Free SC-200 Exam Braindumps (page: 32)

Page 31 of 79

You use Azure Defender.
You have an Azure Storage account that contains sensitive information.
You need to run a PowerShell script if someone accesses the storage account from a suspicious IP address.
Which two actions should you perform? Each correct answer presents part of the solution.
Note: Each correct selection is worth one point.

  1. From Azure Security Center, enable workflow automation.
  2. Create an Azure logic app that has a manual trigger.
  3. Create an Azure logic app that has an Azure Security Center alert trigger.
  4. Create an Azure logic app that has an HTTP trigger.
  5. From Azure Active Directory (Azure AD), add an app registration.

Answer(s): A,C


Reference:

https://docs.microsoft.com/en-us/azure/storage/common/azure-defender-storage-configure?tabs=azure-security-center https://docs.microsoft.com/en-us/azure/security-center/workflow-automation



Your company deploys the following services:
✑ Microsoft Defender for Identity
✑ Microsoft Defender for Endpoint
✑ Microsoft Defender for Office 365
You need to provide a security analyst with the ability to use the Microsoft 365 security center. The analyst must be able to approve and reject pending actions generated by Microsoft Defender for Endpoint. The solution must use the principle of least privilege.
Which two roles should assign to the analyst? Each correct answer presents part of the solution.
Note: Each correct selection is worth one point.

  1. the Compliance Data Administrator in Azure Active Directory (Azure AD)
  2. the Active remediation actions role in Microsoft Defender for Endpoint
  3. the Security Administrator role in Azure Active Directory (Azure AD)
  4. the Security Reader role in Azure Active Directory (Azure AD)

Answer(s): B,D


Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwide



You have an Azure Sentinel deployment in the East US Azure region.
You create a Log Analytics workspace named LogsWest in the West US Azure region.
You need to ensure that you can use scheduled analytics rules in the existing Azure Sentinel deployment to generate alerts based on queries to LogsWest.
What should you do first?

  1. Deploy Azure Data Catalog to the West US Azure region.
  2. Modify the workspace settings of the existing Azure Sentinel deployment.
  3. Add Azure Sentinel to a workspace.
  4. Create a data connector in Azure Sentinel.

Answer(s): C


Reference:

https://docs.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants



You have a Microsoft 365 subscription that uses Microsoft Defender XDR and contains a Windows device named Device1.
The timeline of Device1 includes three files named File1.ps1, File2.exe, and File3.dll.
You need to submit files for deep analysis in Microsoft Defender XDR.
Which files can you submit?

  1. File1.ps1 only
  2. File2.exe only
  3. File3.dll only
  4. File2.exe and File3.dll only
  5. File1.ps1 and File2.exe only
  6. File1.ps1, File2.exe, and File3.dll

Answer(s): D






Post your Comments and Discuss Microsoft SC-200 exam with other Community members:

SC-200 Discussions & Posts