Free SC-900 Exam Braindumps (page: 23)

Page 22 of 56

HOTSPOT (Drag and Drop is not supported)
For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box 1: No
Microsoft Sentinel data connectors are available for non-Microsoft services like Amazon Web Services.

Box 2: Yes
Once you have connected your data sources to Microsoft Sentinel, you can visualize and monitor the data using the Microsoft Sentinel adoption of Azure Monitor Workbooks, which provides versatility in creating custom dashboards. While the Workbooks are displayed differently in Microsoft Sentinel, it may be useful for you to see how to create interactive reports with Azure Monitor Workbooks. Microsoft Sentinel allows you to create custom workbooks across your data, and also comes with built-in workbook templates to allow you to quickly gain insights across your data as soon as you connect a data source.

Box 3: Yes
To help security analysts look proactively for new anomalies that weren't detected by your security apps or even by your scheduled analytics rules, Microsoft Sentinel's built-in hunting queries guide you into asking the right questions to find issues in the data you already have on your network.


Reference:

https://docs.microsoft.com/en-us/azure/sentinel/data-connectors-reference
https://docs.microsoft.com/en-us/azure/sentinel/monitor-your-data
https://docs.microsoft.com/en-us/azure/sentinel/hunting



Which two Azure resources can a network security group (NSG) be associated with? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.

  1. a virtual network subnet
  2. a network interface
  3. a resource group
  4. a virtual network
  5. an Azure App Service web app

Answer(s): A,B

Explanation:

Association of network security groups
You can associate a network security group with virtual machines, NICs, and subnets, depending on the deployment model you use.


Reference:

https://aviatrix.com/learn-center/cloud-security/create-network-security-groups-in-azure/



HOTSPOT (Drag and Drop is not supported)
Select the answer that correctly completes the sentence.

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender/incidents-overview?view=o365- worldwide



What are two capabilities of Microsoft Defender for Endpoint? Each correct selection presents a complete solution.

NOTE: Each correct selection is worth one point.

  1. automated investigation and remediation
  2. transport encryption
  3. shadow IT detection
  4. attack surface reduction

Answer(s): A,D


Reference:

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint?view=o365-worldwide






Post your Comments and Discuss Microsoft SC-900 exam with other Community members:

SC-900 Discussions & Posts