New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

SC-200 Reviews Questions

Page: 7 / 14
Total 306 questions

Microsoft Security Operations Analyst Questions and Answers

Question 25

You have an on-premises network.

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Identity.

From the Microsoft Defender portal, you investigate an incident on a device named Device1 of a user named User1. The incident contains the following Defender for Identity alert.

Suspected identity theft (pass-the-ticket) (external ID 2018)

You need to contain the incident without affecting users and devices. The solution must minimize administrative effort.

What should you do?

Options:

A.

Disable User 1 only.

B.

Quarantine Device1 only.

C.

Reset the password for all the accounts that previously signed in to Device1.

D.

DisableUser1 and quarantine Device1.

E.

Disable User1, quarantine Device1, and reset the password for all the accounts that previously signed in to Device1.

Question 26

You have an Azure subscription that uses Microsoft Defender for Cloud and contains a storage account named storage1. You receive an alert that there was an unusually high volume of delete operations on the blobs in storage1.

You need to identify which blobs were deleted.

What should you review?

Options:

A.

the Azure Storage Analytics logs

B.

the activity logs of storage1

C.

the alert details

D.

the related entities of the alert

Question 27

You have a Microsoft Sentinel workspace that has a default data retention period of 30 days. The workspace contains two custom tables as shown in the following table.

Each table ingested two records per day during the past 365 days.

You build KQL statements for use in analytic rules as shown in the following table.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Options:

Question 28

You are responsible for responding to Azure Defender for Key Vault alerts.

During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.

What should you configure to mitigate the threat?

Options:

A.

Key Vault firewalls and virtual networks

B.

Azure Active Directory (Azure AD) permissions

C.

role-based access control (RBAC) for the key vault

D.

the access policy settings of the key vault

Page: 7 / 14
Total 306 questions