Microsoft Security Operations Analyst Associate SC-200 Practice Question

You must receive an email whenever Microsoft Defender XDR detects a newly discovered CVE rated Critical on any server. Requirements: trigger only for Critical severity, scope to the Default device group, send immediately. Which rule type should you create in the Microsoft Defender portal, and which option lets you enforce both the severity and device-scope filters?

  • Configure a Data retention policy with a Critical severity filter for the Default device group.

  • Create an Alert notification rule and set Severity to Critical and Device group to Default.

  • Create a Vulnerability notification rule and set the Severity filter to Critical and the Device group filter to Default.

  • Configure an Automated investigation exclusion scoped to the Default device group and critical severity.

Microsoft Security Operations Analyst Associate SC-200
Manage a security operations environment
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot