This page was exported from Best Free Exam Guide [ http://free.exams4sures.com ] Export date:Sat Mar 15 10:34:31 2025 / +0000 GMT ___________________________________________________ Title: Online SC-200 Test Brain Dump Question and Test Engine [Q65-Q79] --------------------------------------------------- Online SC-200 Test Brain Dump Question and Test Engine Real Microsoft SC-200 Exam Dumps with Correct 110 Questions and Answers Skills measured Mitigate threats using Azure Sentinel (40-45%)The content of this exam was updated on July 23, 2021. Please download the exam skills outline below to see what changed.Mitigate threats using Azure Defender (25-30%)Mitigate threats using Microsoft 365 Defender (25-30%)   NO.65 A security administrator receives email alerts from Azure Defender for activities such as potential malware uploaded to a storage account and potential successful brute force attacks.The security administrator does NOT receive email alerts for activities such as antimalware action failed and suspicious network activity. The alerts appear in Azure Security Center.You need to ensure that the security administrator receives email alerts for all the activities.What should you configure in the Security Center settings?  the severity level of email notifications  a cloud connector  the Azure Defender plans  the integration settings for Threat detection Reference:https://techcommunity.microsoft.com/t5/microsoft-365-defender/get-email-notifications-on-new-incidents-from-microsoft-365/ba-p/2012518NO.66 You are investigating a potential attack that deploys a new ransomware strain.You plan to perform automated actions on a group of highly valuable machines that contain sensitive information.You have three custom device groups.You need to be able to temporarily group the machines to perform actions on the devices. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.  Add a tag to the device group.  Add the device users to the admin role.  Add a tag to the machines.  Create a new device group that has a rank of 1.  Create a new admin role.  Create a new device group that has a rank of 4. Explanationhttps://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/4-manageNO.67 Your company uses line-of-business apps that contain Microsoft Office VBA macros.You plan to enable protection against downloading and running additional payloads from the Office VBA macros as additional child processes.You need to identify which Office VBA macros might be affected.Which two commands can you run to achieve the goal? Each correct answer presents a complete solution.NOTE: Each correct selection is worth one point.  Option A  Option B  Option C  Option D Reference:https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface- reductionNO.68 You need to create the test rule to meet the Azure Sentinel requirements.What should you do when you create the rule?  From Set rule logic, turn off suppression.  From Analytics rule details, configure the tactics.  From Set rule logic, map the entities.  From Analytics rule details, configure the severity. Section: [none]Explanation/Reference:https://docs.microsoft.com/en-us/azure/sentinel/tutorial-detect-threats-customNO.69 You create a custom analytics rule to detect threats in Azure Sentinel.You discover that the rule fails intermittently.What are two possible causes of the failures? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.  The rule query takes too long to run and times out.  The target workspace was deleted.  Permissions to the data sources of the rule query were modified.  There are connectivity issues between the data sources and Log Analytics NO.70 Your company deploys the following services:* Microsoft Defender for Identity* Microsoft Defender for Endpoint* Microsoft Defender for Office 365You need to provide a security analyst with the ability to use the Microsoft 365 security center. The analyst must be able to approve and reject pending actions generated by Microsoft Defender for Endpoint. The solution must use the principle of least privilege.Which two roles should assign to the analyst? Each correct answer presents part of the solution.NOTE: Each correct selection is worth one point.  the Compliance Data Administrator in Azure Active Directory (Azure AD)  the Active remediation actions role in Microsoft Defender for Endpoint  the Security Administrator role in Azure Active Directory (Azure AD)  the Security Reader role in Azure Active Directory (Azure AD) Section: [none]Explanation/Reference:https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwideNO.71 You need to visualize Azure Sentinel data and enrich the data by using third-party data sources to identify indicators of compromise (IoC).What should you use?  Microsoft Cloud App Security  Azure Monitor  hunting queries in Azure Sentinel  notebooks in Azure Sentinel Topic 1, Contoso LtdOverviewA company named Contoso Ltd. has a main office and five branch offices located throughout North America. The main office is in Seattle. The branch offices are in Toronto, Miami, Houston, Los Angeles, and Vancouver.Contoso has a subsidiary named Fabrikam, Ltd. that has offices in New York and San Francisco.Existing EnvironmentEnd-User EnvironmentAll users at Contoso use Windows 10 devices. Each user is licensed for Microsoft 365. In addition, iOS devices are distributed to the members of the sales team at Contoso.Cloud and Hybrid InfrastructureAll Contoso applications are deployed to Azure.You enable Microsoft Cloud App Security.Contoso and Fabrikam have different Azure Active Directory (Azure AD) tenants. Fabrikam recently purchased an Azure subscription and enabled Azure Defender for all supported resource types.Current ProblemsThe security team at Contoso receives a large number of cybersecurity alerts. The security team spends too much time identifying which cybersecurity alerts are legitimate threats, and which are not.The Contoso sales team uses only iOS devices. The sales team members exchange files with customers by using a variety of third-party tools. In the past, the sales team experienced various attacks on their devices.The marketing team at Contoso has several Microsoft SharePoint Online sites for collaborating with external vendors. The marketing team has had several incidents in which vendors uploaded files that contain malware.The executive team at Contoso suspects a security breach. The executive team requests that you identify which files had more than five activities during the past 48 hours, including data access, download, or deletion for Microsoft Cloud App Security-protected applications.RequirementsPlanned ChangesContoso plans to integrate the security operations of both companies and manage all security operations centrally.Technical RequirementsContoso identifies the following technical requirements:Receive alerts if an Azure virtual machine is under brute force attack.Use Azure Sentinel to reduce organizational risk by rapidly remediating active attacks on the environment.Implement Azure Sentinel queries that correlate data across the Azure AD tenants of Contoso and Fabrikam.Develop a procedure to remediate Azure Defender for Key Vault alerts for Fabrikam in case of external attackers and a potential compromise of its own Azure AD applications.Identify all cases of users who failed to sign in to an Azure resource for the first time from a given country. A junior security administrator provides you with the following incomplete query.BehaviorAnalytics| where ActivityType == “FailedLogOn”| where ________ == TrueNO.72 You have an Azure Sentinel workspace.You need to test a playbook manually in the Azure portal.From where can you run the test in Azure Sentinel?  Playbooks  Analytics  Threat intelligence  Incidents Explanation/Reference:https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook#run-a-playbook-on-demandNO.73 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You use Azure Security Center.You receive a security alert in Security Center.You need to view recommendations to resolve the alert in Security Center.Solution: From Security alerts, you select the alert, select Take Action, and then expand the Prevent future attacks section.Does this meet the goal?  Yes  No ExplanationYou need to resolve the existing alert, not prevent future alerts. Therefore, you need to select the ‘Mitigate the threat’ option.Reference:https://docs.microsoft.com/en-us/azure/security-center/security-center-managing-and-responding-alertsNO.74 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring Azure Sentinel.You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.Solution: You create a Microsoft incident creation rule for a data connector.Does this meet the goal?  Yes  No Reference:https://docs.microsoft.com/en-us/azure/sentinel/connect-azure-security-centerNO.75 The issue for which team can be resolved by using Microsoft Defender for Office 365?  executive  marketing  security  sales Reference:https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-for-spo-odb-and-teams?view=o365-worldwideNO.76 You have an Azure subscription that contains a virtual machine named VM1 and uses Azure Defender. Azure Defender has automatic provisioning enabled.You need to create a custom alert suppression rule that will supress false positive alerts for suspicious use of PowerShell on VM1.What should you do first?  From Azure Security Center, add a workflow automation.  On VM1, run the Get-MPThreatCatalog cmdlet.  On VM1 trigger a PowerShell alert.  From Azure Security Center, export the alerts to a Log Analytics workspace. Reference:https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-alerts?view=o365-worldwideNO.77 You need to create an advanced hunting query to investigate the executive team issue.How should you complete the query? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. NO.78 You need to create an advanced hunting query to investigate the executive team issue.How should you complete the query? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point. NO.79 HOTSPOTYou are informed of an increase in malicious email being received by users.You need to create an advanced hunting query in Microsoft 365 Defender to identify whether the accounts of the email recipients were compromised. The query must return the most recent 20 sign-ins performed by the recipients within an hour of receiving the known malicious email.How should you complete the query? To answer, select the appropriate options in the answer area.NOTE: Each correct selection is worth one point.Hot Area: Section: [none]Explanation/Reference:https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide Loading … Exam SC-200: Microsoft Security Operations Analyst The content of this exam was updated on July 23, 2021. The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Part of the requirements for: Microsoft Certified: Security Operations Analyst Associate Download exam skills outline   Valid SC-200 Test Answers & Microsoft SC-200 Exam PDF: https://www.exams4sures.com/Microsoft/SC-200-practice-exam-dumps.html --------------------------------------------------- Images: https://free.exams4sures.com/wp-content/plugins/watu/loading.gif https://free.exams4sures.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-07-29 14:57:24 Post date GMT: 2022-07-29 14:57:24 Post modified date: 2022-07-29 14:57:24 Post modified date GMT: 2022-07-29 14:57:24