Microsoft Security Operations Analyst Associate SC-200 Practice Question

You run an ad-hoc Kusto Query Language (KQL) hunting query in the Microsoft Sentinel Hunting blade and find several matches for suspicious PowerShell usage. You want the same logic to execute automatically every 24 hours and raise incidents whenever results are returned, without having to manually recreate the logic elsewhere. What should you do next in the Hunting blade?

  • Add the query directly to an existing playbook so the playbook runs every day.

  • Bookmark the current results so they appear in future investigations.

  • Save the query to a new workbook and pin the workbook to a dashboard.

  • Use the Create detection rule option to convert the hunting query into a scheduled analytic rule that runs daily.

Microsoft Security Operations Analyst Associate SC-200
Manage security threats
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot