Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Microsoft SC-200 Practice Exam with Questions & Answers | Set: 2

Questions 11

You need to meet the Microsoft Sentinel requirements for App1. What should you configure for App1?

Options:
A.

an API connection

B.

a trigger

C.

an connector

D.

authorization

Microsoft SC-200 Premium Access
Questions 12

You have an Azure subscription that contains a user named User1 and a Microsoft Sentinel workspace named WS1.

You need to ensure that User1 can enable User and Entity Behavior Analytics (UEBA) for WS1. The solution must follow the principle of least privilege.

Which roles should you assign to User1? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 12

Options:
Questions 13

You need to recommend remediation actions for the Azure Defender alerts for Fabrikam.

What should you recommend for each threat? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 13

Options:
Questions 14

You have a Microsoft 365 E5 subscription and a Microsoft Sentinel workspace. You need to create a KQL query that will combine data from the following sources:

• Microsoft Graph

• Risky users detected by using Microsoft Entra ID Protection

The solution must minimize the volume of data returned. How should the query start?

Options:
A.

MicrosoftGraphActivityLogs

lookup kind=leftouter AADRiskyUsers on $left.Userld == $right.Id

B.

MicrosoftGraphActivityLogs

join AADRiskyUsers on $left.Userld == $right.Id

C.

MicrosoftGraphActivityLogs

join AADUserRiskEvents on $left.Userld == $right.Id

D.

find in (MicrosoftGraphActivityLogs, AADUserRiskEvents) where

Questions 15

You need to use an Azure Sentinel analytics rule to search for specific criteria in Amazon Web Services (AWS) logs and to generate incidents.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

a Microsoft 365 E5

SC-200 Question 15

Options:
Questions 16

You have the following advanced hunting query in Microsoft 365 Defender.

SC-200 Question 16

You need to receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:
A.

Create a detection rule.

B.

Create a suppression rule.

C.

Add | order by Timestamp to the query.

D.

Block DeviceProcessEvents with DeviceNetworkEvents.

E.

Add DeviceId and ReportId to the output of the query.

Questions 17

You have a Microsoft 365 subscription.

You have 1,000 Windows devices that have a third-party antivirus product installed and Microsoft Defender Antivirus in passive mode. You need to ensure that the devices are protected from malicious artifacts that were undetected by the third-party antivirus product. Solution: You configure Controlled folder access. Does this meet the goal?

Options:
A.

Yes

B.

No

Questions 18

You have an Microsoft Sentinel workspace named SW1.

You plan to create a custom workbook that will include a time chart.

You need to create a query that will identify the number of security alerts per day for each provider.

How should you complete the query? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 18

Options:
Questions 19

You have an Azure subscription named Sub1 that contains a Microsoft Sentinel workspace named WS1. You need to create a hunting query in WS1 that meets the following requirements:

• Returns the number of changes performed daily by each Microsoft Entra security principal during a seven-day period

• Identifies all the successful changes to the resources in Sub1

• Substitutes any missing data points with 0

How should you complete the KQL query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

SC-200 Question 19

Options:
Questions 20

You have a Microsoft Sentinel workspace.

You need to configure the Fusion analytics rule to temporarily supress incidents generated by a Microsoft Defender connector. The solution must meet the following requirements:

• Minimize impact on the ability to detect multistage attacks.

• Minimize administrative effort.

How should you configure the rule? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

SC-200 Question 20

Options: