SC-200 試験問題 1

You are investigating an incident by using Microsoft 365 Defender.
You need to create an advanced hunting query to detect failed sign-in authentications on three devices named CFOLaptop, CEOLaptop, and COOLaptop.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.

SC-200 試験問題 2

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have Linux virtual machines on Amazon Web Services (AWS).
You deploy Azure Defender and enable auto-provisioning.
You need to monitor the virtual machines by using Azure Defender.
Solution: You manually install the Log Analytics agent on the virtual machines.
Does this meet the goal?
  • SC-200 試験問題 3

    Your company uses Azure Sentinel to manage alerts from more than 10,000 IoT devices.
    A security manager at the company reports that tracking security threats is increasingly difficult due to the large number of incidents.
    You need to recommend a solution to provide a custom visualization to simplify the investigation of threats and to infer threats by using machine learning.
    What should you include in the recommendation?
  • SC-200 試験問題 4

    You provision a Linux virtual machine in a new Azure subscription.
    You enable Azure Defender and onboard the virtual machine to Azure Defender.
    You need to verify that an attack on the virtual machine triggers an alert in Azure Defender.
    Which two Bash commands should you run on the virtual machine? Each correct answer presents part of the solution.
    NOTE: Each correct selection is worth one point.
  • SC-200 試験問題 5

    You have a Microsoft 365 subscription that uses Azure Defender. You have 100 virtual machines in a resource group named RG1.
    You assign the Security Admin roles to a new user named SecAdmin1.
    You need to ensure that SecAdmin1 can apply quick fixes to the virtual machines by using Azure Defender. The solution must use the principle of least privilege.
    Which role should you assign to SecAdmin1?