Download Microsoft Security Operations Analyst.SC-200.VCEplus.2021-03-31.42q.vcex

Vendor: Microsoft
Exam Code: SC-200
Exam Name: Microsoft Security Operations Analyst
Date: Mar 31, 2021
File Size: 2 MB
Downloads: 3

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
The issue for which team can be resolved by using Microsoft Defender for Endpoint?
  1. executive
  2. sales
  3. marketing
Correct answer: B
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios
Question 2
The issue for which team can be resolved by using Microsoft Defender for Office 365?
  1. executive
  2. marketing
  3. security  
  4. sales
Correct answer: B
Explanation:
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-for-spo-odb-and-teams?view=o365-worldwide Testlet 2  
Reference: https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/atp-for-spo-odb-and-teams?view=o365-worldwide Testlet 2  
Question 3
You need to implement the Azure Information Protection requirements.  
What should you configure first?
  1. Device health and compliance reports settings in Microsoft Defender Security Center
  2. scanner clusters in Azure Information Protection from the Azure portal
  3. content scan jobs in Azure Information Protection from the Azure portal
  4. Advanced features from Settings in Microsoft Defender Security Center
Correct answer: D
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview
Reference: 
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview
Question 4
You need to modify the anomaly detection policy settings to meet the Cloud App Security requirements. 
  1. Activity from suspicious IP addresses
  2. Activity from anonymous IP addresses
  3. Impossible travel 
  4. Risky sign-in
Correct answer: C
Explanation:
Reference: https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy  
Reference: 
https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy  
Question 5
You have the following advanced hunting query in Microsoft 365 Defender.  
   
  
You need to receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours.  
Which two actions should you perform? Each correct answer presents part of the solution.   
NOTE: Each correct selection is worth one point.
  1. Create a detection rule.
  2. Create a suppression rule.
  3. Add | order by Timestamp to the query.
  4. Replace DeviceProcessEvents with DeviceNetworkEvents.
  5. Add DeviceId and ReportId to the output of the query.
Correct answer: AE
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules
Question 6
You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in.  
Which anomaly detection policy should you use?
  1. Impossible travel
  2. Activity from anonymous IP addresses 
  3. Activity from infrequent country
  4. Malware detection
Correct answer: C
Explanation:
Reference: https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
Reference: https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy
Question 7
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.  
You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters.  
You need to create a data loss prevention (DLP) policy to protect the sensitive documents.  
What should you use to detect which documents are sensitive?
  1. SharePoint search
  2. a hunting query in Microsoft 365 Defender
  3. Azure Information Protection
  4. RegEx pattern matching
Correct answer: C
Explanation:
Reference: https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection
Reference: 
https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection
Question 8
Your company uses line-of-business apps that contain Microsoft Office VBA macros.  
You plan to enable protection against downloading and running additional payloads from the Office VBA macros as additional child processes.  
You need to identify which Office VBA macros might be affected.  
Which two commands can you run to achieve the goal? Each correct answer presents a complete solution.  
NOTE: Each correct selection is worth one point. 
  1.   
  2.   
  3.    
  4.   
Correct answer: BC
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction
Question 9
Your company uses Microsoft Defender for Endpoint.  
The company has Microsoft Word documents that contain macros. The documents are used frequently on the devices of the company’s accounting team.  
You need to hide false positive in the Alerts queue, while maintaining the existing security posture.  
Which three actions should you perform? Each correct answer presents part of the solution.  
NOTE: Each correct selection is worth one point.
  1. Resolve the alert automatically.
  2. Hide the alert.
  3. Create a suppression rule scoped to any device.
  4. Create a suppression rule scoped to a device group.
  5. Generate the alert.
Correct answer: BCE
Explanation:
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/manage-alerts
Reference: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/manage-alerts
Question 10
You are investigating a potential attack that deploys a new ransomware strain.  
You plan to perform automated actions on a group of highly valuable machines that contain sensitive information.  
You have three custom device groups.  
You need to be able to temporarily group the machines to perform actions on the devices.  
Which three actions should you perform? Each correct answer presents part of the solution.  
NOTE: Each correct selection is worth one point.
  1. Add a tag to the device group.
  2. Add the device users to the admin role.
  3. Add a tag to the machines. 
  4. Create a new device group that has a rank of 1.
  5. Create a new admin role.
  6. Create a new device group that has a rank of 4.
Correct answer: BDE
Explanation:
Reference: https://www.drware.com/how-to-use-tagging-effectively-in-microsoft-defender-for-endpoint-part-1/
Reference: 
https://www.drware.com/how-to-use-tagging-effectively-in-microsoft-defender-for-endpoint-part-1/
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!