Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Microsoft Microsoft Certified: Security Operations Analyst Associate SC-200 Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

You have an Azure subscription named Sub1. Sub1 contains a Microsoft Sentinel workspace named SW1 and a virtual machine named VM1 that runs Windows Server. SW1 collects security logs from VM1 by using the Windows Security Events via AMA connector.

You need to limit the scope of events collected from VM1. The solution must ensure that only audit failure events are collected.

How should you complete the filter expression for the connector? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 51


Expert Solution
Questions # 52:

You need to implement the ASIM query for DNS requests. The solution must meet the Microsoft Sentinel requirements. How should you configure the query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Question # 52


Expert Solution
Questions # 53:

You need to modify the anomaly detection policy settings to meet the Microsoft Defender for Cloud Apps requirements and resolve the reported problem.

Which policy should you modify?

Options:

A.

Activity from suspicious IP addresses


B.

Risky sign-in


C.

Activity from anonymous IP addresses


D.

Impossible travel


Expert Solution
Questions # 54:

You need to implement the Azure Information Protection requirements. What should you configure first?

Options:

A.

Device health and compliance reports settings in Microsoft Defender Security Center


B.

scanner clusters in Azure Information Protection from the Azure portal


C.

content scan jobs in Azure Information Protection from the Azure portal


D.

Advanced features from Settings in Microsoft Defender Security Center


Expert Solution
Questions # 55:

You need to restrict cloud apps running on CUENT1 to meet the Microsoft Defender for Endpoint requirements. Which two configurations should you modify? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Options:

A.

the Cloud Discovery settings in Microsoft Defender for Cloud Apps


B.

the Onboarding settings from Device management in Settings in Microsoft 365 Defender portal


C.

Microsoft Defender for Cloud Apps anomaly detection policies


D.

Advanced features from the Endpoints Settings in the Microsoft 365 Defender portal


Expert Solution
Questions # 56:

You need to implement Azure Defender to meet the Azure Defender requirements and the business requirements.

What should you include in the solution? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 56


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions