The latest Microsoft Security Operations Analyst SC-200 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the Microsoft Security Operations Analyst SC-200 exam and earn Microsoft Security Operations Analyst SC-200 certification.
Table of Contents
- Question 1
- Question
- Answer
- Reference
- Question 2
- Question
- Answer
- Reference
- Question 3
- Question
- Answer
- Reference
- Question 4
- Question
- Answer
- Reference
- Question 5
- Question
- Answer
- Reference
- Question 6
- Question
- Answer
- Explanation
- Question 7
- Question
- Answer
- Reference
- Question 8
- Question
- Answer
- Reference
- Question 9
- Question
- Answer
- Reference
- Question 10
- Question
- Answer
- Reference
Question 1
Question
You have an Azure subscription that contains a Log Analytics workspace.
You need to enable just-in-time (JIT) VM access and network detections for Azure resources.
Where should you enable Azure Defender?
A. at the subscription level
B. at the workspace level
C. at the resource level
Answer
A. at the subscription level
Reference
- Microsoft Docs > Azure > Security > Microsoft Defender for Cloud > Quickstart: Enable enhanced security features
Question 2
Question
You use Azure Defender.
You have an Azure Storage account that contains sensitive information.
You need to run a PowerShell script if someone accesses the storage account from a suspicious IP address.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. From Azure Security Center, enable workflow automation.
B. Create an Azure logic app that has a manual trigger.
C. Create an Azure logic app that has an Azure Security Center alert trigger.
D. Create an Azure logic app that has an HTTP trigger.
E. From Azure Active Directory (Azure AD), add an app registration.
Answer
A. From Azure Security Center, enable workflow automation.
C. Create an Azure logic app that has an Azure Security Center alert trigger.
Reference
- Microsoft Docs > Azure > Storage > Configure Microsoft Defender for Storage
- Microsoft Docs > Azure > Security > Microsoft Defender for Cloud > Automate responses to Microsoft Defender for Cloud triggers
Question 3
Question
You recently deployed Azure Sentinel.
You discover that the default Fusion rule does not generate any alerts. You verify that the rule is enabled.
You need to ensure that the Fusion rule can generate alerts.
What should you do?
A. Disable, and then enable the rule.
B. Add data connectors
C. Create a new machine learning analytics rule.
D. Add a hunting bookmark.
Answer
B. Add data connectors
Reference
- Microsoft Docs > Azure > Security > Microsoft Sentinel > Microsoft Sentinel data connectors
Question 4
Question
A company uses Azure Sentinel.
You need to create an automated threat response.
What should you use?
A. a data connector
B. a playbook
C. a workbook
D. a Microsoft incident creation rule
Answer
B. a playbook
Reference
- Microsoft Docs > Azure > Security > Microsoft Sentinel > Tutorial: Use playbooks with automation rules in Microsoft Sentinel
Question 5
Question
You have an Azure Sentinel deployment in the East US Azure region.
You create a Log Analytics workspace named LogsWest in the West US Azure region.
You need to ensure that you can use scheduled analytics rules in the existing Azure Sentinel deployment to generate alerts based on queries to LogsWest.
What should you do first?
A. Deploy Azure Data Catalog to the West US Azure region.
B. Modify the workspace settings of the existing Azure Sentinel deployment.
C. Add Azure Sentinel to a workspace.
D. Create a data connector in Azure Sentinel.
Answer
C. Add Azure Sentinel to a workspace.
Reference
- Microsoft Docs > Azure > Security > Microsoft Sentinel > Extend Microsoft Sentinel across workspaces and tenants
Question 6
Question
You create a custom analytics rule to detect threats in Azure Sentinel.
You discover that the rule fails intermittently.
What are two possible causes of the failures? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. The rule query takes too long to run and times out.
B. The target workspace was deleted.
C. Permissions to the data sources of the rule query were modified.
D. There are connectivity issues between the data sources and Log Analytics
Answer
A. The rule query takes too long to run and times out.
D. There are connectivity issues between the data sources and Log Analytics
Explanation
Incorrect Answers:
B: This would cause it to fail every time, not just intermittently.
C: This would cause it to fail every time, not just intermittently.
Question 7
Question
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are configuring Azure Sentinel.
You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.
Solution: You create a scheduled query rule for a data connector.
Does this meet the goal?
A. Yes
B. No
Answer
B. No
Reference
- Microsoft Docs > Azure > Security > Microsoft Sentinel > Connect Microsoft Defender for Cloud alerts to Microsoft Sentinel
Question 8
Question
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are configuring Azure Sentinel.
You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.
Solution: You create a hunting bookmark.
Does this meet the goal?
A. Yes
B. No
Answer
B. No
Reference
- Microsoft Docs > Azure > Security > Microsoft Sentinel > Connect Microsoft Defender for Cloud alerts to Microsoft Sentinel
Question 9
Question
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are configuring Azure Sentinel.
You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.
Solution: You create a Microsoft incident creation rule for a data connector.
Does this meet the goal?
A. Yes
B. No
Answer
A. Yes
Reference
- Microsoft Docs > Azure > Security > Microsoft Sentinel > Connect Microsoft Defender for Cloud alerts to Microsoft Sentinel
Question 10
Question
Hotspot Question
You are informed of an increase in malicious email being received by users.
You need to create an advanced hunting query in Microsoft 365 Defender to identify whether the accounts of the email recipients were compromised. The query must return the most recent 20 sign-ins performed by the recipients within an hour of receiving the known malicious email.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer
Reference
- Microsoft Docs > Microsoft 365 Defender > Investigate and respond to threats > Search for threats with advanced hunting > Learn, train, & get examples > Hunt for threats across devices, emails, apps, and identities