
SC-200

Quiz
•
Science, Mathematics, Computers
•
Professional Development
•
Hard

CloudThat Technologies
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in.Which anomaly detection policy should you use?
Activity from infrequent country
Impossible travel
Activity from anonymous IP addresses
Malware detection
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring Microsoft Defender for Identity integration with Active Directory.From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.Solution: From Entity tags, you add the accounts as Honeytoken accounts.Does this meet the goal?
Yes
No
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What does the search operator do?
Searches across tables and isn't column-specific.
Searches only data in the last hour.
Searches in columns specified.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What are project operators?
Project operators filter a table to the subset of rows that satisfy a predicate.
Project operators create summarized columns and append them to the result set.
Project operators add, remove, or rename columns in a result set.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
You can classify an Incident as which of the following?
True alert
High alert
Test alert
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What describes Safe Attachments from Microsoft Defender for Office 365?
Messages and attachments are routed to a special environment where Microsoft Defender for Office 365 uses a variety of machine learning and analysis techniques to detect malicious intent.
Protects your users from malicious URLs in a message or in an Office document.
A powerful report that enables your Security Operations team to investigate and respond to threats effectively and efficiently.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
How can you ensure that a file is sent into quarantine for review by an administrator?
When creating a file policy, select Quarantine for admin
When creating a file policy, select Put in admin quarantine
When creating a file policy, select Put in review for admin
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
AI-102_MODULE-4

Quiz
•
Professional Development
10 questions
AZ-104_Module-1

Quiz
•
Professional Development
15 questions
MS900 - Module 4 - Full Quiz

Quiz
•
Professional Development
15 questions
Fusion Sales Training

Quiz
•
Professional Development
14 questions
AZ-900 Module 1

Quiz
•
1st Grade - Professio...
14 questions
AZ-900 MÓDULO 05 pt-br

Quiz
•
Professional Development
10 questions
Azure Fundamentals Module 1 Review

Quiz
•
10th Grade - Professi...
14 questions
AZ-900 Modulo 2

Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade