SC-200

SC-200

Professional Development

10 Qs

quiz-placeholder

Similar activities

MS900 - Module 4 - Full Quiz

MS900 - Module 4 - Full Quiz

Professional Development

15 Qs

AZ-900 Module 1

AZ-900 Module 1

1st Grade - Professional Development

14 Qs

AZ-900 MÓDULO 04 pt-br

AZ-900 MÓDULO 04 pt-br

Professional Development

12 Qs

AZ-900 practice quiz

AZ-900 practice quiz

Professional Development

10 Qs

az900

az900

Professional Development

12 Qs

Azure practice quiz 3

Azure practice quiz 3

Professional Development

10 Qs

AI-900 MÓDULO 02 pt-br

AI-900 MÓDULO 02 pt-br

Professional Development

15 Qs

Entra ID

Entra ID

Professional Development

9 Qs

SC-200

SC-200

Assessment

Quiz

Science, Mathematics, Computers

Professional Development

Hard

Created by

CloudThat Technologies

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in.Which anomaly detection policy should you use?

Activity from infrequent country

Impossible travel

Activity from anonymous IP addresses

Malware detection

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.You are configuring Microsoft Defender for Identity integration with Active Directory.From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.Solution: From Entity tags, you add the accounts as Honeytoken accounts.Does this meet the goal?

Yes

No

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does the search operator do?

Searches across tables and isn't column-specific.

Searches only data in the last hour.

Searches in columns specified.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What are project operators?

Project operators filter a table to the subset of rows that satisfy a predicate.

Project operators create summarized columns and append them to the result set.

Project operators add, remove, or rename columns in a result set.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You can classify an Incident as which of the following?

True alert

High alert

Test alert

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What describes Safe Attachments from Microsoft Defender for Office 365?

Messages and attachments are routed to a special environment where Microsoft Defender for Office 365 uses a variety of machine learning and analysis techniques to detect malicious intent.

Protects your users from malicious URLs in a message or in an Office document.

A powerful report that enables your Security Operations team to investigate and respond to threats effectively and efficiently.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

How can you ensure that a file is sent into quarantine for review by an administrator?

When creating a file policy, select Quarantine for admin

When creating a file policy, select Put in admin quarantine

When creating a file policy, select Put in review for admin

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?