Microsoft Security Operations Analyst Associate SC-200 Practice Question

During threat-hunting in Microsoft Sentinel you run a KQL query that surfaces suspicious sign-in events. You must: save each event with its full context, annotate it with comments and MITRE ATT&CK tactics, and allow an analytics rule to later promote it to an incident. Which Sentinel feature meets all these requirements?

  • Insert the events into a custom Log Analytics table and enable change tracking

  • Export the query results to a watchlist and reference the list in a scheduled analytics rule

  • Save the query as a function and pin its results in a workbook visualization

  • Create a hunting bookmark for each event and add relevant tags and tactics

Microsoft Security Operations Analyst Associate SC-200
Manage security threats
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot