Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Microsoft SC-200 Practice Exam with Questions & Answers | Set: 2

Questions 11

The issue for which team can be resolved by using Microsoft Defender for Endpoint?

Options:
A.

executive

B.

sales

C.

marketing

Microsoft SC-200 Premium Access
Questions 12

You need to recommend remediation actions for the Azure Defender alerts for Fabrikam.

What should you recommend for each threat? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 12

Options:
Questions 13

You have an Azure subscription.

You need to delegate permissions to meet the following requirements:

• Enable and disable advanced features of Microsoft Defender for Cloud.

• Apply security recommendations to a resource.

The solution must use the principle of least privilege.

Which Microsoft Defender for Cloud role should you use for each requirement? To answer, drag the appropriate roles to the correct requirements. Each role may be used once, mote than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

SC-200 Question 13

Options:
Questions 14

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint. You need to create a detection rule that meets the following requirements:

• Is triggered when a device that has critical software vulnerabilities was active during the last hour

• Limits the number of duplicate results

How should you complete the KQL query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 14

Options:
Questions 15

You have a Microsoft Sentinel workspace named Workspaces

You need to exclude a built-in. source-specific Advanced Security Information Model (ASIM) parser from a built-in unified ASIM parser.

What should you create in Workspace1?

Options:
A.

a workbook

B.

a hunting query

C.

a watchlist

D.

an analytic rule

Questions 16

You are informed of an increase in malicious email being received by users.

You need to create an advanced hunting query in Microsoft 365 Defender to identify whether the accounts of the email recipients were compromised. The query must return the most recent 20 sign-ins performed by the recipients within an hour of receiving the known malicious email.

How should you complete the query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 16

Options:
Questions 17

Your on-premises network contains two Active Directory Domain Services (AD DS) domains named contoso.com and fabrikam.com. Contoso.com contains a group named Group1. Fabrikam.com contains a group named Group2.

You have a Microsoft Sentinel workspace named WS1 that contains a scheduled query rule named Rule1. Rule1 generates alerts in response to anomalous AD DS security events. Each alert creates an incident.

You need to implement an incident triage solution that meets the following requirements:

· Security incidents from contoso.com must be assigned to Group1.

· Security incidents from fabrikam.com must be assigned to Group2.

· Administrative effort must be minimized.

What should you include in the solution?

Options:
A.

one automation rule assigned to Rule1

B.

a playbook that is triggered by the creation of an incident

C.

two automation rules assigned to Rule1

D.

a playbook that is triggered by the creation of an alert

Questions 18

You have a Microsoft 365 subscription.

You have 1,000 Windows devices that have a third-party antivirus product installed and Microsoft Defender Antivirus in passive mode. You need to ensure that the devices are protected from malicious artifacts that were undetected by the third-party antivirus product. Solution: You configure Controlled folder access. Does this meet the goal?

Options:
A.

Yes

B.

No

Questions 19

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint Plan 2 and contains 500 Windows devices. As part of an incident investigation, you identify the following suspected malware files:

• sys

• pdf

• docx

• xlsx

You need to create indicator hashes to block users from downloading the files to the devices. Which files can you block by using the indicator hashes?

Options:
A.

File1.sysonly

B.

File1.sysand File3.docxonly

C.

File1.sys. File3.docx, and File4jclsx only

D.

File2.pdf. File3.docxr and File4.xlsx only

E.

File1.sys, File2.pdf, File3.dooc, and File4.xlsx

Questions 20

You need to identify which mean time metrics to use to meet the Microsoft Sentinel requirements. Which workbook should you use?

Options:
A.

Analytics Efficiency

B.

Security Operations Efficiency

C.

Event Analyzer

D.

Investigation insights

Exam Code: SC-200
Certification Provider: Microsoft
Exam Name: Microsoft Security Operations Analyst
Last Update: Jul 12, 2025
Questions: 347