Microsoft Security Operations Analyst Associate SC-200 Practice Question

While reviewing an incident in the Microsoft Defender portal, you notice that the file "contoso.exe" appears in the Evidence tab with a suspicious verdict. You must quickly learn how many devices have encountered this file during the last 30 days and whether it is common in your organization. Which action should you take from within the incident to obtain this information with the fewest steps?

  • Open the primary affected device's page, select Timeline, and filter events for contoso.exe over the last 30 days.

  • In the incident's Evidence tab, select contoso.exe and choose Open file page to view its prevalence details.

  • Run an advanced hunting query in Microsoft Sentinel that searches all FileEvent records for contoso.exe across the past month.

  • Switch to the incident's Graph view, expand the file node, and review the connected entities for device counts.

Microsoft Security Operations Analyst Associate SC-200
Manage incident response
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot