Microsoft Security Operations Analyst Associate SC-200 Practice Question

Your organization ingests alerts from Microsoft Defender for Endpoint and Azure Active Directory Identity Protection into Microsoft Sentinel. You must automatically correlate related alerts from these sources into a single incident that represents a multistage attack. When creating the analytics rule, which rule type should you choose, and what prerequisite must be satisfied for the rule to work?

  • Machine-learning behavior analytics rule; turn on User and Entity Behavior Analytics (UEBA) in the Settings page.

  • Fusion rule template; ensure that at least one supported Microsoft security data connector (such as Microsoft Defender for Endpoint or Azure AD Identity Protection) is enabled in the workspace.

  • Scheduled rule; configure alert grouping to Correlate alerts across subscriptions before saving the rule.

  • Microsoft incident creation rule; verify that the Log Analytics workspace is hosted in an Azure region that supports the Microsoft Security Graph.

Microsoft Security Operations Analyst Associate SC-200
Configure protections and detections
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot