00:20:00

Microsoft Security Operations Analyst Associate Practice Test (SC-200)

Use the form below to configure your Microsoft Security Operations Analyst Associate Practice Test (SC-200). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for Microsoft Security Operations Analyst Associate SC-200
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

Microsoft Security Operations Analyst Associate SC-200 Information

The Microsoft Security Operations Analyst Associate certification, exam code SC-200, is designed for professionals who monitor, investigate, and respond to security incidents across hybrid and cloud environments. This exam validates the candidate’s ability to use Microsoft Defender, Microsoft Sentinel, and Microsoft 365 Defender to mitigate threats and reduce organizational risk. Preparing with SC-200 practice tests, exam simulations, and practice questions can help test takers strengthen their understanding of security alerts, incident management, and threat hunting—key domains covered in the exam.

SC-200 Practice Tests and Preparation

To pass the SC-200, candidates should become familiar with analyzing threat data, responding to security incidents, and configuring Microsoft security tools. Using Microsoft SC-200 practice exams allows learners to experience real-world scenarios and identify weak areas before sitting for the official test. Many students find that completing practice questions on incident investigation and automated response enhances confidence and helps them retain crucial concepts such as KQL (Kusto Query Language), data connectors, and playbooks in Microsoft Sentinel.

Why Take SC-200 Practice Exams

The Microsoft Security Operations Analyst Associate exam is not just about theory—it tests practical knowledge of security operations in live environments. Regularly using SC-200 practice tests provides exposure to the style and difficulty of Microsoft’s real exam items, ensuring candidates are fully prepared. Whether you’re an aspiring security analyst or already working in cybersecurity, consistent use of practice exams and scenario-based questions can be the difference between a passing score and a retake, making this certification an essential step for anyone pursuing a career in security operations.

Microsoft Security Operations Analyst Associate SC-200 Logo
  • Free Microsoft Security Operations Analyst Associate SC-200 Practice Test

  • 20 Questions
  • Unlimited
  • Manage a security operations environment
    Configure protections and detections
    Manage incident response
    Manage security threats

Free Preview

This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!

Question 1 of 20

Your organization is creating a new Microsoft Sentinel workspace. Compliance policy requires that all security event data remain searchable for 14 months. Security analysts routinely run interactive queries against the most recent 30 days of data but are willing to wait several hours when they need to investigate older events. You must meet the compliance requirement while keeping Microsoft Sentinel data-retention costs as low as possible. Which configuration should you implement in the Log Analytics workspace?

  • Configure all high-volume tables to use Basic Logs with eight-day retention and retain the default 30-day workspace retention.

  • Set the workspace's default retention period to 14 months and do not configure data archive.

  • Create a second Log Analytics workspace in the same region, onboard it to Microsoft Sentinel, and forward data from the primary workspace for long-term retention.

  • Set the workspace retention to 30 days and enable table-level data archive for the required tables for an additional 13 months.

Question 2 of 20

You have installed the Azure Monitor Agent (AMA) on 100 Azure virtual machines and onboarded the machines to Microsoft Sentinel. To minimize ingestion costs, you must collect only Windows Security events with Event IDs 4624 and 4625 (interactive logon success and failure). Which change should you make to the data collection rule (DCR) that sends Windows Security logs to your Sentinel workspace?

  • Configure the Security channel in the DCR as a Basic Log destination instead of an Analytics Log.

  • Change the DCR stream type to Microsoft-Sentinel-WindowsSecurityFiltered.

  • Enable mapping to the CommonSecurityLog table in the DCR destinations section.

  • Add a transformation clause to the DCR that filters the Security channel to EventID 4624 or 4625 before the data is sent.

Question 3 of 20

Your SOC ingests high-volume Syslog data into an Azure Log Analytics workspace that is connected to Microsoft Sentinel. Analysts must be able to run interactive KQL queries on the data for 180 days. Compliance rules also require keeping the same data for a total of 13 months at the lowest possible cost, but the data does not have to remain immediately searchable after the first 180 days. Which configuration should you implement in the workspace to meet both requirements at minimal cost?

  • Create a diagnostic setting that exports the Syslog data to an Azure Storage account configured with a 13-month lifecycle policy.

  • Enable continuous data export to an Event Hub and delete the data from the workspace after 180 days to reduce cost.

  • Move the Syslog table to Basic Logs and rely on its 30-day interactive retention while keeping data for 13 months.

  • Set a per-table policy that retains the Syslog table in the analytics tier for 180 days and then archives it for an additional 215 days.

Question 4 of 20

You manage Microsoft Defender XDR for your company. Security leadership wants to receive an email whenever Microsoft Defender Vulnerability Management first detects a new high-severity CVE on any onboarded device. In the Microsoft 365 Defender portal you browse to Settings → Microsoft Defender XDR → Email notifications and select + Add notification rule. Which notification rule type should you choose to meet the requirement?

  • Remediation progress

  • Vulnerability

  • Alert

  • Threat analytics

Question 5 of 20

While triaging a malware alert in Microsoft Defender for Endpoint, you open the device timeline for the affected Windows 11 workstation. You must quickly locate every event where a registry value was changed on the device during the last two weeks so you can determine whether the malware modified Run-key startup entries. Which action should you take in the device timeline pane to accomplish this task with the least amount of effort?

  • Apply an Advanced filter that specifies Action type equals Registry value set and limits the date range to the last 14 days.

  • Start a Live Response session and run a registry command to enumerate Run-key entries.

  • Scroll through the timeline manually and mark every registry event with the Add to evidence command.

  • Export the timeline to CSV and search the file for registry events by using a spreadsheet filter.

Question 6 of 20

You are piloting Attack Surface Reduction (ASR) rules in Microsoft Defender for Endpoint. You plan to configure the rule "Block Office applications from creating child processes" (rule ID D4F940AB-401B-4EFC-AADC-AD5F3C50688A) on a test device by running the PowerShell command:

Set-MpPreference -AttackSurfaceReductionRules_Ids "D4F940AB-401B-4EFC-AADC-AD5F3C50688A=<value>"

The rule must only record events so you can assess the effect before enforcement. Which numeric value should you use for ?

  • 1

  • 6

  • 2

  • 0

Question 7 of 20

Your organization ingests data from dozens of sources into a single Microsoft Sentinel workspace. To keep costs predictable, you must receive an alert whenever the amount of data written to any table suddenly surges beyond its historical baseline. You want to rely on Microsoft Sentinel's built-in monitoring features and avoid writing a custom Kusto Query Language (KQL) rule. Which capability should you enable first to meet the requirement?

  • Enable the Entity behavior analytics rule template.

  • Deploy the Usage and estimated costs workbook and configure email notifications.

  • Enable the Ingestion volume anomalies analytics rule template.

  • Configure a daily cap on data ingestion for the workspace.

Question 8 of 20

You must receive an email whenever Microsoft Defender XDR detects a newly discovered CVE rated Critical on any server. Requirements: trigger only for Critical severity, scope to the Default device group, send immediately. Which rule type should you create in the Microsoft Defender portal, and which option lets you enforce both the severity and device-scope filters?

  • Create a Vulnerability notification rule and set the Severity filter to Critical and the Device group filter to Default.

  • Create an Alert notification rule and set Severity to Critical and Device group to Default.

  • Configure a Data retention policy with a Critical severity filter for the Default device group.

  • Configure an Automated investigation exclusion scoped to the Default device group and critical severity.

Question 9 of 20

While reviewing an incident in the Microsoft Defender portal, you notice that the file "contoso.exe" appears in the Evidence tab with a suspicious verdict. You must quickly learn how many devices have encountered this file during the last 30 days and whether it is common in your organization. Which action should you take from within the incident to obtain this information with the fewest steps?

  • Switch to the incident's Graph view, expand the file node, and review the connected entities for device counts.

  • Open the primary affected device's page, select Timeline, and filter events for contoso.exe over the last 30 days.

  • In the incident's Evidence tab, select contoso.exe and choose Open file page to view its prevalence details.

  • Run an advanced hunting query in Microsoft Sentinel that searches all FileEvent records for contoso.exe across the past month.

Question 10 of 20

You are investigating a suspected account compromise for a user in your tenant. To review the user's interactive sign-in events from the last 24 hours, you decide to query Microsoft Graph. Which REST endpoint should you call so that the results include only that user's sign-ins within the required time range?

Question 11 of 20

Your SOC uses Microsoft Defender XDR with device groups set to the automation level "Semi - require approval for any remediation." An automated investigation runs on a workstation after an alert for suspicious PowerShell activity. The investigation proposes several remediation actions.

Which remediation action will be carried out immediately without waiting for analyst approval?

  • Collect an investigation package from the device.

  • Place the workstation in full network isolation.

  • Delete the malicious registry run-key.

  • Quarantine the suspicious PowerShell script file.

Question 12 of 20

Your organization has already onboarded all Windows 11 client PCs to Microsoft Defender for Endpoint (MDE). You now enable the built-in device discovery feature and leave the settings unchanged, which keeps the feature in its default mode.

How will MDE detect Windows computers that are still connected to the corporate network but not yet onboarded to MDE?

  • Every onboarded Windows PC performs an active ICMP ping sweep and TCP port scan of its subnet to locate hosts that are not protected.

  • Each onboarded Windows PC passively listens to local broadcast traffic (for example, ARP and DHCP) to identify nearby hosts that are not sending signals to MDE, and lists them as unmanaged.

  • An Azure Arc agent is automatically deployed to each subnet to report machines that are not onboarded to MDE.

  • The Defender for Endpoint cloud service cross-references Azure AD sign-in logs and flags computer names that have never sent security data.

Question 13 of 20

You are creating a custom detection rule in Microsoft Defender XDR that must automatically isolate any workstation returned by the query. During the rule configuration, you notice that the Isolate device response option is unavailable. Which column must your Advanced Hunting query include so that the Isolate device action can be enabled for the rule?

  • ReportId

  • FileContent

  • DeviceId

  • AccountSid

Question 14 of 20

You manage a Microsoft Sentinel workspace connected to several Azure subscriptions. Security analysts need to investigate how frequently Audit and Deny policies are triggered and to correlate those results with security alerts already stored in the workspace. You must start ingesting Azure Policy compliance data into Microsoft Sentinel without deploying any additional agents or custom scripts and with the least administrative effort. What should you do?

  • Enable the Azure Policy (Preview) data connector in the Microsoft Sentinel portal and select the Azure subscriptions whose compliance data you want to stream.

  • Create a diagnostic setting for each subscription that streams the Policy category to the Log Analytics workspace and then enable the Azure Activity data connector.

  • Enable the Azure Resource Graph connector and schedule a query that exports PolicyInsights data to a custom table in the workspace.

  • Deploy the Log Analytics agent to all Azure virtual machines and configure the Change Tracking solution to collect Policy snapshots.

Question 15 of 20

You are investigating a suspicious executable that Microsoft Defender for Endpoint has already collected and flagged. Before asking Microsoft Security Copilot to decide whether the file is malicious, map observed behaviors to MITRE ATT&CK tactics, and recommend next steps, what should you do first to ensure you have the most complete security context available?

  • Create a custom playbook that queries VirusTotal and run it from the Copilot chat window.

  • Open the file page in the Microsoft Defender portal to review the aggregated analysis and telemetry.

  • Upload the executable as a new source in Security Copilot and then request an analysis.

  • Paste one suspicious PowerShell line from the file into the Copilot chat and ask what it does.

Question 16 of 20

You manage an Azure subscription that contains a Microsoft Sentinel workspace. Yesterday, log ingestion costs spiked unexpectedly. To investigate, you want to run a Kusto query that shows the amount of billable data ingested, grouped by table, for the last 24 hours. Which Log Analytics table should the query reference to obtain this information?

  • AzureDiagnostics

  • AzureActivity

  • Usage

  • Heartbeat

Question 17 of 20

You create two Microsoft Defender for Endpoint device groups. FinanceGroup has a rank of 100 and its automation level is set to Full remediation. SensitiveGroup has a rank of 10 and its automation level is set to Semi-automated. A domain-joined workstation meets the membership conditions of both groups and is successfully onboarded. Which automation level will Microsoft Defender for Endpoint enforce on the workstation?

  • Semi-automated, because Microsoft Defender for Endpoint uses the automation level from the group that was created most recently.

  • Full remediation, because FinanceGroup has a higher (numerically larger) rank than SensitiveGroup.

  • Semi-automated, because SensitiveGroup has higher priority due to its lower rank value.

  • Full remediation, because Microsoft Defender for Endpoint always applies the least restrictive automation level when multiple groups match.

Question 18 of 20

While investigating a Microsoft Defender for Cloud Apps OAuth app governance alert, you determine that a newly registered app named ContosoReports is malicious and already has high-privilege permissions granted by several users. You need to immediately block the app's access to Microsoft 365 data and ensure that no user can grant it consent again. Which Defender for Cloud Apps action should you take?

  • Select Take action and choose Revoke app for ContosoReports.

  • Create an access review for ContosoReports in Microsoft Entra ID.

  • Mark ContosoReports as unsanctioned in the Cloud Discovery app catalog.

  • Select Take action and choose Ban app for ContosoReports.

Question 19 of 20

You develop a Kusto Query Language (KQL) hunting query in Microsoft Sentinel that reliably identifies credential stuffing attempts. You need the query to execute automatically every hour and raise an incident whenever at least one match is returned. Which action should you perform from the Hunting page to meet the requirement?

  • Export the query to a Logic App playbook that calls the Log Analytics API on an hourly recurrence to send incident notifications.

  • Toggle Live stream for the query so it continuously monitors data and automatically opens incidents.

  • Select Create detection rule and save the query as a scheduled analytics rule that runs hourly with an alert threshold of 1.

  • Pin the query to a workbook and set the workbook to refresh every 60 minutes to produce alerts.

Question 20 of 20

You need to create a hunting query in Microsoft Sentinel that returns endpoint process events from any data source that has been normalized by the Azure Sentinel Information Model (ASIM). Your solution must minimize dependence on the specific table names ingested by each connector. Which KQL line should you start the query with to meet the requirement?

  • DeviceProcessEvents

  • imDnsEvents()

  • imProcessEvents()

  • _ASim_EveryEvent