Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Microsoft SC-200 Practice Exam with Questions & Answers | Set: 2

Questions 11

You need to recommend remediation actions for the Azure Defender alerts for Fabrikam.

What should you recommend for each threat? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 11

Options:
Microsoft SC-200 Premium Access
Questions 12

You need to minimize the effort required to investigate the Microsoft Defender for Identity false positive alerts. What should you review?

Options:
A.

the status update time

B.

the alert status

C.

the certainty of the source computer

D.

the resolution method of the source computer

Questions 13

You implement Safe Attachments policies in Microsoft Defender for Office 365.

Users report that email messages containing attachments take longer than expected to be received.

You need to reduce the amount of time it takes to deliver messages that contain attachments without compromising security. The attachments must be scanned for malware, and any messages that contain malware must be blocked.

What should you configure in the Safe Attachments policies?

Options:
A.

Dynamic Delivery

B.

Replace

C.

Block and Enable redirect

D.

Monitor and Enable redirect

Questions 14

You need to remediate active attacks to meet the technical requirements.

What should you include in the solution?

Options:
A.

Azure Automation runbooks

B.

Azure Logic Apps

C.

Azure Functions

D Azure Sentinel livestreams

Questions 15

You have a Microsoft 365 E5 subscription that contains a database server named DB1. DB1 is onboarded to Microsoft Defender XDR.

You need to ensure that DB1 appears on the attack surface map.

What should you configure?

Options:
A.

a critical asset rule

B.

an asset rule

C.

a honeytoken entity tag

D.

a sensitive entity tag

Questions 16

You have a Microsoft 365 subscription that uses Microsoft Purview and contains a Microsoft SharePoint Online site named Site1. Site1 contains the files shown in the following table.

SC-200 Question 16

From Microsoft Purview, you create the content search queries shown in the following table.

SC-200 Question 16

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE; Each correct selection is worth one point.

SC-200 Question 16

Options:
Questions 17

You have a Microsoft Sentinel workspace named Workspace1.

You need to exclude a built-in, source-specific Advanced Security information Model (ASIM) parse from a built-in unified ASIM parser.

What should you create in Workspace1?

Options:
A.

a watch list

B.

an analytic rule

C.

a hunting query

D.

a workbook

Questions 18

You have a suppression rule in Azure Security Center for 10 virtual machines that are used for testing. The virtual machines run Windows Server.

You are troubleshooting an issue on the virtual machines.

In Security Center, you need to view the alerts generated by the virtual machines during the last five days.

What should you do?

Options:
A.

Change the rule expiration date of the suppression rule.

B.

Change the state of the suppression rule to Disabled.

C.

Modify the filter for the Security alerts page.

D.

View the Windows event logs on the virtual machines.

Questions 19

Your on-premises network contains a Hyper-V cluster. The cluster contains the virtual machines shown in the following table.

SC-200 Question 19

You have a Microsoft Sentinel workspace named SW1.

You have a data collection rule (OCR) that has the following configurations:

• Name: DCR1

• Destination: SW1

• Platform type: All

• Data collection endpoint: None

• Data source: Windows event logs, Linux syslog

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

SC-200 Question 19

Options:
Questions 20

You have a custom analytics rule to detect threats in Azure Sentinel.

You discover that the analytics rule stopped running. The rule was disabled, and the rule name has a prefix of AUTO DISABLED.

What is a possible cause of the issue?

Options:
A.

There are connectivity issues between the data sources and Log Analytics.

B.

The number of alerts exceeded 10,000 within two minutes.

C.

The rule query takes too long to run and times out.

D.

Permissions to one of the data sources of the rule query were modified.