Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft Certified: Security Operations Analyst Associate SC-200 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are configuring Microsoft Cloud App Security.

You have a custom threat detection policy based on the IP address ranges of your company’s United States-based offices.

You receive many alerts related to impossible travel and sign-ins from risky IP addresses.

You determine that 99% of the alerts are legitimate sign-ins from your corporate offices.

You need to prevent alerts for legitimate sign-ins from known locations.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Override automatic data enrichment.


B.

Add the IP addresses to the corporate address range category.


C.

Increase the sensitivity level of the impossible travel anomaly detection policy.


D.

Add the IP addresses to the other address range category and add a tag.


E.

Create an activity policy that has an exclusion for the IP addresses.


Expert Solution
Questions # 22:

You need to assign role-based access control (RBAQ roles to Group1 and Group2 to meet The Microsoft Defender for Cloud requirements and the business requirements Which role should you assign to each group? To answer, select the appropriate options in the answer area NOTE Each correct selection is worth one point.

Question # 22


Expert Solution
Questions # 23:

You have a Microsoft Sentinel workspace named sws1.

You plan to create an Azure logic app that will raise an incident in an on-premises IT service management system when an incident is generated in sws1.

You need to configure the Microsoft Sentinel connector credentials for the logic app. The solution must meet the following requirements:

• Minimize administrative effort.

• Use the principle of least privilege.

How should you configure the credentials? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 23


Expert Solution
Questions # 24:

Your company uses Azure Sentinel to manage alerts from more than 10,000 IoT devices.

A security manager at the company reports that tracking security threats is increasingly difficult due to the large number of incidents.

You need to recommend a solution to provide a custom visualization to simplify the investigation of threats and to infer threats by using machine learning.

What should you include in the recommendation?

Options:

A.

built-in queries


B.

livestream


C.

notebooks


D.

bookmarks


Expert Solution
Questions # 25:

You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR and contains a Windows device named Device1.

You investigate Device1 for malicious activity and discover a suspicious file named File1.exe. You collect an investigation package from Device1.

You need to review the following forensic data points:

. Is an attacker currently accessing Device1 remotely?

. When was File1.exe first executed?

Which folder in the investigation package should you review for each data point? To answer, select the appropriate options in the answer area.

Question # 25


Expert Solution
Questions # 26:

You need to monitor the password resets. The solution must meet the Microsoft Sentinel requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 26


Expert Solution
Questions # 27:

You need to ensure that the processing of incidents generated by rulequery1 meets the Microsoft Sentinel requirements.

What should you create first?

Options:

A.

a playbook with an incident trigger


B.

a playbook with an entity trigger


C.

an Azure Automation rule


D.

a playbook with an alert trigger


Expert Solution
Questions # 28:

You need to implement the scheduled rule for incident generation based on rulequery1.

What should you configure first?

Options:

A.

entity mapping


B.

custom details


C.

event grouping


D.

alert details


Expert Solution
Questions # 29:

You need to configure event monitoring for Server1. The solution must meet the Microsoft Sentinel requirements. What should you create first?

Options:

A.

a Microsoft Sentinel automation rule


B.

a Microsoft Sentinel scheduled query rule


C.

a Data Collection Rule (DCR)


D.

an Azure Event Grid topic


Expert Solution
Questions # 30:

You need to ensure that the configuration of HuntingQuery1 meets the Microsoft Sentinel requirements.

What should you do?

Options:

A.

Add HuntingQuery1 to a livestream.


B.

Create a watch list.


C.

Create an Azure Automation rule.


D.

Add HuntingQuery1 to favorites.


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions