Microsoft Security Operations Analyst Associate SC-200 Practice Question

Your organization uses Microsoft Sentinel to monitor three Azure subscriptions. A scheduled query analytics rule that detects suspicious PowerShell activity is producing many incidents, all from the development subscription named "SubDev." You must stop this rule from generating incidents for SubDev while still creating incidents for the two production subscriptions. The change must apply only to this rule and not affect others. What should you do?

  • Configure an incident suppression rule and set a scope condition that matches SubscriptionId = "SubDev".

  • Change the rule's alert grouping settings to group by SubscriptionId and enable suppression for the group that equals "SubDev".

  • Create an automation rule that automatically closes any incident the analytics rule raises when the SubscriptionId is "SubDev".

  • Edit the analytics rule's KQL query and add a filter that excludes records where SubscriptionId equals "SubDev".

Microsoft Security Operations Analyst Associate SC-200
Configure protections and detections
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot