Microsoft Security Operations Analyst Associate SC-200 Practice Question

You manage Windows 11 devices that are onboarded to Microsoft Defender for Endpoint. A recent incident analysis shows that ransomware entered your environment through malicious Office macros that invoked low-level Win32 APIs to inject code into legitimate processes. You need to configure an attack surface reduction (ASR) rule in an Endpoint security policy to block this technique while allowing benign macros that do not use these APIs to run. Which ASR rule should you enable and set to Block?

  • Block Win32 API calls from Office macro (GUID: 92E97FA1-2EDF-4476-BDD6-9B05EDC1FAC)

  • Block executable content from email client and webmail (GUID: BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550)

  • Block Office applications from creating child processes (GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A)

  • Block Office applications from injecting code into other processes (GUID: 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84)

Microsoft Security Operations Analyst Associate SC-200
Configure protections and detections
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot