Microsoft Security Operations Analyst Associate Practice Test (SC-200)
Use the form below to configure your Microsoft Security Operations Analyst Associate Practice Test (SC-200). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Security Operations Analyst Associate SC-200 Information
The Microsoft Security Operations Analyst Associate certification, exam code SC-200, is designed for professionals who monitor, investigate, and respond to security incidents across hybrid and cloud environments. This exam validates the candidate’s ability to use Microsoft Defender, Microsoft Sentinel, and Microsoft 365 Defender to mitigate threats and reduce organizational risk. Preparing with SC-200 practice tests, exam simulations, and practice questions can help test takers strengthen their understanding of security alerts, incident management, and threat hunting—key domains covered in the exam.
SC-200 Practice Tests and Preparation
To pass the SC-200, candidates should become familiar with analyzing threat data, responding to security incidents, and configuring Microsoft security tools. Using Microsoft SC-200 practice exams allows learners to experience real-world scenarios and identify weak areas before sitting for the official test. Many students find that completing practice questions on incident investigation and automated response enhances confidence and helps them retain crucial concepts such as KQL (Kusto Query Language), data connectors, and playbooks in Microsoft Sentinel.
Why Take SC-200 Practice Exams
The Microsoft Security Operations Analyst Associate exam is not just about theory—it tests practical knowledge of security operations in live environments. Regularly using SC-200 practice tests provides exposure to the style and difficulty of Microsoft’s real exam items, ensuring candidates are fully prepared. Whether you’re an aspiring security analyst or already working in cybersecurity, consistent use of practice exams and scenario-based questions can be the difference between a passing score and a retake, making this certification an essential step for anyone pursuing a career in security operations.

Free Microsoft Security Operations Analyst Associate SC-200 Practice Test
- 20 Questions
- Unlimited
- Manage a security operations environmentConfigure protections and detectionsManage incident responseManage security threats
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
Your organization is creating a new Microsoft Sentinel workspace. Compliance policy requires that all security event data remain searchable for 14 months. Security analysts routinely run interactive queries against the most recent 30 days of data but are willing to wait several hours when they need to investigate older events. You must meet the compliance requirement while keeping Microsoft Sentinel data-retention costs as low as possible. Which configuration should you implement in the Log Analytics workspace?
Configure all high-volume tables to use Basic Logs with eight-day retention and retain the default 30-day workspace retention.
Set the workspace's default retention period to 14 months and do not configure data archive.
Create a second Log Analytics workspace in the same region, onboard it to Microsoft Sentinel, and forward data from the primary workspace for long-term retention.
Set the workspace retention to 30 days and enable table-level data archive for the required tables for an additional 13 months.
Answer Description
Azure Monitor Logs keeps data in the hot/cold (interactive) tier for the number of days defined as the workspace retention period. The first 31 days are free; after that, standard retention charges apply. Data that ages out of the interactive tier can be moved automatically to the archive tier, where storage costs are much lower and data can be retained for up to 12 years. Archived data is still searchable by running asynchronous Search Jobs, which typically complete in minutes to hours-acceptable for infrequent investigations.
Setting the workspace retention to 30 days keeps the most frequently queried data in the interactive tier at standard cost, while enabling table-level archive for an additional 13 months meets the 14-month compliance requirement at a substantially lower cost than keeping all data in the interactive tier. Using Basic Logs cannot satisfy the 14-month requirement, and creating a second workspace introduces extra ingestion costs without providing any savings over archive storage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the differences between the hot/cold tier and archive tier in Azure Monitor Logs?
How does table-level data archiving work in Microsoft Sentinel?
What are Basic Logs in Microsoft Sentinel and why can't they satisfy the 14-month requirement?
You have installed the Azure Monitor Agent (AMA) on 100 Azure virtual machines and onboarded the machines to Microsoft Sentinel. To minimize ingestion costs, you must collect only Windows Security events with Event IDs 4624 and 4625 (interactive logon success and failure). Which change should you make to the data collection rule (DCR) that sends Windows Security logs to your Sentinel workspace?
Configure the Security channel in the DCR as a Basic Log destination instead of an Analytics Log.
Change the DCR stream type to Microsoft-Sentinel-WindowsSecurityFiltered.
Enable mapping to the CommonSecurityLog table in the DCR destinations section.
Add a transformation clause to the DCR that filters the Security channel to EventID 4624 or 4625 before the data is sent.
Answer Description
In an AMA-based data collection rule, you can filter and transform incoming data before it is sent to the Log Analytics workspace. By adding a Kusto Query Language (KQL) transformation to the DCR, you can specify that only records from the Security channel whose EventID is 4624 or 4625 are forwarded. This prevents all other Security events from being ingested, reducing data volume and therefore cost.
The other choices do not meet the requirement:
- Mapping data to the CommonSecurityLog table is relevant to CEF/Syslog connectors, not Windows event logs collected by AMA.
- There is no built-in stream type called Microsoft-Sentinel-WindowsSecurityFiltered; stream names are predefined (for example, Microsoft-WindowsEvent).
- Sending the Security log to a Basic Log destination would still ingest every record from the channel and would not filter by Event ID.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Data Collection Rule (DCR) in Azure Monitor?
What is a transformation clause in DCR?
How does filtering data with KQL improve cost-efficiency?
Your SOC ingests high-volume Syslog data into an Azure Log Analytics workspace that is connected to Microsoft Sentinel. Analysts must be able to run interactive KQL queries on the data for 180 days. Compliance rules also require keeping the same data for a total of 13 months at the lowest possible cost, but the data does not have to remain immediately searchable after the first 180 days. Which configuration should you implement in the workspace to meet both requirements at minimal cost?
Create a diagnostic setting that exports the Syslog data to an Azure Storage account configured with a 13-month lifecycle policy.
Enable continuous data export to an Event Hub and delete the data from the workspace after 180 days to reduce cost.
Move the Syslog table to Basic Logs and rely on its 30-day interactive retention while keeping data for 13 months.
Set a per-table policy that retains the Syslog table in the analytics tier for 180 days and then archives it for an additional 215 days.
Answer Description
Configure a table-level data retention policy that keeps Syslog records in the analytics (hot) tier for 180 days, then automatically moves them to the archive tier for an additional 215 days. This fulfills the 180-day interactive-query requirement while storing the remaining data in the lower-cost archive tier, where it can still be accessed later through a restore operation or a search job as needed. Basic Logs cannot meet the 180-day interactive requirement because they provide only 30 days of interactive querying (with up to 7-year access via search jobs). Exporting or deleting the data after 180 days would remove the ability to query it natively in Microsoft Sentinel. Therefore, combining 180 days of analytics-tier retention with an extra 215 days of archive retention is the most cost-effective compliant solution.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the archive tier in Microsoft Sentinel?
How does a per-table retention policy work in Azure Log Analytics?
What is the difference between Basic Logs and Analytics tier in Microsoft Sentinel?
You manage Microsoft Defender XDR for your company. Security leadership wants to receive an email whenever Microsoft Defender Vulnerability Management first detects a new high-severity CVE on any onboarded device. In the Microsoft 365 Defender portal you browse to Settings → Microsoft Defender XDR → Email notifications and select + Add notification rule. Which notification rule type should you choose to meet the requirement?
Remediation progress
Vulnerability
Alert
Threat analytics
Answer Description
Only a Vulnerability notification rule is designed to trigger when software vulnerabilities (CVEs) are first discovered on devices that Microsoft Defender Vulnerability Management monitors. Alert notification rules are limited to detection alerts raised by Defender for Endpoint or other Defender workloads, not to vulnerability discoveries. Threat analytics notifications relate to published intelligence reports, and remediation progress rules track the status of remediation activities after a ticket is created. Therefore, the correct choice is the Vulnerability notification rule.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a CVE?
How does Microsoft Defender XDR detect vulnerabilities like CVEs?
What are email notification rules in Microsoft Defender XDR?
While triaging a malware alert in Microsoft Defender for Endpoint, you open the device timeline for the affected Windows 11 workstation. You must quickly locate every event where a registry value was changed on the device during the last two weeks so you can determine whether the malware modified Run-key startup entries. Which action should you take in the device timeline pane to accomplish this task with the least amount of effort?
Apply an Advanced filter that specifies Action type equals Registry value set and limits the date range to the last 14 days.
Start a Live Response session and run a registry command to enumerate Run-key entries.
Scroll through the timeline manually and mark every registry event with the Add to evidence command.
Export the timeline to CSV and search the file for registry events by using a spreadsheet filter.
Answer Description
In the device timeline, the fastest way to isolate only registry change events is to use the built-in Advanced filters feature. Selecting Action type equals Registry value set (or Registry value deleted/created) and narrowing the Date range to the last 14 days immediately hides all other event categories such as file, network, or process events. Manually scrolling, exporting raw data, or running a Live Response session are unnecessary and more time-consuming for the stated goal.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Advanced filter in Microsoft Defender for Endpoint?
How do malware attacks typically use Run-key registry entries?
Why is exporting the timeline to CSV not recommended for registry investigations?
You are piloting Attack Surface Reduction (ASR) rules in Microsoft Defender for Endpoint. You plan to configure the rule "Block Office applications from creating child processes" (rule ID D4F940AB-401B-4EFC-AADC-AD5F3C50688A) on a test device by running the PowerShell command:
Set-MpPreference -AttackSurfaceReductionRules_Ids "D4F940AB-401B-4EFC-AADC-AD5F3C50688A=<value>"
The rule must only record events so you can assess the effect before enforcement. Which numeric value should you use for
1
6
2
0
Answer Description
In PowerShell, Attack Surface Reduction rule states are represented by integers: 0 disables the rule, 1 blocks the behavior, 2 enables Audit mode (events are logged but actions are not blocked), and 6 enables Warn mode (a user prompt appears). Because you want the rule to log activity without blocking it, you must set the rule state to 2. The other values would either disable the rule, actively block the behavior, or prompt users.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Audit mode in Attack Surface Reduction (ASR) rules?
What is an ASR rule ID, and how does it work?
How can event logs from ASR rules be viewed and analyzed?
Your organization ingests data from dozens of sources into a single Microsoft Sentinel workspace. To keep costs predictable, you must receive an alert whenever the amount of data written to any table suddenly surges beyond its historical baseline. You want to rely on Microsoft Sentinel's built-in monitoring features and avoid writing a custom Kusto Query Language (KQL) rule. Which capability should you enable first to meet the requirement?
Enable the Entity behavior analytics rule template.
Deploy the Usage and estimated costs workbook and configure email notifications.
Enable the Ingestion volume anomalies analytics rule template.
Configure a daily cap on data ingestion for the workspace.
Answer Description
Microsoft Sentinel includes a built-in analytics rule template named Ingestion volume anomalies. When enabled, the rule automatically learns normal ingestion patterns for each table and generates an incident if the current volume sharply exceeds the historical baseline. A daily cap limits cost but produces no alert, the Usage and estimated costs workbook is only for interactive review, and the Entity behavior analytics template focuses on user and host behavior rather than ingestion metrics.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does the Ingestion volume anomalies analytics rule template work?
What is the difference between the Ingestion volume anomalies analytics rule and the Entity behavior analytics rule?
Why wouldn't a daily cap on data ingestion meet the requirement for alerts on surges?
You must receive an email whenever Microsoft Defender XDR detects a newly discovered CVE rated Critical on any server. Requirements: trigger only for Critical severity, scope to the Default device group, send immediately. Which rule type should you create in the Microsoft Defender portal, and which option lets you enforce both the severity and device-scope filters?
Create a Vulnerability notification rule and set the Severity filter to Critical and the Device group filter to Default.
Create an Alert notification rule and set Severity to Critical and Device group to Default.
Configure a Data retention policy with a Critical severity filter for the Default device group.
Configure an Automated investigation exclusion scoped to the Default device group and critical severity.
Answer Description
A Vulnerability notification rule is the only rule type that can monitor new CVEs reported by Microsoft Defender Vulnerability Management. When you create the rule, you can specify both the Severity filter (set to Critical) and the Device group filter (set to the built-in Default group). Alert notification rules cover security alerts, not CVE discoveries, while automated investigation exclusions and data-retention policies do not generate vulnerability emails. Therefore, selecting Vulnerability notification and configuring the two filters meets every requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a CVE, and why is it important in vulnerability management?
How does a Vulnerability notification rule differ from an Alert notification rule?
What is the significance of a Device group in Microsoft Defender vulnerability notifications?
While reviewing an incident in the Microsoft Defender portal, you notice that the file "contoso.exe" appears in the Evidence tab with a suspicious verdict. You must quickly learn how many devices have encountered this file during the last 30 days and whether it is common in your organization. Which action should you take from within the incident to obtain this information with the fewest steps?
Switch to the incident's Graph view, expand the file node, and review the connected entities for device counts.
Open the primary affected device's page, select Timeline, and filter events for contoso.exe over the last 30 days.
In the incident's Evidence tab, select contoso.exe and choose Open file page to view its prevalence details.
Run an advanced hunting query in Microsoft Sentinel that searches all FileEvent records for contoso.exe across the past month.
Answer Description
Choosing Open file page from the Evidence tab opens the dedicated file entity page. This page automatically aggregates telemetry across your tenant, displaying organization prevalence, global prevalence, first-seen and last-seen timestamps, and a list of devices where the file was observed in the selected time range (by default, 30 days). The timeline or graph views, while useful, show relationships only within the current incident and do not summarize prevalence across the tenant. Running an advanced hunting query or switching to Microsoft Sentinel would also require additional manual work and may miss devices if the query scope or data source is incomplete. Therefore, opening the file page directly from the Evidence tab is the quickest built-in method to obtain the required prevalence details.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Evidence tab in the Microsoft Defender portal?
What is the file page in Microsoft Defender, and what information does it provide?
What is the difference between organizational prevalence and global prevalence for a file?
You are investigating a suspected account compromise for a user in your tenant. To review the user's interactive sign-in events from the last 24 hours, you decide to query Microsoft Graph. Which REST endpoint should you call so that the results include only that user's sign-ins within the required time range?
GET https://graph.microsoft.com/v1.0/security/alerts?$filter=assignedTo eq '' and createdDateTime ge
GET https://graph.microsoft.com/v1.0/identityProtection/riskDetections?$filter=userId eq '' and activityDateTime ge
GET https://graph.microsoft.com/v1.0/auditLogs/signIns?$filter=userId eq '' and createdDateTime ge
Answer Description
Azure AD sign-in events are stored under the Microsoft Graph auditLogs namespace. Interactive sign-ins can be retrieved by calling /auditLogs/signIns and filtering with the user's object ID (userId) together with a createdDateTime range. The other listed endpoints surface security alerts, risk detections, or Microsoft 365 activity data-none of which return the raw sign-in log entries needed for authentication investigations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Graph?
What is an ISO-8601 timestamp?
What is the auditLogs/signIns endpoint, and how does it work?
Your SOC uses Microsoft Defender XDR with device groups set to the automation level "Semi - require approval for any remediation." An automated investigation runs on a workstation after an alert for suspicious PowerShell activity. The investigation proposes several remediation actions.
Which remediation action will be carried out immediately without waiting for analyst approval?
Collect an investigation package from the device.
Place the workstation in full network isolation.
Delete the malicious registry run-key.
Quarantine the suspicious PowerShell script file.
Answer Description
When the automation level is set to "Semi - require approval for any remediation," Microsoft Defender for Endpoint pauses every remediation action and places it in a Pending state. However, activities that only collect evidence are not classed as remediation; they are executed automatically so the investigation can finish gathering the data it needs. Collecting an investigation package is therefore performed right away, whereas actions such as quarantining a file, removing a registry value, or isolating a device are remediation steps that stay Pending until an analyst approves or rejects them.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Microsoft Defender XDR and how does it work in a SOC?
What is the difference between 'collecting an investigation package' and remediation actions like quarantining files?
What does 'Semi - require approval for any remediation' mean in Microsoft Defender settings?
Your organization has already onboarded all Windows 11 client PCs to Microsoft Defender for Endpoint (MDE). You now enable the built-in device discovery feature and leave the settings unchanged, which keeps the feature in its default mode.
How will MDE detect Windows computers that are still connected to the corporate network but not yet onboarded to MDE?
Every onboarded Windows PC performs an active ICMP ping sweep and TCP port scan of its subnet to locate hosts that are not protected.
Each onboarded Windows PC passively listens to local broadcast traffic (for example, ARP and DHCP) to identify nearby hosts that are not sending signals to MDE, and lists them as unmanaged.
An Azure Arc agent is automatically deployed to each subnet to report machines that are not onboarded to MDE.
The Defender for Endpoint cloud service cross-references Azure AD sign-in logs and flags computer names that have never sent security data.
Answer Description
When device discovery is enabled and left in its default Basic mode, the SenseNDR component on each onboarded Windows device passively captures local network traffic such as ARP, DHCP, DNS, and NetBIOS broadcasts. From this broadcast traffic it infers the presence of other hosts on the same subnet. Any host that appears in the traffic but does not report itself to the MDE service is added to the device inventory as an unmanaged device. Basic mode never initiates active ICMP ping sweeps or TCP port scans. Those active probes are performed only when an administrator explicitly switches discovery to Standard mode. No additional agents such as Azure Arc are required for either mode because the existing Defender for Endpoint sensor performs the discovery work.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the SenseNDR component in Microsoft Defender for Endpoint?
What is the difference between Basic mode and Standard mode in MDE's device discovery?
Why doesn't device discovery in MDE require additional agents like Azure Arc?
You are creating a custom detection rule in Microsoft Defender XDR that must automatically isolate any workstation returned by the query. During the rule configuration, you notice that the Isolate device response option is unavailable. Which column must your Advanced Hunting query include so that the Isolate device action can be enabled for the rule?
ReportId
FileContent
DeviceId
AccountSid
Answer Description
Microsoft Defender XDR only exposes device-level automated response actions, such as Isolate device, when the custom detection rule's query returns a unique device identifier. The required identifier is the DeviceId column. Without DeviceId in the query results, Defender XDR cannot determine which specific endpoint should be isolated, and the action remains unavailable. Other columns such as ReportId, AccountSid, or FileContent do not uniquely map to a managed device and therefore cannot enable the isolation action.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of DeviceId in Microsoft Defender XDR?
How does 'Isolate device' work in Microsoft Defender XDR?
Why can't columns like ReportId or AccountSid enable isolation in Microsoft Defender XDR?
You manage a Microsoft Sentinel workspace connected to several Azure subscriptions. Security analysts need to investigate how frequently Audit and Deny policies are triggered and to correlate those results with security alerts already stored in the workspace. You must start ingesting Azure Policy compliance data into Microsoft Sentinel without deploying any additional agents or custom scripts and with the least administrative effort. What should you do?
Enable the Azure Policy (Preview) data connector in the Microsoft Sentinel portal and select the Azure subscriptions whose compliance data you want to stream.
Create a diagnostic setting for each subscription that streams the Policy category to the Log Analytics workspace and then enable the Azure Activity data connector.
Enable the Azure Resource Graph connector and schedule a query that exports PolicyInsights data to a custom table in the workspace.
Deploy the Log Analytics agent to all Azure virtual machines and configure the Change Tracking solution to collect Policy snapshots.
Answer Description
Microsoft Sentinel includes a built-in "Azure Policy" data connector that relies on Azure diagnostic settings rather than on the Log Analytics agent. Enabling this connector automatically creates or updates a diagnostic setting named "send-to-sentinel" in each selected subscription and starts streaming policy compliance records (PolicyInsights) to the workspace. Using the Azure Activity connector alone will not capture detailed compliance evaluation results, and creating custom data collection rules or assigning extra roles is unnecessary for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Azure Policy (Preview) data connector?
How does the Azure Policy data connector differ from the Azure Activity connector?
What is PolicyInsights data?
You are investigating a suspicious executable that Microsoft Defender for Endpoint has already collected and flagged. Before asking Microsoft Security Copilot to decide whether the file is malicious, map observed behaviors to MITRE ATT&CK tactics, and recommend next steps, what should you do first to ensure you have the most complete security context available?
Create a custom playbook that queries VirusTotal and run it from the Copilot chat window.
Open the file page in the Microsoft Defender portal to review the aggregated analysis and telemetry.
Upload the executable as a new source in Security Copilot and then request an analysis.
Paste one suspicious PowerShell line from the file into the Copilot chat and ask what it does.
Answer Description
Because the file is already stored and analyzed in Microsoft Defender for Endpoint, the quickest way to obtain a full security picture is to open the file page in the Microsoft Defender portal. That page aggregates static analysis, detonation results, prevalence, associated incidents, alert history, device exposure, and other telemetry. Reviewing this rich information first gives Security Copilot maximum context when you reference the file in a prompt. Uploading the file again, pasting a single command, or building a playbook are unnecessary extra steps and provide less immediate insight.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the MITRE ATT&CK framework?
What information can I find on the file page in Microsoft Defender for Endpoint?
How does Microsoft Security Copilot integrate with Microsoft Defender for Endpoint?
You manage an Azure subscription that contains a Microsoft Sentinel workspace. Yesterday, log ingestion costs spiked unexpectedly. To investigate, you want to run a Kusto query that shows the amount of billable data ingested, grouped by table, for the last 24 hours. Which Log Analytics table should the query reference to obtain this information?
AzureDiagnostics
AzureActivity
Usage
Heartbeat
Answer Description
The Usage table records detailed information about data ingested into a Log Analytics workspace, including the Quantity (in MB) and whether each record is billable (IsBillable). By querying the Usage table and summarizing Quantity by the DataType column, you can see exactly how much billable data each table contributed during any period, such as the last 24 hours. Other tables like AzureDiagnostics, AzureActivity, and Heartbeat store specific operational or activity logs but do not track ingestion volume or billable size for every table, so they cannot be used to calculate per-table ingestion costs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the Usage table in Microsoft Sentinel?
What kind of data does the AzureDiagnostics table store?
How can querying the Usage table help optimize costs in Microsoft Sentinel?
You create two Microsoft Defender for Endpoint device groups. FinanceGroup has a rank of 100 and its automation level is set to Full remediation. SensitiveGroup has a rank of 10 and its automation level is set to Semi-automated. A domain-joined workstation meets the membership conditions of both groups and is successfully onboarded. Which automation level will Microsoft Defender for Endpoint enforce on the workstation?
Semi-automated, because Microsoft Defender for Endpoint uses the automation level from the group that was created most recently.
Full remediation, because FinanceGroup has a higher (numerically larger) rank than SensitiveGroup.
Semi-automated, because SensitiveGroup has higher priority due to its lower rank value.
Full remediation, because Microsoft Defender for Endpoint always applies the least restrictive automation level when multiple groups match.
Answer Description
When a device matches more than one Microsoft Defender for Endpoint (MDE) device group, the group with the highest priority (that is, the lowest numeric rank value) takes precedence. Because SensitiveGroup has a rank of 10, it outranks FinanceGroup, which has a rank of 100. Therefore, MDE will apply the automation level configured for SensitiveGroup (Semi-automated) to the device. The platform does not choose the most or least restrictive setting, nor does creation time affect precedence-only the rank value determines which group wins.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the rank value represent in Microsoft Defender for Endpoint device groups?
What is the difference between 'Full remediation' and 'Semi-automated' automation levels?
How does Microsoft Defender for Endpoint manage overlapping device group memberships?
While investigating a Microsoft Defender for Cloud Apps OAuth app governance alert, you determine that a newly registered app named ContosoReports is malicious and already has high-privilege permissions granted by several users. You need to immediately block the app's access to Microsoft 365 data and ensure that no user can grant it consent again. Which Defender for Cloud Apps action should you take?
Select Take action and choose Revoke app for ContosoReports.
Create an access review for ContosoReports in Microsoft Entra ID.
Mark ContosoReports as unsanctioned in the Cloud Discovery app catalog.
Select Take action and choose Ban app for ContosoReports.
Answer Description
Selecting Take action > Ban app on the OAuth Apps page both revokes all existing user and service principal grants and blocks any future consent to the application, immediately stopping the app from accessing Microsoft 365 data. Revoke app only removes current grants, allowing users to re-consent, while marking the app as unsanctioned or starting an access review does not revoke tokens or prevent future consent.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between banning an app and revoking an app in Microsoft Defender for Cloud Apps?
What are OAuth apps in the context of Microsoft Defender for Cloud Apps?
What happens when you mark an app as unsanctioned in Microsoft Defender for Cloud Apps?
You develop a Kusto Query Language (KQL) hunting query in Microsoft Sentinel that reliably identifies credential stuffing attempts. You need the query to execute automatically every hour and raise an incident whenever at least one match is returned. Which action should you perform from the Hunting page to meet the requirement?
Export the query to a Logic App playbook that calls the Log Analytics API on an hourly recurrence to send incident notifications.
Toggle Live stream for the query so it continuously monitors data and automatically opens incidents.
Select Create detection rule and save the query as a scheduled analytics rule that runs hourly with an alert threshold of 1.
Pin the query to a workbook and set the workbook to refresh every 60 minutes to produce alerts.
Answer Description
Hunting queries run on-demand unless you convert them to analytics rules. By choosing Create detection rule, Microsoft Sentinel copies the query into the analytics rule wizard, where you can set a schedule (for example, every hour) and an alert threshold (results greater than or equal to 1). When the rule runs it can automatically generate incidents. Live stream only shows near-real-time results and does not create incidents, workbooks do not run queries on a schedule, and a Logic App playbook would require additional custom logic and is not the recommended method for routine scheduled detections.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Kusto Query Language (KQL)?
Why is an Analytics Rule used for automatic incident creation in Microsoft Sentinel?
What is the difference between a Hunting Query and an Analytics Rule in Microsoft Sentinel?
You need to create a hunting query in Microsoft Sentinel that returns endpoint process events from any data source that has been normalized by the Azure Sentinel Information Model (ASIM). Your solution must minimize dependence on the specific table names ingested by each connector. Which KQL line should you start the query with to meet the requirement?
DeviceProcessEvents
imDnsEvents()
imProcessEvents()
_ASim_EveryEvent
Answer Description
ASIM provides parser functions that return normalized data across multiple source tables. The imProcessEvents() function (also written as _Im_ProcessEvents()) surfaces process creation events that conform to the ASIM Process schema, regardless of whether the data originated from Windows Security events, Microsoft Defender for Endpoint, or other sources. Calling this parser at the beginning of the query abstracts away the underlying table names. The other functions either target different event types (DNS or network), return all events in ASIM, or represent a table rather than an ASIM parser, so they would not specifically return only process events while remaining source-agnostic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is ASIM in Microsoft Sentinel?
How does imProcessEvents() differ from DeviceProcessEvents?
Why is it important to use normalized data in Microsoft Sentinel queries?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.