00:20:00

Microsoft Security Operations Analyst Associate Practice Test (SC-200)

Use the form below to configure your Microsoft Security Operations Analyst Associate Practice Test (SC-200). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for Microsoft Security Operations Analyst Associate SC-200
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

Microsoft Security Operations Analyst Associate SC-200 Information

The Microsoft Security Operations Analyst Associate certification, exam code SC-200, is designed for professionals who monitor, investigate, and respond to security incidents across hybrid and cloud environments. This exam validates the candidate’s ability to use Microsoft Defender, Microsoft Sentinel, and Microsoft 365 Defender to mitigate threats and reduce organizational risk. Preparing with SC-200 practice tests, exam simulations, and practice questions can help test takers strengthen their understanding of security alerts, incident management, and threat hunting—key domains covered in the exam.

SC-200 Practice Tests and Preparation

To pass the SC-200, candidates should become familiar with analyzing threat data, responding to security incidents, and configuring Microsoft security tools. Using Microsoft SC-200 practice exams allows learners to experience real-world scenarios and identify weak areas before sitting for the official test. Many students find that completing practice questions on incident investigation and automated response enhances confidence and helps them retain crucial concepts such as KQL (Kusto Query Language), data connectors, and playbooks in Microsoft Sentinel.

Why Take SC-200 Practice Exams

The Microsoft Security Operations Analyst Associate exam is not just about theory—it tests practical knowledge of security operations in live environments. Regularly using SC-200 practice tests provides exposure to the style and difficulty of Microsoft’s real exam items, ensuring candidates are fully prepared. Whether you’re an aspiring security analyst or already working in cybersecurity, consistent use of practice exams and scenario-based questions can be the difference between a passing score and a retake, making this certification an essential step for anyone pursuing a career in security operations.

Microsoft Security Operations Analyst Associate SC-200 Logo
  • Free Microsoft Security Operations Analyst Associate SC-200 Practice Test

  • 20 Questions
  • Unlimited
  • Manage a security operations environment
    Configure protections and detections
    Manage incident response
    Manage security threats
Question 1 of 20

Your organization uses Microsoft Defender for Cloud Apps together with Microsoft 365. You must ensure that any file containing the phrase "Highly Confidential" that users upload to SharePoint Online or OneDrive for Business is automatically assigned the Confidential sensitivity label, encrypted, and generates an alert for the security team. Which type of Defender for Cloud Apps policy should you configure to meet this requirement?

  • Activity policy

  • Session policy

  • File policy

  • Anomaly detection policy

Question 2 of 20

You manage Microsoft Defender for Cloud Apps for an organization that uses SharePoint Online and OneDrive for Business. Compliance requires that any document uploaded by users that contains a U.S. Social Security number must automatically receive the Confidential sensitivity label so that encryption is enforced. Which Defender for Cloud Apps configuration should you implement to meet the requirement?

  • Create an activity policy that monitors upload events for sensitive information and sends an alert email to administrators.

  • Enable a built-in anomaly detection policy that identifies publicly shared files containing sensitive data and triggers a security investigation.

  • Create a file policy that detects the U.S. Social Security Number sensitivity information type and uses the Apply sensitivity label governance action to assign the Confidential label.

  • Create a session policy that blocks file downloads unless users provide a business justification when sensitive information is detected.

Question 3 of 20

You manage a Microsoft Sentinel workspace. You want to ingest JSON-formatted telemetry from a line-of-business applications by using the Azure Monitor Logs Ingestion API. The data must be stored in a new custom log table named AppEvents_CL within the workspace. Before you can send events to the ingestion endpoint, which Azure resource must you create to satisfy a required prerequisite?

  • A data collection endpoint (DCE) that your data collection rule will reference

  • A workbook template that defines the schema of the AppEvents_CL table

  • A diagnostic setting that routes the application events to the custom table

  • A syslog forwarder configured with the Log Analytics agent

Question 4 of 20

You create a scheduled analytics rule in Microsoft Sentinel that runs the following query every five minutes:

SecurityEvent
| where EventID == 4625
| project TimeGenerated, Computer, TargetUserName, IpAddress

The rule reliably generates incidents, but the resulting incidents show no entities on the investigation graph. You need Microsoft Sentinel to recognize the Computer value as a Host entity and the TargetUserName value as an Account entity so that future incidents are automatically enriched. Which action should you take while editing the analytics rule?

  • Use the Entities mapping section of the rule wizard to map Computer to Host and TargetUserName to Account.

  • Add Computer and TargetUserName as custom incident details in the rule settings.

  • Enable User and Entity Behavior Analytics (UEBA) for the workspace.

  • Turn on alert grouping and choose to group alerts by entity values.

Question 5 of 20

You open the Security recommendations page in Microsoft Defender Vulnerability Management and review a recommendation that has a high exposure reduction potential. You want the Endpoint Protection team, who manage Microsoft Intune, to deploy the required configuration change to all affected Windows devices. Which action should you select for the recommendation in order to create an Intune security task that the team can track and complete?

  • Add exception

  • Request remediation

  • Export to CSV

  • Open a service ticket

Question 6 of 20

Your SOC uses Microsoft Defender XDR with device groups set to the automation level "Semi - require approval for any remediation." An automated investigation runs on a workstation after an alert for suspicious PowerShell activity. The investigation proposes several remediation actions.

Which remediation action will be carried out immediately without waiting for analyst approval?

  • Delete the malicious registry run-key.

  • Collect an investigation package from the device.

  • Quarantine the suspicious PowerShell script file.

  • Place the workstation in full network isolation.

Question 7 of 20

You are configuring a scheduled analytics rule in Microsoft Sentinel that runs a Kusto Query Language (KQL) statement against the SecurityEvent table. The query returns the columns Account, Computer, and SrcIpAddr. When the rule raises an incident, you want the investigation graph to automatically show the related user, host, and IP address so other alerts can be correlated. Which configuration should you apply to the rule to meet this requirement?

  • Edit the corresponding data connector and configure Connected Data Sources field mapping for user, host, and IP fields.

  • Enable Entity Behavior Analytics (UEBA) in Microsoft Sentinel and associate the rule with the UEBA module.

  • Attach an automation playbook that enriches the incident with user, host, and IP information after the alert is generated.

  • In the analytics rule wizard, map the query's Account, Computer, and SrcIpAddr columns to the Account, Host, and IP entity types in the Entities section.

Question 8 of 20

You create a vulnerability notification rule in Microsoft Defender XDR so that your SecOps mailbox receives only high-risk vulnerability announcements for workstations in the Finance device group. The notifications must arrive once per day instead of every time a new matching CVE is discovered. In the New vulnerability notification rule wizard, which configuration accomplishes this requirement?

  • Turn off the option Send one email per alert.

  • Enable Exploitation status = Exploited in the wild.

  • Set Frequency to Daily.

  • Select the High and Critical severity levels.

Question 9 of 20

You need to give a group of SecOps analysts the ability to query Microsoft Sentinel incidents through Microsoft Security Copilot so they can include incident details in their investigations. The analysts already have the Security Copilot User role. Which additional action should you take to enable this capability?

  • Assign the Azure OpenAI User role to the analysts in the Azure subscription.

  • Create an Automation rule in Microsoft Sentinel that triggers a Security Copilot playbook.

  • Add all Microsoft Sentinel data connectors in the Security Copilot portal and grant Microsoft Graph Security Reader API permissions.

  • Assign the Microsoft Sentinel Reader role on the workspace that contains the incidents.

Question 10 of 20

While reviewing a Threat analytics report about a newly discovered zero-day vulnerability in the Microsoft Defender portal, you need to determine which of your organization's devices are currently vulnerable and export that list for remediation. Which action should you take in the Threat analytics article to accomplish this task?

  • Open the Mitigation tab and choose Download recommendations.

  • Select the View impacted devices link in the Exposure section.

  • Go to the References tab and export the CVE list.

  • Expand the Summary section and click View all incidents.

Question 11 of 20

Your organization has a device group named CriticalServers in Microsoft Defender XDR. You must ensure that the SOC receives an email each time an alert with a severity of High or above is raised on any device in that group, while suppressing notifications for Medium and Low alerts. Which configuration should you create to meet the requirement?

  • Create a vulnerability notification rule that filters on CVSS severity High and targets the CriticalServers device group.

  • Create an alert notification rule scoped to the CriticalServers device group with a minimum alert severity of High.

  • Build a scheduled hunting query in Microsoft Sentinel that looks for High-severity alerts on CriticalServers and sends an action-group email.

  • Create an incident notification rule with a minimum incident severity of High and no additional filters.

Question 12 of 20

While triaging a malware alert in Microsoft Defender for Endpoint, you open the device timeline for the affected Windows 11 workstation. You must quickly locate every event where a registry value was changed on the device during the last two weeks so you can determine whether the malware modified Run-key startup entries. Which action should you take in the device timeline pane to accomplish this task with the least amount of effort?

  • Scroll through the timeline manually and mark every registry event with the Add to evidence command.

  • Export the timeline to CSV and search the file for registry events by using a spreadsheet filter.

  • Apply an Advanced filter that specifies Action type equals Registry value set and limits the date range to the last 14 days.

  • Start a Live Response session and run a registry command to enumerate Run-key entries.

Question 13 of 20

While reviewing an incident in the Microsoft Defender portal, you notice that the file "contoso.exe" appears in the Evidence tab with a suspicious verdict. You must quickly learn how many devices have encountered this file during the last 30 days and whether it is common in your organization. Which action should you take from within the incident to obtain this information with the fewest steps?

  • Open the primary affected device's page, select Timeline, and filter events for contoso.exe over the last 30 days.

  • In the incident's Evidence tab, select contoso.exe and choose Open file page to view its prevalence details.

  • Run an advanced hunting query in Microsoft Sentinel that searches all FileEvent records for contoso.exe across the past month.

  • Switch to the incident's Graph view, expand the file node, and review the connected entities for device counts.

Question 14 of 20

You need to collect AWS GuardDuty findings and VPC Flow Logs from your company's Amazon Web Services (AWS) accounts into Microsoft Sentinel. Which built-in data connector should you configure in the Microsoft Sentinel portal to meet this requirement with the least administrative effort?

  • Common Event Format (CEF) Syslog data connector

  • Amazon Web Services (AWS) S3 data connector

  • Azure Activity data connector

  • Custom log (HTTP API) data connector

Question 15 of 20

Your organization uses Microsoft Purview Insider Risk Management. A security operations analyst opens a high-severity insider risk alert in the Microsoft Defender portal but cannot preview the SharePoint documents that triggered the alert; the viewer displays "Preview not available." You must ensure the analyst can see full file and email content during future investigations without giving unnecessary additional rights. Which role group should you assign to the analyst?

  • Compliance Data Administrator

  • Insider Risk Management Investigators

  • Insider Risk Management Analysts

  • eDiscovery Manager

Question 16 of 20

You are creating a custom Microsoft Sentinel workbook that must work in any Sentinel-enabled Log Analytics workspace without editing the query each time the workbook is imported. You add a query control and need the Kusto Query Language (KQL) query to refer to the workspace that the workbook is currently connected to. Which KQL construct should you use to make the query automatically scope to the active workspace when the workbook runs?

  • workspace('Contoso-Sentinel')

  • workspaceGuid()

  • workspaces(Guid1, Guid2)

  • workspace()

Question 17 of 20

A security operations center (SOC) engineer must be able to create, edit, enable, and disable automation rules in Microsoft Sentinel and troubleshoot playbook executions that those rules trigger. The engineer must not be able to view raw log data, modify analytics rules, or change resource-level access control. You need to assign the minimum built-in Azure role at the Sentinel workspace scope to meet these requirements.

Which role should you assign?

  • Microsoft Sentinel Automation Contributor

  • Logic App Contributor

  • Microsoft Sentinel Responder

  • Microsoft Sentinel Contributor

Question 18 of 20

While authoring a scheduled analytics rule in Microsoft Sentinel, you need to prevent incident sprawl by ensuring that every alert produced during a one-hour window is grouped into a single incident, even if different hosts or accounts are involved. Which of the following alert-grouping options should you select in the rule wizard to meet the requirement?

  • Inherit the alert grouping configuration from the rule's template

  • Disable alert grouping so that each alert becomes a separate incident

  • Group alerts into a single incident when the selected entities match

  • Group all alerts triggered by this rule into a single incident

Question 19 of 20

You manage Microsoft Defender XDR for your company. Security leadership wants to receive an email whenever Microsoft Defender Vulnerability Management first detects a new high-severity CVE on any onboarded device. In the Microsoft 365 Defender portal you browse to Settings → Microsoft Defender XDR → Email notifications and select + Add notification rule. Which notification rule type should you choose to meet the requirement?

  • Alert

  • Remediation progress

  • Vulnerability

  • Threat analytics

Question 20 of 20

Your Microsoft Defender for Endpoint tenant contains two device groups named Workstations and Servers.

  • All threats detected on workstations must be remediated automatically without analyst approval.
  • Remediation actions on servers must always require analyst approval, regardless of file location.
    Which change should you make to meet these requirements?
  • Set the Workstations device group to Full - remediate threats automatically and the Servers device group to Semi - require approval for all folders.

  • Set the Workstations device group to Semi - require approval for non-temp folders and the Servers device group to Semi - require approval for core folders.

  • Set the Workstations device group to Semi - require approval for all folders and the Servers device group to Full - remediate threats automatically.

  • Enable automatic attack disruption for Workstations and assign the Security Operator role to all server administrators.