🔥 40% Off Crucial Exams Memberships — This Week Only

3 days, 14 hours remaining!
00:20:00

Microsoft Security Operations Analyst Associate Practice Test (SC-200)

Use the form below to configure your Microsoft Security Operations Analyst Associate Practice Test (SC-200). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for Microsoft Security Operations Analyst Associate SC-200
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

Microsoft Security Operations Analyst Associate SC-200 Information

The Microsoft Security Operations Analyst Associate certification, exam code SC-200, is designed for professionals who monitor, investigate, and respond to security incidents across hybrid and cloud environments. This exam validates the candidate’s ability to use Microsoft Defender, Microsoft Sentinel, and Microsoft 365 Defender to mitigate threats and reduce organizational risk. Preparing with SC-200 practice tests, exam simulations, and practice questions can help test takers strengthen their understanding of security alerts, incident management, and threat hunting—key domains covered in the exam.

SC-200 Practice Tests and Preparation

To pass the SC-200, candidates should become familiar with analyzing threat data, responding to security incidents, and configuring Microsoft security tools. Using Microsoft SC-200 practice exams allows learners to experience real-world scenarios and identify weak areas before sitting for the official test. Many students find that completing practice questions on incident investigation and automated response enhances confidence and helps them retain crucial concepts such as KQL (Kusto Query Language), data connectors, and playbooks in Microsoft Sentinel.

Why Take SC-200 Practice Exams

The Microsoft Security Operations Analyst Associate exam is not just about theory—it tests practical knowledge of security operations in live environments. Regularly using SC-200 practice tests provides exposure to the style and difficulty of Microsoft’s real exam items, ensuring candidates are fully prepared. Whether you’re an aspiring security analyst or already working in cybersecurity, consistent use of practice exams and scenario-based questions can be the difference between a passing score and a retake, making this certification an essential step for anyone pursuing a career in security operations.

Microsoft Security Operations Analyst Associate SC-200 Logo
  • Free Microsoft Security Operations Analyst Associate SC-200 Practice Test

  • 20 Questions
  • Unlimited time
  • Manage a security operations environment
    Configure protections and detections
    Manage incident response
    Manage security threats
Question 1 of 20

Your organization ingests data from dozens of sources into a single Microsoft Sentinel workspace. To keep costs predictable, you must receive an alert whenever the amount of data written to any table suddenly surges beyond its historical baseline. You want to rely on Microsoft Sentinel's built-in monitoring features and avoid writing a custom Kusto Query Language (KQL) rule. Which capability should you enable first to meet the requirement?

  • Configure a daily cap on data ingestion for the workspace.

  • Enable the Ingestion volume anomalies analytics rule template.

  • Enable the Entity behavior analytics rule template.

  • Deploy the Usage and estimated costs workbook and configure email notifications.

Question 2 of 20

Your organization uses Microsoft Purview Insider Risk Management. A security operations analyst opens a high-severity insider risk alert in the Microsoft Defender portal but cannot preview the SharePoint documents that triggered the alert; the viewer displays "Preview not available." You must ensure the analyst can see full file and email content during future investigations without giving unnecessary additional rights. Which role group should you assign to the analyst?

  • Insider Risk Management Analysts

  • Insider Risk Management Investigators

  • Compliance Data Administrator

  • eDiscovery Manager

Question 3 of 20

Your organization has already onboarded all Windows 11 client PCs to Microsoft Defender for Endpoint (MDE). You now enable the built-in device discovery feature and leave the settings unchanged, which keeps the feature in its default mode.

How will MDE detect Windows computers that are still connected to the corporate network but not yet onboarded to MDE?

  • Each onboarded Windows PC passively listens to local broadcast traffic (for example, ARP and DHCP) to identify nearby hosts that are not sending signals to MDE, and lists them as unmanaged.

  • The Defender for Endpoint cloud service cross-references Azure AD sign-in logs and flags computer names that have never sent security data.

  • Every onboarded Windows PC performs an active ICMP ping sweep and TCP port scan of its subnet to locate hosts that are not protected.

  • An Azure Arc agent is automatically deployed to each subnet to report machines that are not onboarded to MDE.

Question 4 of 20

You are creating a custom Microsoft Sentinel workbook that must work in any Sentinel-enabled Log Analytics workspace without editing the query each time the workbook is imported. You add a query control and need the Kusto Query Language (KQL) query to refer to the workspace that the workbook is currently connected to. Which KQL construct should you use to make the query automatically scope to the active workspace when the workbook runs?

  • workspace('Contoso-Sentinel')

  • workspaces(Guid1, Guid2)

  • workspaceGuid()

  • workspace()

Question 5 of 20

You are writing a Kusto Query Language (KQL) query for a scheduled analytics rule in Microsoft Sentinel. The query returns a column named UserPrincipalName that contains the sign-in name of the offending account. You need Microsoft Sentinel to recognize this value as a user entity so that it appears automatically on the investigation graph without any further manual mapping in the rule wizard.

What should you add to the query?

  • extend AccountCustomEntity = UserPrincipalName

  • extend User = UserPrincipalName

  • convert_to_entity(UserPrincipalName)

  • project-rename Account = UserPrincipalName

Question 6 of 20

While investigating an incident, you open the Device timeline for a Windows 11 computer in the Microsoft Defender portal. The timeline currently shows all event times in the endpoint's local time zone, but your investigation notes are recorded in Coordinated Universal Time (UTC). You need the timeline to display every event in UTC so you can correlate the data with your notes.

What should you do?

  • Click the Refresh button so the timeline reloads in the portal's default time zone (UTC).

  • Select the UTC option in a time-zone toggle located above the event list.

  • In the Microsoft Defender portal, open Settings, select Preferences, and change the time-zone setting to Coordinated Universal Time (UTC), then reload the timeline.

  • Export the timeline to a CSV file and convert the timestamps to UTC in a spreadsheet.

Question 7 of 20

You connected Azure Active Directory (Azure AD) sign-in logs to a Microsoft Sentinel workspace. However, the Entity behavior blade shows zero user anomalies and no user profiles are displayed. To start generating user and entity behavior analytics (UEBA) insights, which action should you perform first?

  • Create a watchlist that contains all Azure AD user principal names.

  • Deploy the built-in UEBA workbook from Microsoft Sentinel's Content hub.

  • Enable the User and entity behavior analytics feature for the workspace in Microsoft Sentinel Settings.

  • Add the "Behavior analytics" rule type to the existing Sign-in logs analytics rule.

Question 8 of 20

You create two Microsoft Defender for Endpoint device groups. FinanceGroup has a rank of 100 and its automation level is set to Full remediation. SensitiveGroup has a rank of 10 and its automation level is set to Semi-automated. A domain-joined workstation meets the membership conditions of both groups and is successfully onboarded. Which automation level will Microsoft Defender for Endpoint enforce on the workstation?

  • Full remediation, because FinanceGroup has a higher (numerically larger) rank than SensitiveGroup.

  • Full remediation, because Microsoft Defender for Endpoint always applies the least restrictive automation level when multiple groups match.

  • Semi-automated, because Microsoft Defender for Endpoint uses the automation level from the group that was created most recently.

  • Semi-automated, because SensitiveGroup has higher priority due to its lower rank value.

Question 9 of 20

You are investigating a suspected mailbox compromise. Your goal is to verify whether anyone other than the mailbox owner has viewed messages in the mailbox during the last seven days and to learn the source IP address that was used. You decide to run a search in the Microsoft Purview compliance portal's unified audit log. Which audit-log activity and field combination will give you the required evidence in a single record?

  • Filter for the MailboxLogin activity and read the DeviceId field.

  • Filter for the AzureActiveDirectoryStsLogon activity and read the IPAddress field.

  • Filter for the ExchangeAdmin activity and read the MailboxAccessType field.

  • Filter for the MailItemsAccessed activity and read the ClientIP field.

Question 10 of 20

You are writing an advanced hunting query in Microsoft Defender XDR to locate executable files whose SHA256 value matches any hash in a predefined string array named targetHashes. The comparison must be case-sensitive and must match the whole hash value only, not a substring. Which Kusto Query Language (KQL) operator should you use in the where clause to meet the requirement?

  • has_any

  • contains_cs

  • in

  • contains

Question 11 of 20

Your organization has deployed Microsoft Security Copilot (preview) by adding its enterprise application to Microsoft Entra ID. You must give members of the Security Operations Center the ability to ask questions, upload investigation data, and create or run promptbooks in Security Copilot, but they must not be allowed to manage plugins, change workspace settings, or assign access to other users. Which built-in application role should you assign to the SOC group in the Security Copilot enterprise application?

  • Security Copilot Contributor

  • Security Copilot Reader

  • Security Copilot Administrator

  • Security Copilot Responder

Question 12 of 20

Your organization has three device groups in Microsoft Defender XDR. The Cross-Tenant group is set to Full - remediate automatically. You need devices in the Finance group to generate automated investigations but hold each recommended action until an analyst approves it, while still allowing other groups to auto-remediate. Which automation level should you assign to the Finance group?

  • Semi - require approval for non-severe remediation

  • No automatic remediation

  • Semi - require approval for any remediation

  • Full - remediate automatically

Question 13 of 20

Several employees report a suspicious email that was delivered four days ago and is still sitting in multiple mailboxes. Your company has Microsoft 365 E5 licenses with Microsoft Defender for Office 365 Plan 2. You must immediately remove the message from every mailbox but still keep a copy available to Security Operations Center (SOC) investigators for eDiscovery. Which action should you take in the Microsoft Defender portal?

  • Trigger an Automated Investigation and Response (AIR) playbook for phishing from the Email entity page.

  • Add the sender's domain to the Tenant Allow/Block List to block future messages from the sender.

  • Use Threat Explorer to locate the message and run the Soft delete action across all affected mailboxes.

  • Enable or update a Safe Links policy that rewrites the URL contained in the email.

Question 14 of 20

You manage Microsoft Defender for Cloud Apps for an organization that uses SharePoint Online and OneDrive for Business. Compliance requires that any document uploaded by users that contains a U.S. Social Security number must automatically receive the Confidential sensitivity label so that encryption is enforced. Which Defender for Cloud Apps configuration should you implement to meet the requirement?

  • Create an activity policy that monitors upload events for sensitive information and sends an alert email to administrators.

  • Enable a built-in anomaly detection policy that identifies publicly shared files containing sensitive data and triggers a security investigation.

  • Create a file policy that detects the U.S. Social Security Number sensitivity information type and uses the Apply sensitivity label governance action to assign the Confidential label.

  • Create a session policy that blocks file downloads unless users provide a business justification when sensitive information is detected.

Question 15 of 20

You are investigating a Pass-the-Ticket alert raised by Microsoft Defender for Identity in the Microsoft Defender portal. The alert shows the service account svc-sql01 requesting Kerberos tickets for many resources in a short period, originating from the server SRV-APP01. No legitimate maintenance was scheduled. To block any further lateral movement while still allowing incident responders to gather evidence, which response action should you initiate directly from the alert page?

  • Trigger a Kerberos ticket cache purge on the domain controller hosting SRV-APP01.

  • Suspend the svc-sql01 user account in Active Directory by using the Suspend user in Active Directory response action.

  • Reset the machine account password for SRV-APP01 by using remote PowerShell.

  • Isolate SRV-APP01 from the network by using Microsoft Defender for Endpoint.

Question 16 of 20

You manage Windows 10 devices that are onboarded to Microsoft Defender for Endpoint and enrolled in Intune. Two endpoint security profiles target the same devices. Profile A sets the attack surface reduction rule "Block Office applications from creating child processes" to Audit, whereas Profile B sets the same rule to Block. Both profiles apply successfully. After policy processing, which enforcement mode will the rule use on the devices?

  • The rule runs in Audit mode on the devices.

  • The rule is disabled because the conflicting settings cancel each other.

  • The rule alternates between Audit and Block depending on which policy applies last.

  • The rule runs in Block mode on the devices.

Question 17 of 20

You deployed Microsoft Defender for Cloud Apps (MDCA) and connected it to Microsoft 365. Compliance requires that users must be stopped during a download if the SharePoint Online file they request carries the Confidential sensitivity label. The users should also see a notification that explains why the download is blocked. Which MDCA policy type and control should you configure to meet this requirement?

  • Create an activity policy that sends an alert email when a Confidential file is downloaded from SharePoint Online.

  • Create a file policy that applies the Remove sharing governance action when a file is labeled Confidential.

  • Create an anomaly detection policy for potential data exfiltration and configure it to suspend user sessions when triggered.

  • Create a session policy that uses the Block download (with custom message) control and targets files whose sensitivity label is Confidential.

Question 18 of 20

During an advanced hunting investigation in Microsoft Defender XDR, you need to locate any process that attempted to start PowerShell with a Base64-encoded command (for example, the command line contains "powershell.exe -enc"). Which advanced hunting table should you query to retrieve the full command-line string for each process creation event?

  • DeviceNetworkEvents

  • DeviceFileEvents

  • DeviceRegistryEvents

  • DeviceProcessEvents

Question 19 of 20

You are investigating a widespread phishing attack in Microsoft Defender for Office 365. In Threat Explorer you have selected all instances of the malicious message. You need to ensure that the email is removed from every affected mailbox so users cannot interact with it, but you also want to keep a copy that security analysts can later download for forensic analysis. Which remediation action should you choose?

  • Hard delete the message

  • Submit the message to Microsoft for analysis

  • Soft delete the message

  • Move message to quarantine

Question 20 of 20

You create a scheduled analytics rule in Microsoft Sentinel that runs every five minutes. The query often returns many rows for the same user within an hour, and each row currently produces a separate incident. You need to reduce noise so that only one incident is created for each user during that hour without suppressing events for other users. Which rule setting should you configure?

  • Enable alert suppression for 60 minutes after each trigger.

  • Set the alert threshold to require at least 12 query results before firing.

  • Configure the Alert grouping section to combine alerts that share the same Account entity within a 1-hour window.

  • Change the rule scheduling frequency from 5 minutes to 60 minutes.