Microsoft SC-200 Exam Questions
Microsoft Security Operations Analyst (Page 3 )

Updated On: 8-Mar-2026
View Related Case Study

DRAG DROP (Drag and Drop is not supported)
You need to configure DC1 to meet the business requirements.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Scenario:
Litware identifies the following business requirements:
All domain controllers must be protected by using Microsoft Defender for Identity.
DC1 is on on-premises server running Windows Server 2019. It is a domain controller. Deploy Microsoft Defender for Identity with Microsoft 365 Defender
Step 1: Provide a global administrator credentials to the litware.com Active Directory domain Prerequisites include:
Accounts
At least one Directory Service account with read access to all objects in the monitored domains.
Permissions
To create your Defender for Identity instance, you'll need an Azure AD tenant with at least one global/security administrator. Each Defender for Identity workspace supports a multiple Active Directory forest boundary and Forest Functional Level (FFL) of Windows 2003 and above.
You need to be a global administrator or security administrator on the tenant to access the Identity section on
the Microsoft 365 Defender portal and be able to create the workspace. Step 2: Create an instance of Microsoft Defender for Identity.
Step 3: Provide domain administrator credentials to the litware.com Active Directory domain. If there are only three steps required, skip this step.
Step 4: Install the sensor on DC1. Note on the four steps:
Step 1: log in to https://portal.atp.azure.com as a global admin Step 2: Create the instance
Step 3. Connect the instance to Active Directory Step 4. Download and install the sensor.
Incorrect:
Install the standalone sensor on DC1 We are in a domain.


Reference:

https://learn.microsoft.com/en-us/defender-for-identity/deploy-defender-identity https://learn.microsoft.com/en-us/defender-for-identity/install-sensor https://learn.microsoft.com/en-us/defender-for-identity/prerequisites



View Related Case Study

DRAG DROP (Drag and Drop is not supported)
You need to configure DC1 to meet the business requirements.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:




Scenario:
Litware identifies the following business requirements:
All domain controllers must be protected by using Microsoft Defender for Identity.
DC1 is on on-premises server running Windows Server 2019. It is a domain controller. Deploy Microsoft Defender for Identity with Microsoft 365 Defender
Step 1: Provide a global administrator credentials to the litware.com Active Directory domain Prerequisites include:
Accounts
At least one Directory Service account with read access to all objects in the monitored domains.
Permissions
To create your Defender for Identity instance, you'll need an Azure AD tenant with at least one global/security administrator. Each Defender for Identity workspace supports a multiple Active Directory forest boundary and Forest Functional Level (FFL) of Windows 2003 and above.
You need to be a global administrator or security administrator on the tenant to access the Identity section on the Microsoft 365 Defender portal and be able to create the workspace.
Step 2: Create an instance of Microsoft Defender for Identity. Step 3: Install the sensor on DC1.
Note if four steps instead of three steps:
Step 1: log in to https://portal.atp.azure.com as a global admin Step 2: Create the instance
Step 3. Connect the instance to Active Directory Step 4. Download and install the sensor.
Incorrect:
* Install the standalone sensor on DC1 We are in a domain.


Reference:

https://learn.microsoft.com/en-us/defender-for-identity/deploy-defender-identity https://learn.microsoft.com/en-us/defender-for-identity/install-sensor
https://learn.microsoft.com/en-us/defender-for-identity/prerequisites
Mitigate threats using Microsoft 365 Defender Question Set 4



View Related Case Study

DRAG DROP (Drag and Drop is not supported)
You are investigating an incident by using Microsoft Defender portal.
You need to create an advanced hunting query to count failed sign-in authentications on three devices named CFOLaptop, CEOLaptop, and COOLaptop.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



View Related Case Study

You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in.
Which Microsoft Defender for Cloud Apps anomaly detection policy should you use?

  1. Impossible travel
  2. Activity from anonymous IP addresses
  3. Activity from infrequent country
  4. Malware detection

Answer(s): C


Reference:

https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy



View Related Case Study

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.
You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters.
You need to create a data loss prevention (DLP) policy to protect the sensitive documents. What should you use to detect which documents are sensitive?

  1. SharePoint search
  2. a hunting query in Microsoft 365 Defender
  3. Azure Information Protection
  4. RegEx pattern matching

Answer(s): D



Viewing page 3 of 79
Viewing questions 11 - 15 out of 424 questions



Post your Comments and Discuss Microsoft SC-200 exam dumps with other Community members:

SC-200 Exam Discussions & Posts

AI Tutor