

Reference: https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manaqe-access

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Microsoft Defender for Identity integration with Active Directory.

From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.

Solution: From Entity tags, you add the accounts as Honeytoken accounts.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

Reference:

https://docs.microsoft.com/en-us/defender-for-identity/manaqe-sensitive-honeytoken-accounts

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Microsoft Defender for Identity integration with Active Directory.

From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.

Solution: From Azure AD Identity Protection, you configure the sign-in risk policy.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/defender-for-identity/manaqe-sensitive-honeytoken-accounts

Note: This question-is part of a series of questions that present the same scenario. Each question-in the series contains a unique solution that might meet the stated goals. Some question-sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question-in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Microsoft Defender for Identity integration with Active Directory.

From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.

Solution: You add the accounts to an Active Directory group and add the group as a Sensitive group.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/defender-for-identity/manaqe-sensitive-honeytoken-accounts

You implement Safe Attachments policies in Microsoft Defender for Office 365.

Users report that email messages containing attachments take longer than expected to be received.

You need to reduce the amount of time it takes to deliver messages that contain attachments without compromising security. The attachments must be scanned for malware, and any messages that contain malware must be blocked.

What should you configure in the Safe Attachments policies?

A.

Dynamic Delivery

A.

Dynamic Delivery

Answers
B.

Replace

B.

Replace

Answers
C.

Block and Enable redirect

C.

Block and Enable redirect

Answers
D.

Monitor and Enable redirect

D.

Monitor and Enable redirect

Answers
Suggested answer: A

Explanation:

Reference:

https://docs.mic rosoft. co m/en-us/microsoft-365/securitv/office-365-security/safe-attachments?view=o365-worldwide

Total 295 questions
Go to page: of 30