Microsoft Security Operations Analyst Associate SC-200 Practice Question

You plan to use Microsoft Defender XDR Deception to detect credential-dumping attempts that target Local Security Authority Subsystem Service (LSASS) on Windows 11 endpoints.
You need a rule that meets the following requirements:

  • Raises a high-severity alert when any running process opens a handle to the lsass.exe process.
  • Applies to every onboarded device without having to list them individually.
    How should you configure the deception rule?
  • Create a Process handle access deception rule that protects lsass.exe and scope it to All devices with High severity.

  • Create a File access deception rule that monitors %SystemRoot%\System32\lsass.exe and scope it to specific high-value servers only.

  • Create a Process creation deception rule that blocks any new process named lsass.exe from starting and apply it to all devices.

  • Create a Registry key access deception rule that protects HKLM\SYSTEM\CurrentControlSet\Control\Lsa and apply it to All devices with Medium severity.

Microsoft Security Operations Analyst Associate SC-200
Configure protections and detections
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot