Microsoft Security Operations Analyst Associate SC-200 Practice Question

You are creating a scheduled analytics rule in Microsoft Sentinel that runs every 10 minutes and raises an alert whenever a known malicious file hash is observed on an endpoint. Security operations requires that any alerts raised by this rule during a six-hour window be consolidated into a single incident if they reference the same Hostname entity. In the rule wizard, which configuration must you modify to meet this requirement?

  • Configure a suppression rule that suppresses alerts from the same Hostname for six hours.

  • Change the query schedule so that the rule runs once every six hours instead of every 10 minutes.

  • Edit Incident settings and enable alert grouping by Entities using the Hostname entity with a six-hour grouping duration.

  • Create an automation playbook that merges incidents containing the same Hostname within six hours.

Microsoft Security Operations Analyst Associate SC-200
Configure protections and detections
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot