Microsoft Security Operations Analyst Associate Practice Test (SC-200)
Use the form below to configure your Microsoft Security Operations Analyst Associate Practice Test (SC-200). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Security Operations Analyst Associate SC-200 Information
The Microsoft Security Operations Analyst Associate certification, exam code SC-200, is designed for professionals who monitor, investigate, and respond to security incidents across hybrid and cloud environments. This exam validates the candidate’s ability to use Microsoft Defender, Microsoft Sentinel, and Microsoft 365 Defender to mitigate threats and reduce organizational risk. Preparing with SC-200 practice tests, exam simulations, and practice questions can help test takers strengthen their understanding of security alerts, incident management, and threat hunting—key domains covered in the exam.
SC-200 Practice Tests and Preparation
To pass the SC-200, candidates should become familiar with analyzing threat data, responding to security incidents, and configuring Microsoft security tools. Using Microsoft SC-200 practice exams allows learners to experience real-world scenarios and identify weak areas before sitting for the official test. Many students find that completing practice questions on incident investigation and automated response enhances confidence and helps them retain crucial concepts such as KQL (Kusto Query Language), data connectors, and playbooks in Microsoft Sentinel.
Why Take SC-200 Practice Exams
The Microsoft Security Operations Analyst Associate exam is not just about theory—it tests practical knowledge of security operations in live environments. Regularly using SC-200 practice tests provides exposure to the style and difficulty of Microsoft’s real exam items, ensuring candidates are fully prepared. Whether you’re an aspiring security analyst or already working in cybersecurity, consistent use of practice exams and scenario-based questions can be the difference between a passing score and a retake, making this certification an essential step for anyone pursuing a career in security operations.

Free Microsoft Security Operations Analyst Associate SC-200 Practice Test
- 20 Questions
- Unlimited
- Manage a security operations environmentConfigure protections and detectionsManage incident responseManage security threats
You are creating a scheduled query analytics rule in Microsoft Sentinel that returns firewall events. The query result includes a column named src_ip that contains the source IPv4 address for each event. You need Microsoft Sentinel to recognize those values as IP entities so that any future incidents created by the rule display the Entity page and benefit from UEBA enrichment. What should you configure in the analytics rule before saving it?
Define a data transformation in Log Analytics that renames the src_ip column to SourceNetworkAddress before the rule runs.
Enable the "Automatically extract host information" option in the incident settings of the workspace.
Create a Logic App playbook that calls the Sentinel Entities REST API to submit the src_ip value as an entity.
Add an entity mapping that maps the src_ip column to the IP entity type with the field name Address.
Answer Description
Microsoft Sentinel can only recognize data in a query result as entities when you explicitly map the relevant columns to one of the supported entity types during rule creation. In the Set rule logic step, you can add an entity mapping and choose the entity type (such as IP) and then specify which column in the query output contains the corresponding value. For the IP entity type, the required field is Address. Mapping the src_ip column to the IP entity's Address field ensures each matching value is treated as an IP entity, unlocking entity pages, graphs, and UEBA insights for incidents generated by the rule. The other options do not achieve this: a playbook would run only after an alert is created, data transformations in Log Analytics do not automatically apply entity semantics, and there is no workspace-level "Automatically extract host information" setting for entity detection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is entity mapping in Microsoft Sentinel?
What is UEBA enrichment in Microsoft Sentinel?
How does entity mapping differ from data transformations in Log Analytics?
Your organization uses Microsoft Sentinel to monitor three Azure subscriptions. A scheduled query analytics rule that detects suspicious PowerShell activity is producing many incidents, all from the development subscription named "SubDev." You must stop this rule from generating incidents for SubDev while still creating incidents for the two production subscriptions. The change must apply only to this rule and not affect others. What should you do?
Configure an incident suppression rule and set a scope condition that matches SubscriptionId = "SubDev".
Edit the analytics rule's KQL query and add a filter that excludes records where SubscriptionId equals "SubDev".
Create an automation rule that automatically closes any incident the analytics rule raises when the SubscriptionId is "SubDev".
Change the rule's alert grouping settings to group by SubscriptionId and enable suppression for the group that equals "SubDev".
Answer Description
For a scheduled query analytics rule, the most direct way to stop unwanted incidents for a particular source is to refine the rule's Kusto Query Language (KQL) statement. Adding a filter such as | where SubscriptionId != "SubDev" removes events from the development subscription before the rule evaluates its alert logic, so no alerts-or incidents-are produced for that subscription while the rule continues to run normally for the other subscriptions.
Creating an automation rule or playbook that closes incidents after they are raised does not prevent the alerts or incidents from being generated in the first place, so it does not meet the requirement to avoid creation. Microsoft Sentinel does not have an "incident suppression rule" or an alert-grouping setting that can selectively suppress incidents by subscription within a single rule; grouping only affects how incidents are consolidated, not whether they are created. Therefore, modifying the KQL query is the correct and most efficient approach.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is KQL and why is it relevant in this scenario?
What is the difference between analytics rules and automation rules in Microsoft Sentinel?
Why can't incident suppression rules or alert grouping be used in this case?
Your organization must ingest JSON events from a proprietary security appliance into Microsoft Sentinel. The device can send HTTPS POST requests, so you decide to use the Azure Monitor HTTP Data Collector API with the Log-Type header set to SecurityAppliance. Before the appliance starts sending data, what action must you take in the Log Analytics workspace to ensure that events land in the SecurityAppliance_CL table and are queryable?
Install the Azure Monitor agent on the appliance and associate it with a data collection rule targeting SecurityAppliance_CL.
No preparation is required; the first successful POST automatically creates the SecurityAppliance_CL table with an inferred schema.
Create an analytics rule in Microsoft Sentinel that references SecurityAppliance_CL; the table is created when the rule is saved.
Manually add SecurityAppliance_CL and define its columns in the Tables blade before any data is sent.
Answer Description
The Data Collector API automatically creates a custom log table the first time it receives data that uses a previously unseen Log-Type value. Therefore, you do not need to pre-create SecurityAppliance_CL, deploy an agent, or configure analytics rules. Once the first POST succeeds, the table is created and populated, and its columns are inferred from the JSON properties.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does the Azure Monitor HTTP Data Collector API infer the schema of the custom log table?
What is the purpose of the Log-Type header in the HTTPS POST request?
What are the benefits of using the Data Collector API for ingesting security-related data?
You suspect that an attacker created a hidden email forwarding rule on the mailbox of user Lee Gu. You open the Microsoft Purview compliance portal and start a search of the unified audit log limited to Lee's mailbox and the last 24 hours. To return only events where a new mailbox rule was created, which Operation value should you specify in the search query?
New-InboxRule
UpdateInboxRules
Add-MailboxPermission
Set-InboxRule
Answer Description
In the unified audit log, Exchange Online records the creation of a new inbox (mailbox) rule with the Operation value "New-InboxRule". Filtering the search on this operation returns only events where a rule was added. Similar-sounding values such as "Set-InboxRule" (rule changes), "Add-MailboxPermission" (permission changes), and "UpdateInboxRules" are different operations and will not match the activity of creating a new rule.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the unified audit log in Microsoft Purview Compliance Portal?
What happens when you specify 'New-InboxRule' in the unified audit log?
Why wouldn't 'Set-InboxRule' or 'UpdateInboxRules' work for detecting new mailbox rules?
A security analyst is reviewing a high-severity alert in the Microsoft 365 Defender portal that was generated by a Microsoft Purview insider risk policy for potential data exfiltration. The analyst must determine exactly which files the user copied to a personal cloud storage location and preserve the evidence for possible legal review without alerting the user. Which action should the analyst perform first?
Create an eDiscovery (Premium) hold from the alert to add the content to a new case.
Publish a Microsoft Purview retention policy that retains all OneDrive files for the user for seven years.
Disable the user's account in Microsoft Entra ID and reset the password.
Run an immediate Microsoft Purview content search scoped to the user's OneDrive and download the results.
Answer Description
When an insider risk alert is opened in the Microsoft 365 Defender portal, selecting Create an eDiscovery (Premium) hold from the alert allows the analyst to immediately preserve the exact files, their versions, and related audit information in a dedicated eDiscovery case. This protects the evidence from alteration or deletion and keeps the user unaware of the investigation. Creating a retention policy, disabling the user account, or running a content search would not automatically place the items on legal hold and therefore would not guarantee evidence preservation at the required forensic standard.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is eDiscovery (Premium) hold in Microsoft 365 Defender?
Why is an insider risk policy useful in identifying potential data exfiltration?
What is the difference between a retention policy and an eDiscovery hold?
While triaging a multi-stage attack, you open the incident record in Microsoft Defender XDR and launch Microsoft Security Copilot. You type the prompt "Investigate incident 2425 and summarize findings." Which outcome should you expect Security Copilot to return?
A natural-language summary of the timeline, impacted assets, attacker techniques, and recommended remediation steps for the incident.
Creation and deployment of a new custom detection rule in Microsoft Defender for Endpoint without further analyst input.
Immediate isolation of every device linked to the incident through live response commands executed by Copilot.
Automatic closure of the incident and all associated alerts if Copilot determines no active threat remains.
Answer Description
When an analyst asks Security Copilot to investigate a Defender XDR incident, Copilot analyzes all related alerts and evidence, then provides a natural-language summary that includes the incident timeline, impacted assets, observed attacker techniques, and recommended mitigation steps. Copilot does not automatically close the incident, quarantine devices, or create new detection rules; those actions still require explicit analyst decisions or playbook automation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Security Copilot?
How does Microsoft Defender XDR differ from Security Copilot?
What happens if Security Copilot determines no active threat remains?
You are configuring a scheduled analytics rule in Microsoft Sentinel that runs a Kusto Query Language (KQL) statement against the SecurityEvent table. The query returns the columns Account, Computer, and SrcIpAddr. When the rule raises an incident, you want the investigation graph to automatically show the related user, host, and IP address so other alerts can be correlated. Which configuration should you apply to the rule to meet this requirement?
Enable Entity Behavior Analytics (UEBA) in Microsoft Sentinel and associate the rule with the UEBA module.
In the analytics rule wizard, map the query's Account, Computer, and SrcIpAddr columns to the Account, Host, and IP entity types in the Entities section.
Attach an automation playbook that enriches the incident with user, host, and IP information after the alert is generated.
Edit the corresponding data connector and configure Connected Data Sources field mapping for user, host, and IP fields.
Answer Description
Microsoft Sentinel displays entities such as accounts, hosts, and IP addresses in the incident investigation graph only when the analytics rule explicitly maps the query's result columns to Sentinel's built-in entity types. This is done in the Entities (entity mapping) section of the rule wizard, where you specify which query column represents each entity-for example, map Account to Account, Computer to Host, and SrcIpAddr to IP. Simply enabling Entity Behavior Analytics, adding playbooks, or configuring field mappings in a data connector does not cause incidents from this specific rule to include entities because those settings do not create the required per-rule entity bindings.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is entity mapping in Microsoft Sentinel?
What is the role of KQL in analytics rules in Microsoft Sentinel?
What is the purpose of the investigation graph in Microsoft Sentinel?
You need Microsoft Sentinel to receive detailed Azure Policy compliance and evaluation information from all existing subscriptions in your tenant. What should you do first to ensure that data is ingested into the Log Analytics workspace that Sentinel uses?
Assign the Security Administrator (Security Admin) role to the Log Analytics workspace so it can read policy resources.
Create a diagnostic setting on every subscription that routes the Microsoft.PolicyInsights log categories to the Sentinel workspace.
Deploy the built-in Azure Policy initiative that installs the Azure Policy data connector solution in all workspaces.
Enable a data collection rule in Microsoft Sentinel that targets the subscriptions and selects the Azure Policy data source.
Answer Description
The Azure Policy data connector relies on Azure Monitor diagnostic settings to stream PolicyInsights logs. Until a diagnostic setting is created on each subscription (or managed centrally at the tenant root) that sends the PolicyInsights log categories to the Log Analytics workspace connected to Microsoft Sentinel, no compliance or evaluation data reaches the workspace. Assigning Azure Policy initiatives, adding Sentinel solutions, or enabling data collection rules do not by themselves transmit the logs; they act on data only after it has been forwarded.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Microsoft.PolicyInsights log category and why is it important?
How do diagnostic settings work in Azure Monitor?
What is a Log Analytics workspace in Microsoft Sentinel?
You are building an automation workflow to run automatically every time Microsoft Sentinel generates a new incident from an analytics rule. In the Logic Apps designer, which trigger must you select so the playbook can be attached to an automation rule that runs on incident creation?
When a response to an Azure Sentinel alert is triggered
Recurrence
When an HTTP request is received
When a response to an Azure Sentinel incident is triggered
Answer Description
A playbook that should run when Microsoft Sentinel creates a new incident must start with the dedicated incident trigger provided by the Microsoft Sentinel connector. The trigger named "When a response to an Azure Sentinel incident is triggered" (sometimes shown as "Microsoft Sentinel incident") is specifically designed to be called from an automation rule on incident creation. The older alert-level trigger ("When a response to an Azure Sentinel alert is triggered") only works for alert automation, and generic Logic App triggers such as "Recurrence" or "When an HTTP request is received" do not integrate with Sentinel automation rules without additional configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Sentinel?
What is the difference between an incident and an alert in Microsoft Sentinel?
How does the 'When a response to an Azure Sentinel incident is triggered' Logic App trigger work?
You ran a Content search named Phish-001 in the Microsoft Purview compliance portal and found about 1,200 Exchange Online messages that contain a known malicious URL. You must immediately remove every message from user mailboxes while allowing administrators to recover the items later. In the search results pane, which action should you take?
Select Export results and include unredacted items.
Select Purge and specify the Soft delete option.
Select Export report and download the detailed CSV.
Select Save as policy to create a new retention policy that deletes the messages.
Answer Description
Selecting Purge with the Soft delete option starts a purge action (New-ComplianceSearchAction -Purge -PurgeType SoftDelete) that moves each message to the Deletions sub-folder of the Recoverable Items folder. Users cannot access the item, but administrators can restore it by using eDiscovery or mailbox-restore tools if further investigation is required. Exporting results or reports only produces copies of the data and leaves the originals in the mailboxes. Creating a retention policy does not retroactively delete already-sent messages and therefore will not remove the malicious email identified by the Content search.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Purview compliance portal?
What is Soft delete in Content Search Purge?
How is Purge different from Export in a Content Search?
While reviewing the OAuth apps page in Microsoft Defender for Cloud Apps, you find a third-party application that has a high risk score and already has access tokens for several users. You must immediately block any further user consent to this app and invalidate the access tokens that were already issued. Which governance action in Defender for Cloud Apps should you apply to the app to meet these requirements?
Apply the ban governance action to the application
Quarantine every user that granted consent to the application
Mark the application as unsanctioned in Cloud Discovery
Create a Conditional Access policy that requires multifactor authentication for the application
Answer Description
Applying the ban governance action to an OAuth application in Microsoft Defender for Cloud Apps performs two tasks required in this scenario. First, it revokes the existing OAuth refresh tokens that users have previously granted, so the app can no longer access Microsoft 365 data with those tokens. Second, it prevents any additional users in the tenant from granting the application consent in the future. Marking the app as unsanctioned only helps with Shadow IT discovery traffic and does not touch OAuth tokens or consent. Quarantining users is not an available governance action for OAuth apps, and Conditional Access cannot retroactively revoke existing tokens or by itself stop other users from consenting. Therefore, banning the app is the correct remediation step.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an OAuth app in Microsoft Defender for Cloud Apps?
What happens when an app is banned in Microsoft Defender for Cloud Apps?
How does marking an app as unsanctioned differ from banning an app in MCAS?
Your organization has deployed Microsoft Security Copilot (preview) by adding its enterprise application to Microsoft Entra ID. You must give members of the Security Operations Center the ability to ask questions, upload investigation data, and create or run promptbooks in Security Copilot, but they must not be allowed to manage plugins, change workspace settings, or assign access to other users. Which built-in application role should you assign to the SOC group in the Security Copilot enterprise application?
Security Copilot Responder
Security Copilot Reader
Security Copilot Administrator
Security Copilot Contributor
Answer Description
Security Copilot provides four built-in application roles that can be assigned in Microsoft Entra ID:
- Security Copilot Administrator - full control, including managing settings, plugins, and access assignments.
- Security Copilot Contributor - can interact with Copilot, upload data, and create or run promptbooks, but cannot manage plugins, workspace settings, or role assignments.
- Security Copilot Responder - can run prompts and view responses but cannot create promptbooks.
- Security Copilot Reader - can only view existing content.
Because the SOC analysts need to create and run promptbooks and upload investigation data, they require more than Reader or Responder rights. However, they must be prevented from tenant-level administration, so the Administrator role is too permissive. The Contributor role meets all requirements without granting unnecessary administrative privileges, making it the correct choice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a promptbook in Microsoft Security Copilot?
How does the Security Copilot Contributor role differ from the Responder role?
Why is the Administrator role not suitable for SOC analysts?
You are investigating a multi-stage incident in Microsoft Sentinel. To understand how the different alerts, entities, and evidence relate to each other, you want an automatically generated visual map that you can explore directly from the incident record without writing KQL. Which Microsoft Sentinel feature should you use?
Investigation graph
Logs query timechart view
Threat intelligence blade
Livestream session
Answer Description
The Investigation graph (also called the investigation map) is opened directly from an incident in Microsoft Sentinel. It automatically lays out all alerts, entities, and supporting evidence, and lets you expand or pivot on nodes to follow the attack path without running any queries. Livestream, Threat intelligence, and the Query timechart view do not create an entity-centric visual map of the incident.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the primary function of the Investigation graph in Microsoft Sentinel?
How does the Investigation graph differ from the Livestream feature in Microsoft Sentinel?
What types of insights can analysts gain by using an Investigation graph in Microsoft Sentinel?
You manage Microsoft Defender XDR for your organization. You need to prevent ransomware from spreading if Microsoft Defender XDR detects hands-on-keyboard activity during an ongoing attack. Which configuration must you verify so that automatic attack disruption can immediately contain the compromised device?
EDR in block mode is enabled on all endpoints.
Defender SmartScreen is enforced by Microsoft Edge group policy.
The device is listed as an unmonitored resource in Microsoft Defender for Cloud.
The device is fully onboarded and reporting to Microsoft Defender for Endpoint.
Answer Description
Automatic attack disruption can isolate a device only when that device is fully onboarded and actively reporting to Microsoft Defender for Endpoint. Features such as EDR in block mode or Microsoft Edge Defender SmartScreen can provide additional protections, but they are not required for the immediate containment action. Devices that are merely identified as unmonitored resources in Defender for Cloud cannot be isolated because they are not managed by Microsoft Defender for Endpoint.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'fully onboarded' mean in Microsoft Defender for Endpoint?
What is EDR in block mode and why is it not required for automatic attack disruption?
What is Defender SmartScreen in Microsoft Edge, and why doesn't it impact device isolation?
You need Microsoft Sentinel to raise an alert whenever a user's count of failed sign-ins during one hour is statistically higher than the user's own historical pattern. You create a new analytics rule and write a Kusto query that returns the failed sign-in events with the Username field mapped to the Account entity. Which rule type should you select in the wizard to automatically apply time-series anomaly detection without having to set a fixed threshold?
Machine learning (preview)
Fusion (advanced multistage attack detection)
Scheduled query
Anomaly
Answer Description
To compare each user's current activity to that same user's historical baseline, you must use the Anomaly rule type in Microsoft Sentinel. An Anomaly rule applies Sentinel's built-in time-series behavioral analytics models to the query's result set, learning normal patterns per entity (such as an individual account) and raising alerts only when the current value significantly deviates from the learned baseline. Scheduled query rules use static or dynamic thresholds that you configure manually, and Fusion or Machine learning rules do not support custom Kusto queries.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Kusto Query Language (KQL)?
How does Microsoft Sentinel use time-series anomaly detection?
What is the difference between Anomaly rules and Scheduled query rules in Microsoft Sentinel?
You are editing the built-in Identity & Access Investigation workbook in Microsoft Sentinel. After adding a custom KQL query, you need the modified workbook to be visible and editable to other analysts who have Workbook Contributor rights on the same Azure resource group. Which action should you take to save and share the workbook correctly?
Select Save as, choose Save to Azure, and store the workbook in the Microsoft Sentinel resource group.
Export the workbook as an ARM template and distribute the JSON file to other analysts by email.
Publish the workbook to your My Workbooks gallery so colleagues can import it from there.
Select Save to overwrite the existing workbook; it will automatically become shared.
Answer Description
To make a customized workbook available to everyone with appropriate Azure RBAC permissions, you must save it as an Azure-hosted workbook within the Sentinel resource group. Selecting Save as, choosing Save to Azure, and specifying the Sentinel resource group stores the workbook as an ARM resource that is accessible and editable by other users in that group. Simply selecting Save keeps the workbook in your personal workspace; exporting an ARM template or publishing to My Workbooks does not automatically share it with the team.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is KQL in Microsoft Sentinel?
What is Azure RBAC in Microsoft Sentinel?
What is a Microsoft Sentinel Workbook?
You are building a custom workbook in Microsoft Sentinel to help analysts hunt for lateral-movement activity. The workbook must let analysts choose any start and end date so that every Kusto Query Language (KQL) query in the workbook automatically runs only against data in that selected period. Which action should you perform to meet this requirement?
Enable cross-visual filtering in the workbook's Advanced Settings pane.
Insert a Time range parameter and reference it in each query with the
{{TimeRange}}binding.Create a query-based drop-down parameter that sets the default log analytics workspace.
Configure the workbook to inherit the global time range from Azure Monitor dashboards.
Answer Description
Workbooks in Microsoft Sentinel support parameters that can be bound to all queries in the workbook. Adding a Time range parameter (often inserted by selecting Add parameter and choosing Time range) exposes a picker for analysts to set start and end times. When each query references the parameter by using the {{TimeRange}} or similar binding syntax, Sentinel automatically appends the chosen time filter to every query, ensuring that results are limited to the selected period. Other options-such as creating a workspace selector, enabling cross-visual filtering, or relying on Azure Monitor dashboard settings-do not propagate a time filter to every workbook query by default.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is KQL (Kusto Query Language)?
How do parameters like {{TimeRange}} work in Microsoft Sentinel workbooks?
What are the benefits of using custom workbooks in Microsoft Sentinel?
Your Azure subscription contains a resource group named RG-SecOps. Microsoft Sentinel is enabled on a Log Analytics workspace named SecWork located in RG-SecOps. A security operations (SOC) team named Tier1 must be able to:
- View and investigate all incidents in Microsoft Sentinel.
- Change an incident's status, owner, or severity.
- Manually run existing playbooks that are attached to incidents. The team must NOT be able to edit analytics rules, onboard new data connectors, or change Microsoft Sentinel settings. Which Azure RBAC role assignment provides Tier1 with the least-privilege access required to meet the requirements?
Assign the Microsoft Sentinel Contributor role on the SecWork workspace.
Assign the Microsoft Sentinel Responder role on the SecWork workspace and the Logic App Contributor role on RG-SecOps.
Assign the Azure Contributor role on RG-SecOps.
Assign the Microsoft Sentinel Reader role on the SecWork workspace.
Answer Description
The Microsoft Sentinel Responder role allows analysts to view incidents and make basic changes such as updating status, owner, severity, and adding comments or tags. It does not permit modification of analytics rules or connector configurations. To manually run an existing playbook that is linked to an incident, the analyst also needs permission to execute the Logic App. The Logic App Contributor role on the resource group that hosts the playbook grants that permission without allowing the user to create or delete other Azure resources. The other options either do not provide the ability to update incidents or run playbooks (Reader), grant greater-than-necessary privileges to Sentinel configuration (Sentinel Contributor or Azure Contributor), or fail to provide playbook execution rights.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Microsoft Sentinel Responder role and why is it key for SOC teams?
What does the Logic App Contributor role allow, and why is it needed to run playbooks?
What are the risks of assigning broader roles, such as Sentinel Contributor or Azure Contributor?
You are designing a Microsoft Sentinel deployment. Your organization must keep Azure Firewall logs for 24 months to satisfy regulatory requirements and wants to minimize storage costs. Analysts need to run interactive Kusto queries against the most recent 30 days of firewall data; older data will be accessed only occasionally. Which configuration should you apply to the Azure Monitor Logs workspace that stores the Sentinel data?
Set a per-table retention period of 730 days in the Analytics tier and leave the archive tier disabled.
Configure the table to retain 30 days in the Analytics tier and add a data archive rule that stores the next 720 days in the archive tier.
Change the table to use the Basic Logs plan and configure a 730-day retention period.
Export the Azure Firewall logs to an Azure Storage account through diagnostic settings and delete them from Microsoft Sentinel.
Answer Description
Using a per-table data lifecycle configuration that keeps data in the default (Analytics) tier for 30 days and then automatically moves it to the archive tier for the remaining 720 days satisfies both requirements. The first 30 days remain in hot storage for fast, interactive querying, while the two-year archive tier keeps the data at a much lower cost that still allows on-demand search or restore when needed.
Keeping 730 days in the Analytics tier meets retention goals but is the most expensive option. Basic Logs cannot retain data longer than eight days, so it cannot meet the 24-month mandate. Exporting logs to an external storage account removes them from Sentinel's query experience and requires additional tooling to access the data, failing the requirement for occasional in-product access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Analytics tier in Azure Monitor Logs?
What is the archive tier in Azure Monitor Logs?
What is a data lifecycle configuration in Azure Monitor Logs?
You deployed Microsoft Defender for Cloud Apps (MDCA) and connected it to Microsoft 365. Compliance requires that users must be stopped during a download if the SharePoint Online file they request carries the Confidential sensitivity label. The users should also see a notification that explains why the download is blocked. Which MDCA policy type and control should you configure to meet this requirement?
Create an activity policy that sends an alert email when a Confidential file is downloaded from SharePoint Online.
Create an anomaly detection policy for potential data exfiltration and configure it to suspend user sessions when triggered.
Create a file policy that applies the Remove sharing governance action when a file is labeled Confidential.
Create a session policy that uses the Block download (with custom message) control and targets files whose sensitivity label is Confidential.
Answer Description
Real-time inspection of traffic to and from a cloud app is achieved in MDCA through session policies, which rely on Conditional Access App Control. A session policy can examine each download request as it happens and, based on file attributes such as Microsoft Purview sensitivity labels, enforce controls like Block download (with custom message). File or activity policies act after the operation is complete, and anomaly detection policies are intended for behavioral analytics, so none of them can stop the download in real time or present an immediate block message.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Conditional Access App Control?
How do session policies in MDCA differ from file or activity policies?
What is the purpose of sensitivity labels in Microsoft Purview?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.