SC-200 Questions With Diagrams
SC-200 Questions With Diagrams
A. Impossible travel
B. Activity from anonymous IP address-
es
C. Activity from infrequent country
D. Malware detection
A. SharePoint search
B. a hunting query in Microsoft 365 De-
fender
C. Azure Information Protection
D. RegEx pattern matching
2 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
3 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
E. Add DeviceId and ReportId to
Which two actions should you perform? the output of the query.
Each correct answer presents part of the
solution.
5 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
A. Dynamic Delivery
B. Replace
C. Block and Enable redirect
D. Monitor and Enable redirect
6 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
15. You receive a security bulletin about a A. a URL/domain indicator that
potential attack that uses an image file. has Action set to Alert only
B. a URL/domain indicator that
You need to create an indicator of com- has Action set to Alert and block
promise (IoC) in Microsoft Defender for C. a file hash indicator that has
Endpoint to prevent the attack. Action set to Alert and block
D. a certificate indicator that has
Which indicator type should you use? Action set to Alert and block
16. Your company deploys the following A. the Compliance Data Admin-
services: istrator in Azure Active Directory
Microsoft Defender for Identity (Azure AD)
Microsoft Defender for Endpoint B. the Active remediation actions
Microsoft Defender for Office 365 role in Microsoft Defender for
Endpoint
You need to provide a security analyst C. the Security Administrator
with the ability to use the Microsoft role in Azure Active Directory
365 security center. The analyst must be (Azure AD)
able to approve and reject pending ac- D. the Security Reader role in
tions generated by Microsoft Defender Azure Active Directory (Azure
for Endpoint. The solution must use the AD)
principle of least privilege.
18. You need to configure Microsoft Cloud A. From Settings, select Infor-
App Security to generate alerts and trig- mation Protection, select Azure
ger remediation actions in response to Information Protection, and then
external sharing of confidential files. select Only scan files for Azure
Information Protection classifi-
Which two actions should you perform cation labels and content in-
in the Cloud App Security portal? Each spection warnings from this ten-
correct answer presents part of the so- ant.
lution. B. Select Investigate files, and
then filter App to Office 365.
A. From Settings, select Information Pro- C. Select Investigate files, and
tection, select Azure Information Protec- then select New policy from
tion, and then select Only scan files for search.
Azure Information Protection classifica- D. From Settings, select Infor-
tion labels and content inspection warn- mation Protection, select Azure
ings from this tenant. Information Protection, and then
B. Select Investigate files, and then filter select Automatically scan new
8 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
App to Office 365. files for Azure Information Pro-
C. Select Investigate files, and then se- tection classification labels and
lect New policy from search. content inspection warnings.
D. From Settings, select Information Pro- E. From Settings, select Informa-
tection, select Azure Information Protec- tion Protection, select Files, and
tion, and then select Automatically scan then enable file monitoring.
new files for Azure Information Protec- F. Select Investigate files, and
tion classification labels and content in- then filter File Type to Document.
spection warnings.
E. From Settings, select Information Pro-
tection, select Files, and then enable file
monitoring.
F. Select Investigate files, and then filter
File Type to Document.
9 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
A. a fraud alert
B. a user risk policy
C. a named location
D. a sign-in user policy
21. You are configuring Microsoft Cloud A. Override automatic data en-
App Security. richment.
B. Add the IP addresses to the
You have a custom threat detection pol- corporate address range cate-
icy based on the IP address ranges of gory.
your company's United States-based of- C. Increase the sensitivity level
fices. of the impossible travel anomaly
detection policy.
You receive many alerts related to im- D. Add the IP addresses to the
possible travel and sign-ins from risky other address range category
IP addresses. and add a tag.
E. Create an activity policy that
You determine that 99% of the alerts are has an exclusion for the IP ad-
legitimate sign-ins from your corporate dresses.
offices.
24. You receive an alert from Azure Defend- A. Modify the access control set-
er for Key Vault. tings for the key vault.
B. Enable the Key Vault firewall.
You discover that the alert is generated C. Create an application security
from multiple suspicious IP addresses. group.
D. Modify the access policy for
You need to reduce the potential of Key the key vault.
Vault secrets being leaked while you in-
vestigate the issue. The solution must
11 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
be implemented as soon as possible
and must minimize the impact on legit-
imate users.
26. You have a Microsoft 365 subscription A. the Security Reader role for
that uses Azure Defender. the subscription
B. the Contributor for the sub-
You have 100 virtual machines in a re- scription
source group named RG1. C. the Contributor role for RG1
D. the Owner role for RG1
You assign the Security Admin roles to
a new user named SecAdmin1.
12 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
apply quick fixes to the virtual machines
by using Azure Defender. The solution
must use the principle of least privilege.
A. cp /bin/echo
./asc_alerttest_662jfi039n
B. ./alerttest testing eicar pipe
C. cp /bin/echo ./alerttest
D. ./asc_alerttest_662jfi039n testing
eicar pipe
28. You create an Azure subscription named A. From Security Center, enable
sub1. data collection
B. In sub1, register a provider.
In sub1, you create a Log Analytics C. From Security Center, create
workspace named workspace1. a Workflow automation.
13 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
D. In workspace1, create a work-
You enable Azure Security Center and book.
configure Security Center to use work-
space1.
14 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
What should you configure in Security
Center to enable the email notifications?
A. Security solutions
B. Security policy
C. Pricing & settings
D. Security alerts
E. Azure Defender
15 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
resolve the alert in Security Center.
A. Azure Cosmos DB
B. Azure Event Grid
C. Azure Event Hubs
D. Azure Data Lake
35. You are responsible for responding to A. Key Vault firewalls and virtual
Azure Defender for Key Vault alerts. networks
B. Azure Active Directory (Azure
During an investigation of an alert, you AD) permissions
discover unauthorized attempts to ac- C. role-based access control
cess a key vault from a Tor exit node. (RBAC) for the key vault
D. the access policy settings of
What should you configure to mitigate the key vault
the threat?
16 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
permissions
C. role-based access control (RBAC) for
the key vault
D. the access policy settings of the key
vault
17 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
contains sensitive information. has a manual trigger.
C. Create an Azure logic app that
You need to run a PowerShell script if has an Azure Security Center
someone accesses the storage account alert trigger.
from a suspicious IP address. D. Create an Azure logic app that
has an HTTP trigger.
Which two actions should you perform? E. From Azure Active Directory
Each correct answer presents part of the (Azure AD), add an app registra-
solution. tion.
41. You have a suppression rule in Azure A. Change the rule expiration
Security Center for 10 virtual machines date of the suppression rule.
that are used for testing. The virtual ma-
B. Change the state of the sup-
chines run Windows Server. pression rule to Disabled.
C. Modify the filter for the Secu-
You are troubleshooting an issue on the rity alerts page.
virtual machines. D. View the Windows event logs
on the virtual machines.
In Security Center, you need to view the
alerts generated by the virtual machines
during the last five days.
44.
20 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
A security administrator receives email A. the severity level of email no-
alerts from Azure Defender for activities tifications
such as potential malware uploaded to a B. a cloud connector
storage account and potential success- C. the Azure Defender plans
ful brute force attacks. D. the integration settings for
Threat detection
The security administrator does NOT
receive email alerts for activities such
as antimalware action failed and suspi-
cious network activity. The alerts appear
in Azure Security Center.
21 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
NOTE: Each correct selection is worth
one point.
22 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
You need to query for all suspicious cre-
dential access activities.
50. You have an existing Azure logic app A. And a new scheduled query
that is used to block Azure Active Direc- rule.
tory (Azure AD) users. The logic app is B. Add a data connector to Azure
triggered manually. Sentinel.
C. Configure a custom Threat
You deploy Azure Sentinel. Intelligence connector in Azure
Sentinel.
You need to use the existing logic app as D. Modify the trigger in the logic
a playbook in Azure Sentinel. app.
23 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
What should you include in the recom-
mendation?
A. built-in queries
B. livestream
C. notebooks
D. bookmarks
52. You have a playbook in Azure Sentinel. A. Add a parameter and modify
the trigger.
When you trigger the playbook, it sends B. Add a custom data connector
an email to a distribution group. and modify the trigger.
C. Add a condition and modify
You need to modify the playbook to send the action.
the email to the owner of the resource D. Add a parameter and modify
instead of the distribution group. the action.
24 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
which two components can you group
alerts into incidents?
54. Your company stores the data of every A. Add the Security Events con-
project in a different Azure subscrip- nector to the Azure Sentinel
tion. All the subscriptions use the same workspace.
Azure Active Directory (Azure AD) ten- B. Create a query that uses the
ant. workspace expression and the
union operator.
Every project consists of multiple Azure C. Use the alias statement.
virtual machines that run Windows Serv- D. Create a query that uses
er. The Windows events of the virtual the resource expression and the
machines are stored in a Log Analytics alias operator.
workspace in each machine's respective E. Add the Azure Sentinel solu-
subscription. tion to each workspace.
25 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
You need to test a playbook manually in C. Threat intelligence
the Azure portal. D. Incidents
A. Playbooks
B. Analytics
C. Threat intelligence
D. Incidents
57. You have an Azure subscription that A. From Azure Security Center,
contains a virtual machine named VM1 add a workflow automation.
and uses Azure Defender. Azure De- B. On VM1, run the
fender has automatic provisioning en- Get-MPThreatCatalog cmdlet.
abled.You need to create a custom alert C. On VM1 trigger a PowerShell
suppression rule that will supress false alert.
positive alerts for suspicious use of D. From Azure Security Center,
PowerShell on VM1.What should you do export the alerts to a Log Analyt-
first? ics workspace.
A. From Azure Security Center, add a
workflow automation.
B. On VM1, run the Get-MPThreatCatalog
cmdlet.
C. On VM1 trigger a PowerShell alert.
D. From Azure Security Center, export
the alerts to a Log Analytics workspace.
58. B. No
26 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
You have Linux virtual machines
on Amazon Web Services (AWS).You
deploy Azure Defender and enable
auto-provisioning. You need to monitor
the virtual machines by using Azure De-
fender.
Solution: You enable Azure Arc and on-
board the virtual machines to Azure Arc.
Does this meet the goal?
A. Yes
B. No
60. Identify all cases of users who failed to D. the query windows of the Log
sign in to an Azure resource for the first Analytics workspace
time from a given country.
A junior security administrator provides
you with the following incomplete query.
27 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
61. Identify all cases of users who failed to B. Azure Logic Apps
sign in to an Azure resource for the first
time from a given country.
A junior security administrator pro-
vides you with the following incomplete
query.
28 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
64. You need to restrict cloud apps run- C. Advanced features from Set-
ning on CLIENT1 to meet the Microsoft tings in Microsoft Defender Se-
Defender for Endpoint requirements. curity Center
Which two configurations should you D. the Cloud Discovery settings
modify? in Cloud App Security
29 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
Which three actions should you perform
in sequence?
A. Automation Operator
B. Automation Runbook Operator
C. Azure Sentinel Contributor
D. Azure Sentinel Responder
68. Which rule setting should you config- C. From Set rule logic, map the
ure to meet the Azure Sentinel require- entities.
ments?
30 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
D. From Analytics rule details, configure
the severity.
31 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
B. sales
C. marketing
32 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
icy should you modify?
33 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
an Investigation package?
A. Prefetch Files
B. Network transactions
C. Command History
D. Process History
A. Subject IDs
B. Alert Severity
C. Account
D. Alert IDs
35 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
identifies Azure Defender alerts. What
query should you write to meet this re-
quirements?
36 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
A. A->C->E
B. D -> C -> A
C. C -> E -> A
D. E -> A -> C
37 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
B. Adaptive application controls
C. Adaptive network hardening
D. Log Inspection
38 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
A. Incident
B. Threat Intelligence
C. Secure Score
D. Threat Score
A. Add-MsolRoleMember -RoleName
"Security Administrator" -RoleMem-
berEmailAddress [email protected]
crosoft.com
B. Add-MsolRoleMember -Role-
Name "Security Reader" -RoleMem-
berEmailAddress [email protected]
crosoft.com
C. Add-MsolRoleMember -RoleName
"Global Administrator" -RoleMem-
berEmailAddress [email protected]
crosoft.com
D. Add-MsolRoleMember -RoleName
"Global Reader" -RoleMemberEmailAd-
dress [email protected]
39 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
empt the recommendation from the re-
source group
D. Create a custom recommendation
40 / 42
Microsoft SC-200
Study online at https://quizlet.com/_bratkl
95. Which of the following APIs should be C
used to assist with managing content
through a CI/CD pipeline?
A. Security Graph API
B. Query API
C. Azure Sentinel Management API
D. Threat intelligence API
"extend ProcessEntropy
= -log2(PCoHValue/TPCoHValue)*(PCo-
HValue/TPCoHValue)"
A. True
B. False
42 / 42