Free SC-200 Exam Braindumps (page: 7)

Page 6 of 79

You have an Azure subscription that uses Microsoft Defender for Cloud.
You need to configure Defender for Cloud to mitigate the following risks:
• Vulnerabilities within the application source code
• Exploitation toolkits in declarative templates
• Operations from malicious IP addresses
• Exposed secrets
Which two Defender for Cloud services should you use? Each correct answer presents part of the solution.
Note: Each correct answer is worth one point.

  1. Microsoft Defender for Resource Manager
  2. Microsoft Defender for DNS
  3. Microsoft Defender for App Service
  4. Microsoft Defender for Servers
  5. Microsoft Defender for DevOps

Answer(s): A,E



HOTSPOT
-
You have an Azure subscription that contains a Microsoft Sentinel workspace named WS1.
You need to ensure that the incidents in WS1 include a list of actions that must be performed. The solution must meet the following requirements:
• Ensure that you can build a tailored list of actions for each type of incident.
• Minimize administrative effort.
What should you do? To answer, select the appropriate options in the answer area.
Note: Each correct selection is worth one point.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



You receive an alert from Azure Defender for Key Vault.
You discover that the alert is generated from multiple suspicious IP addresses.
You need to reduce the potential of Key Vault secrets being leaked while you investigate the issue. The solution must be implemented as soon as possible and must minimize the impact on legitimate users.
What should you do first?

  1. Modify the access control settings for the key vault.
  2. Enable the Key Vault firewall.
  3. Create an application security group.
  4. Modify the access policy for the key vault.

Answer(s): B


Reference:

https://docs.microsoft.com/en-us/azure/security-center/defender-for-key-vault-usage



You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in.
Which anomaly detection policy should you use?

  1. Impossible travel
  2. Activity from anonymous IP addresses
  3. Activity from infrequent country
  4. Malware detection

Answer(s): C


Reference:

https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy






Post your Comments and Discuss Microsoft SC-200 exam with other Community members:

SC-200 Discussions & Posts