Free SC-200 Exam Braindumps (page: 30)

Page 29 of 79

A company uses Azure Sentinel.
You need to create an automated threat response.
What should you use?

  1. a data connector
  2. a playbook
  3. a workbook
  4. a Microsoft incident creation rule

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook



HOTSPOT
-
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint Plan 2 and contains a Windows device named Device1.
Twenty files on Device1 are quarantined by custom indicators as part of an investigation.
You need to release the 20 files from quarantine.
How should you complete the command? To answer, select the appropriate options in the answer area.
Note: Each correct selection is worth one point.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



You have an Azure subscription that contains a Microsoft Sentinel workspace named WS1.
You create a hunting query that detects a new attack vector. The attack vector maps to a tactic listed in the MITRE ATT&CK database.
You need to ensure that an incident is created in WS1 when the new attack vector is detected.
What should you configure?

  1. a hunting livestream session
  2. a query bookmark
  3. a scheduled query rule
  4. a Fusion rule

Answer(s): C



You have an Azure subscription that contains a Log Analytics workspace.
You need to enable just-in-time (JIT) VM access and network detections for Azure resources.
Where should you enable Azure Defender?

  1. at the subscription level
  2. at the workspace level
  3. at the resource level

Answer(s): A


Reference:

https://docs.microsoft.com/en-us/azure/security-center/enable-azure-defender






Post your Comments and Discuss Microsoft SC-200 exam with other Community members:

SC-200 Discussions & Posts