Download Microsoft Security Operations Analyst Exam.CertDumps.SC-200.2022-01-07.3e.51q.vcex


Download Exam

File Info

Exam Microsoft Security Operations Analyst
Number SC-200
File Name Microsoft Security Operations Analyst Exam.CertDumps.SC-200.2022-01-07.3e.51q.vcex
Size 2.77 Mb
Posted January 07, 2022
Downloads 14



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
You are investigating an incident by using Microsoft 365 Defender.    
You need to create an advanced hunting query to count failed sign-in authentications on three devices named CFOLaptop, CEOLaptop, and COOLaptop.    
How should you complete the query? To answer, select the appropriate options in the answer area.    
NOTE: Each correct selection is worth one point. 




Question 2
You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in.  
  
Which anomaly detection policy should you use?

  • A: Impossible travel
  • B: Activity from anonymous IP addresses
  • C: Activity from infrequent country
  • D: Malware detection



Question 3
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.    
You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters.    
You need to create a data loss prevention (DLP) policy to protect the sensitive documents.  
What should you use to detect which documents are sensitive?

  • A: SharePoint search
  • B: a hunting query in Microsoft 365 Defender
  • C: Azure Information Protection
  • D: RegEx pattern matching



Question 4
Your company uses line-of-business apps that contain Microsoft Office VBA macros.    
You need to prevent users from downloading and running additional payloads from the Office VBA macros as additional child processes.  
Which two commands can you run to achieve the goal? Each correct answer presents a complete solution.    
NOTE: Each correct selection is worth one point.

  • A:
       
  • B:
       
  • C:
       
  • D:
       



Question 5
You open the Cloud App Security portal as shown in the following exhibit.  

    
  
Your environment does NOT have Microsoft Defender for Endpoint enabled.  
You need to remediate the risk for the Launchpad app.  
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.  




Question 6
You are investigating a potential attack that deploys a new ransomware strain.    
You have three custom device groups. The groups contain devices that store highly sensitive information.  
You plan to perform automated actions on all devices.  
You need to be able to temporarily group the machines to perform actions on the devices.  
Which three actions should you perform? Each correct answer presents part of the solution.  
NOTE: Each correct selection is worth one point.

  • A: Assign a tag to the device group.
  • B: Add the device users to the admin role.
  • C: Add a tag to the machines.
  • D: Create a new device group that has a rank of 1.
  • E: Create a new admin role.
  • F: Create a new device group that has a rank of 4.



Question 7
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.    
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.    
You are configuring Microsoft Defender for Identity integration with Active Directory.    
From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.  
Solution: From Azure AD Identity Protection, you configure the sign-in risk policy. 
Does this meet the goal?

  • A: Yes
  • B: No



Question 8
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.  
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.    
You are configuring Microsoft Defender for Identity integration with Active Directory.    
From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.  
Solution: You add the accounts to an Active Directory group and add the group as a Sensitive group. 
Does this meet the goal?

  • A: Yes
  • B: No



Question 9
You implement Safe Attachments policies in Microsoft Defender for Office 365.    
Users report that email messages containing attachments take longer than expected to be received.    
You need to reduce the amount of time it takes to deliver messages that contain attachments without compromising security. The attachments must be scanned for malware, and any messages that contain malware must be blocked.    
What should you configure in the Safe Attachments policies?

  • A: Dynamic Delivery
  • B: Replace
  • C: Block and Enable redirect
  • D: Monitor and Enable redirect



Question 10
You receive a security bulletin about a potential attack that uses an image file.    
You need to create an indicator of compromise (IoC) in Microsoft Defender for Endpoint to prevent the attack.  
Which indicator type should you use?

  • A: a URL/domain indicator that has Action set to Alert only
  • B: a URL/domain indicator that has Action set to Alert and block
  • C: a file hash indicator that has Action set to Alert and block
  • D: a certificate indicator that has Action set to Alert and block








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset