ExamGecko
Home Home / Microsoft / SC-200

Microsoft SC-200 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











You are configuring Microsoft Cloud App Security.

You have a custom threat detection policy based on the IP address ranges of your company’s United States-based offices.

You receive many alerts related to impossible travel and sign-ins from risky IP addresses.

You determine that 99% of the alerts are legitimate sign-ins from your corporate offices.

You need to prevent alerts for legitimate sign-ins from known locations.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Override automatic data enrichment.

A.

Override automatic data enrichment.

Answers
B.

Add the IP addresses to the corporate address range category.

B.

Add the IP addresses to the corporate address range category.

Answers
C.

Increase the sensitivity level of the impossible travel anomaly detection policy.

C.

Increase the sensitivity level of the impossible travel anomaly detection policy.

Answers
D.

Add the IP addresses to the other address range category and add a tag.

D.

Add the IP addresses to the other address range category and add a tag.

Answers
E.

Create an activity policy that has an exclusion for the IP addresses.

E.

Create an activity policy that has an exclusion for the IP addresses.

Answers
Suggested answer: A, D

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are configuring Microsoft Defender for Identity integration with Active Directory.

From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.

Solution: You add each account as a Sensitive account.

Does this meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/defender-for-identity/manage-sensitive-honeytoken-accounts

You have a Microsoft 365 tenant that uses Microsoft Exchange Online and Microsoft Defender for Office 365.

What should you use to identify whether zero-hour auto purge (ZAP) moved an email message from the mailbox of a user?

A.

the Threat Protection Status report in Microsoft Defender for Office 365

A.

the Threat Protection Status report in Microsoft Defender for Office 365

Answers
B.

the mailbox audit log in Exchange

B.

the mailbox audit log in Exchange

Answers
C.

the Safe Attachments file types report in Microsoft Defender for Office 365

C.

the Safe Attachments file types report in Microsoft Defender for Office 365

Answers
D.

the mail flow report in Exchange

D.

the mail flow report in Exchange

Answers
Suggested answer: A

Explanation:

To determine if ZAP moved your message, you can use either the Threat Protection Status report or Threat Explorer (and real-time detections).

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/zero-hour-auto-purge? view=o365-worldwide

You have a Microsoft 365 subscription that contains 1,000 Windows 10 devices. The devices have Microsoft Office 365 installed.

You need to mitigate the following device threats:

Microsoft Excel macros that download scripts from untrusted websites

Users that open executable attachments in Microsoft Outlook Outlook rules and forms exploits What should you use?

A.

Microsoft Defender Antivirus

A.

Microsoft Defender Antivirus

Answers
B.

attack surface reduction rules in Microsoft Defender for Endpoint

B.

attack surface reduction rules in Microsoft Defender for Endpoint

Answers
C.

Windows Defender Firewall

C.

Windows Defender Firewall

Answers
D.

adaptive application control in Azure Defender

D.

adaptive application control in Azure Defender

Answers
Suggested answer: B

Explanation:

Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/overview-attack-surfacereduction?view=o365- worldwide

Which rule setting should you configure to meet the Microsoft Sentinel requirements?

A.

From Set rule logic, turn off suppression

A.

From Set rule logic, turn off suppression

Answers
B.

From Analytic rule details, configure the tactics.

B.

From Analytic rule details, configure the tactics.

Answers
C.

From Set rule logic, map the entities

C.

From Set rule logic, map the entities

Answers
D.

From Analytic rule details, configure the severity.

D.

From Analytic rule details, configure the severity.

Answers
Suggested answer: A

You need to modify the anomaly detection policy settings to meet the Microsoft Defender for Cloud Apps requirements and resolve the reported problem.

Which policy should you modify?

A.

Activity from suspicious IP addresses

A.

Activity from suspicious IP addresses

Answers
B.

Risky sign-in

B.

Risky sign-in

Answers
C.

Activity from anonymous IP addresses

C.

Activity from anonymous IP addresses

Answers
D.

Impossible travel

D.

Impossible travel

Answers
Suggested answer: D

You need to configure event monitoring for Server1. The solution must meet the Microsoft Sentinel requirements. What should you create first?

A.

a Microsoft Sentinel automation rule

A.

a Microsoft Sentinel automation rule

Answers
B.

a Microsoft Sentinel scheduled query rule

B.

a Microsoft Sentinel scheduled query rule

Answers
C.

a Data Collection Rule (DCR)

C.

a Data Collection Rule (DCR)

Answers
D.

an Azure Event Grid topic

D.

an Azure Event Grid topic

Answers
Suggested answer: C

You need to implement the Defender for Cloud requirements.

What should you configure for Server2?

A.

the Microsoft Antimalware extension

A.

the Microsoft Antimalware extension

Answers
B.

an Azure resource lock

B.

an Azure resource lock

Answers
C.

an Azure resource tag

C.

an Azure resource tag

Answers
D.

the Azure Automanage machine configuration extension for Windows

D.

the Azure Automanage machine configuration extension for Windows

Answers
Suggested answer: D

HOTSPOT

You need to implement the ASIM query for DNS requests. The solution must meet the Microsoft Sentinel requirements. How should you configure the query? To answer, select the appropriate options in the answer are a. NOTE: Each correct selection is worth one point.


Question 89
Correct answer: Question 89

HOTSPOT

You need to implement the query for Workbook1 and Webapp1. The solution must meet the Microsoft Sentinel requirements. How should you configure the query? To answer, select the appropriate options in the answer are a. NOTE: Each correct selection is worth one point.


Question 90
Correct answer: Question 90
Total 295 questions
Go to page: of 30