Free SC-200 Exam Braindumps (page: 14)

Page 13 of 79

You provision a Linux virtual machine in a new Azure subscription.
You enable Azure Defender and onboard the virtual machine to Azure Defender.
You need to verify that an attack on the virtual machine triggers an alert in Azure Defender.
Which two Bash commands should you run on the virtual machine? Each correct answer presents part of the solution.
Note: Each correct selection is worth one point.

  1. cp /bin/echo ./asc_alerttest_662jfi039n
  2. ./alerttest testing eicar pipe
  3. cp /bin/echo ./alerttest
  4. ./asc_alerttest_662jfi039n testing eicar pipe

Answer(s): A,D


Reference:

https://docs.microsoft.com/en-us/azure/security-center/security-center-alert-validation#simulate-alerts-on-your-azure-vms-linux-



Your company uses Microsoft Defender for Endpoint.
The company has Microsoft Word documents that contain macros. The documents are used frequently on the devices of the company's accounting team.
You need to hide false positive in the Alerts queue, while maintaining the existing security posture.
Which three actions should you perform? Each correct answer presents part of the solution.
Note: Each correct selection is worth one point.

  1. Resolve the alert automatically.
  2. Hide the alert.
  3. Create a suppression rule scoped to any device.
  4. Create a suppression rule scoped to a device group.
  5. Generate the alert.

Answer(s): B,D,E


Reference:

https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/manage-alerts



Which rule setting should you configure to meet the Azure Sentinel requirements?

  1. From Set rule logic, turn off suppression.
  2. From Analytics rule details, configure the tactics.
  3. From Set rule logic, map the entities.
  4. From Analytics rule details, configure the severity.

Answer(s): C


Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-detect-threats-custom



Your company uses Azure Sentinel to manage alerts from more than 10,000 IoT devices.
A security manager at the company reports that tracking security threats is increasingly difficult due to the large number of incidents.
You need to recommend a solution to provide a custom visualization to simplify the investigation of threats and to infer threats by using machine learning.
What should you include in the recommendation?

  1. built-in queries
  2. livestream
  3. notebooks
  4. bookmarks

Answer(s): C


Reference:

https://docs.microsoft.com/en-us/azure/sentinel/notebooks






Post your Comments and Discuss Microsoft SC-200 exam with other Community members:

SC-200 Discussions & Posts