Microsoft Security Operations Analyst Associate SC-200 Practice Question

Your organization must ingest JSON events from a proprietary security appliance into Microsoft Sentinel. The device can send HTTPS POST requests, so you decide to use the Azure Monitor HTTP Data Collector API with the Log-Type header set to SecurityAppliance. Before the appliance starts sending data, what action must you take in the Log Analytics workspace to ensure that events land in the SecurityAppliance_CL table and are queryable?

  • Manually add SecurityAppliance_CL and define its columns in the Tables blade before any data is sent.

  • Install the Azure Monitor agent on the appliance and associate it with a data collection rule targeting SecurityAppliance_CL.

  • No preparation is required; the first successful POST automatically creates the SecurityAppliance_CL table with an inferred schema.

  • Create an analytics rule in Microsoft Sentinel that references SecurityAppliance_CL; the table is created when the rule is saved.

Microsoft Security Operations Analyst Associate SC-200
Manage a security operations environment
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot