Microsoft Azure Security Engineer Associate AZ-500 Practice Question

In a Microsoft Sentinel workspace named SecOps, you deploy a Logic App playbook called SendToITSM that creates a ServiceNow ticket. You need the playbook to run automatically whenever Sentinel generates a new High-severity incident, regardless of which analytics rule produced the incident, and before analysts begin triage. What should you configure to meet the requirement?

  • Attach the SendToITSM playbook to the Automated response section of every existing analytics rule in the workspace.

  • Configure a scheduled query rule in Azure Monitor that sends a webhook call to the playbook through an action group.

  • Create an automation rule that triggers when an incident is created, adds a condition for High severity, and runs the SendToITSM playbook.

  • Set a default playbook for all incidents in the workspace from the Incidents settings page in Microsoft Sentinel.

Microsoft Azure Security Engineer Associate AZ-500
Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot