Microsoft Security Operations Analyst Associate SC-200 Practice Question

Your company uses Microsoft Defender XDR. A legacy line-of-business application repeatedly triggers the built-in alert "Malware detected in memory" on several devices. After investigation, you verify that the executable is benign and security policy requires that the file continue to be scanned and blocked if any new malicious behavior is found. You must stop Microsoft Defender XDR from raising this specific alert for that executable while ensuring all other malware detections-including any new alerts for the same file-remain active. Which action should you take in the Microsoft Defender portal?

  • Configure a scheduled custom detection rule whose query excludes events generated by the executable.

  • Add an indicator of compromise for the executable's file hash and set the action to "Allow".

  • Create an alert-suppression rule scoped to the alert title and the executable's file hash or path.

  • Disable the malware protection engine for the affected devices in Microsoft Defender for Endpoint settings.

Microsoft Security Operations Analyst Associate SC-200
Configure protections and detections
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot