Microsoft Security Operations Analyst Associate SC-200 Practice Question

You manage a Microsoft Sentinel workspace connected to several Azure subscriptions. Security analysts need to investigate how frequently Audit and Deny policies are triggered and to correlate those results with security alerts already stored in the workspace. You must start ingesting Azure Policy compliance data into Microsoft Sentinel without deploying any additional agents or custom scripts and with the least administrative effort. What should you do?

  • Create a diagnostic setting for each subscription that streams the Policy category to the Log Analytics workspace and then enable the Azure Activity data connector.

  • Enable the Azure Resource Graph connector and schedule a query that exports PolicyInsights data to a custom table in the workspace.

  • Deploy the Log Analytics agent to all Azure virtual machines and configure the Change Tracking solution to collect Policy snapshots.

  • Enable the Azure Policy (Preview) data connector in the Microsoft Sentinel portal and select the Azure subscriptions whose compliance data you want to stream.

Microsoft Security Operations Analyst Associate SC-200
Manage a security operations environment
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot