Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SC-200 Exam Dumps - Microsoft Security Operations Analyst

Go to page:
Question # 33

You have an Azure subscription that has Microsoft Defender for Cloud enabled.

You have a virtual machine named Server! that runs Windows Server 2022 and is hosted in Amazon Web Services (AWS).

You need to collect logs and resolve vulnerabilities for Server1 by using Defender for Cloud.

What should you install first on Server1?

A.

the Microsoft Monitoring Agent

B.

the Azure Arc agent

C.

the Azure Monitor agent

D.

the Azure Pipelines agent

Full Access
Question # 34

You have a Microsoft 365 E5 subscription and a Microsoft Sentinel workspace. You need to create a KQL query that will combine data from the following sources:

• Microsoft Graph

• Risky users detected by using Microsoft Entra ID Protection

The solution must minimize the volume of data returned. How should the query start?

A.

MicrosoftGraphActivityLogs

lookup kind=leftouter AADRiskyUsers on $left.Userld == $right.Id

B.

MicrosoftGraphActivityLogs

join AADRiskyUsers on $left.Userld == $right.Id

C.

MicrosoftGraphActivityLogs

join AADUserRiskEvents on $left.Userld == $right.Id

D.

find in (MicrosoftGraphActivityLogs, AADUserRiskEvents) where

Full Access
Question # 35

You have an Azure subscription that uses Microsoft Sentinel.

You need to minimize the administrative effort required to respond to the incidents and remediate the security threats detected by Microsoft Sentinel.

Which two features should you use? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

Microsoft Sentinel bookmarks

B.

Azure Automation runbooks

C.

Microsoft Sentinel automation rules

D.

Microsoft Sentinel playbooks

E.

Azure Functions apps

Full Access
Question # 36

You have a Microsoft 365 subscription.

You have 1,000 Windows devices that have a third-party antivirus product installed and Microsoft Defender Antivirus in passive mode. You need to ensure that the devices are protected from malicious artifacts that were undetected by the third-party antivirus product Solution: You enable automated investigation and response (AIR).

Does this meet the goal?

A.

Yes

B.

No

Full Access
Question # 37

Your company uses line-of-business apps that contain Microsoft Office VBA macros.

You plan to enable protection against downloading and running additional payloads from the Office VBA macros as additional child processes.

You need to identify which Office VBA macros might be affected.

Which two commands can you run to achieve the goal? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

You have a Microsoft 365 E5 subscription that uses Microsoft SharePoint Online.

You delete users from the subscription.

You need to be notified if the deleted users downloaded numerous documents from SharePoint Online sites during the month before their accounts were deleted.

What should you use?

A.

a file policy in Microsoft Defender for Cloud Apps

B.

an access review policy

C.

an alert policy in Microsoft Defender for Office 365

D.

an insider risk policy

Full Access
Question # 39

You have a Microsoft 365 E5 subscription that uses Microsoft Copilot for Security. You plan to run the following code to create a custom Copilot for Security plugin.

You need to specify a format and complete the code segment. Which format should you use for the variable?

A.

API

B.

GPT

C.

KQL

D.

SQL

Full Access
Question # 40

You need to meet the Microsoft Sentinel requirements for collecting Windows Security event logs. What should you do? To answer, select the appropriate options in the answer area. NOTE Each correct selection is worth one point.

Full Access
Go to page: