Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SC-200 Exam Dumps - Microsoft Certified: Security Operations Analyst Associate Questions and Answers

Question # 34

You need to ensure that you can run hunting queries to meet the Microsoft Sentinel requirements. Which type of workspace should you create?

Options:

A.

Azure Synapse AnarytKS

B.

AzureDalabricks

C.

Azure Machine Learning

D.

LogAnalytics

Buy Now
Question # 35

You have an Azure subscription that uses Microsoft Defender for Cloud and contains a resource group named RG1. RG1. You need to configure just in time (JIT) VM access for the virtual machines in RG1. The solution must meet the following

• Limit the maximum request time to two hours.

• Limit protocol access to Remote Desktop Protocol (RDP) only.

• Minimize administrative effort.

What should you use?

Options:

A.

Azure AD Privileged Identity Management (PIM)

B.

Azure Policy

C.

Azure Front Door

D.

Azure Bastion

Buy Now
Question # 36

You have an Azure subscription that uses Microsoft Sentinel.

You need to minimize the administrative effort required to respond to the incident s and remediate the security threats detected by Microsoft Sentinel.

Which two features should you use? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Options:

A.

Microsoft Sentinel bookmarks

B.

Azure Automation runbooks

C.

Microsoft Sentinel automation rules

D.

Microsoft Sentinel playbooks

E.

Azure Functions apps

Buy Now
Question # 37

You have an Azure subscription that contains the users shown in the following table.

You need to delegate the following tasks:

• Enable Microsoft Defender for Servers on virtual machines.

• Review security recommendations and enable server vulnerability scans.

The solution must use the principle of least privilege.

Which user should perform each task? To answer, drag the appropriate users to the correct tasks. Each user may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Question # 38

You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR.

You have a custom detection rule named Rule1 that generates an alert if more than five antivirus detections are identified on a device. Rule1 has a loopback period of 12 hours.

You need to change the loopback period to 48 hours.

What should you modify for Rule1?

Options:

A.

the frequency

B.

the summarize operator of the KQL query

C.

the where operator of the KQL query

D.

the scope

Buy Now
Question # 39

You have a Microsoft 365 E5 subscription that contains a device named Device1. From the Microsoft Defender portal, you discover that an alert was triggered for Device1. From the Device inventory page, you isolate Device1. You need to collect a list of installed programs on Device1. What should you do?

Options:

A.

Run an advanced hunting query against the DeviceTvmlnfoGathering table.

B.

Initiate a live response session and run the processes command.

C.

Run an advanced hunting query against the DeviceTvmSoftwarelnventory table.

D.

Run an advanced hunting query against the DeviceProcessEvents table.

Buy Now
Question # 40

You need to modify the anomaly detection policy settings to meet the Microsoft Defender for Cloud Apps requirements and resolve the reported problem.

Which policy should you modify?

Options:

A.

Activity from suspicious IP addresses

B.

Risky sign-in

C.

Activity from anonymous IP addresses

D.

Impossible travel

Buy Now
Question # 41

You have five on-premises Linux servers.

You have an Azure subscription that uses Microsoft Defender for Cloud.

You need to use Defender for Cloud to protect the Linux servers.

What should you install on the servers first?

Options:

A.

the Dependency agent

B.

the Log Analytics agent

C.

the Azure Connected Machine agent

D.

the Guest Configuration extension

Buy Now
Question # 42

You need to implement Microsoft Sentinel queries for Contoso and Fabrikam to meet the technical requirements.

What should you include in the solution? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Options:

Buy Now
Question # 43

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint and contains a Windows device named Device1. You need to investigate a suspicious executable file detected on Device1. The solution must meet the following requirements:

• Identify the image file path of the file.

• Identify when the file was first detected on Device1.

What should you review from the timeline of the detection event? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Options:

Buy Now
Exam Code: SC-200
Exam Name: Microsoft Security Operations Analyst
Last Update: May 24, 2026
Questions: 388
SC-200 pdf

SC-200 PDF

$28.5  $94.99
SC-200 Engine

SC-200 Testing Engine

$33  $109.99
SC-200 PDF + Engine

SC-200 PDF + Testing Engine

$43.5  $144.99