Microsoft Security Operations Analyst Associate SC-200 Practice Question

Your SOC ingests multiple open-source threat intelligence feeds into Microsoft Sentinel by using the Threat intelligence (TI) TAXII data connector. You want Sentinel to raise an incident automatically whenever any newly ingested IP address indicator is later observed in the AzureActivity or AzureDiagnostics tables. Which Sentinel configuration should you create to meet the requirement without writing a custom KQL query?

  • Deploy a scheduled analytics rule based on the built-in TI map (Match threat intelligence indicators to data) template.

  • Enable User and entity behavior analytics (UEBA) and configure anomaly policies for IP entities.

  • Add all IP indicators to a Sentinel watchlist and create alert rules from the watchlist.

  • Rely on the Fusion built-in ML rule to correlate the indicators with Azure platform logs.

Microsoft Security Operations Analyst Associate SC-200
Manage security threats
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot