Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 6
Total 56 questions
Exam Code: SC-200                Update: Sep 29, 2025
Exam Name: Microsoft Security Operations Analyst

Microsoft Microsoft Security Operations Analyst SC-200 Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

You provision Azure Sentinel for a new Azure subscription. You are configuring the Security Events connector.

While creating a new rule from a template in the connector, you decide to generate a new alert for every event. You create the following rule query.

By which two components can you group alerts into incidents? Each correct answer presents a complete

solution.

NOTE: Each correct selection is worth one point.

A.

user

B.

resource group

C.

IP address

D.

computer

Question # 2

You have 500 on-premises Windows 11 devices that use Microsoft Defender for Endpoint

You enable Network device discovery.

You need to create a hunting query that will identify discovered network devices and return the identity of the onboarded device that discovered each network device.

Which built-in function should you use?

A.

current_cluster,endpoint()

B.

DeviceFromIP ()

C.

next ()

D.

SeenBy ()

Question # 3

You have a Microsoft 365 E5 subscription that contains a database server named DB1. DB1 is onboarded to Microsoft Defender XDR.

You need to ensure that DB1 appears on the attack surface map.

What should you configure?

A.

a critical asset rule

B.

an asset rule

C.

a honeytoken entity tag

D.

a sensitive entity tag

Question # 4

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You have Linux virtual machines on Amazon Web Services (AWS).

You deploy Azure Defender and enable auto-provisioning.

You need to monitor the virtual machines by using Azure Defender.

Solution: You enable Azure Arc and onboard the virtual machines to Azure Arc.

Does this meet the goal?

A.

Yes

B.

No

Question # 5

You have a Microsoft Sentinel workspace

You develop a custom Advanced Security information Model (ASIM) parser named Parser1 that produces a schema named Schema1.

You need to validate Schema1.

How should you complete the command? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 6

You have an Azure subscription that has Azure Defender enabled for all supported resource types.

You need to configure the continuous export of high-severity alerts to enable their retrieval from a third-party security information and event management (SIEM) solution.

To which service should you export the alerts?

A.

Azure Cosmos DB

B.

Azure Event Grid

C.

Azure Event Hubs

D.

Azure Data Lake

Question # 7

You have a Microsoft Sentinel workbook that contains the following KQL query.

You need to create a visual that will change the color of the errCount column based on the value returned. How should you configure the visual? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Question # 8

You have a Microsoft 365 subscription that uses Microsoft Defender XDR.

You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.

You need to search for malicious activities in your organization.

Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?

A.

Tactic2 only

B.

Tactic1 and Tactic2 only

C.

Tac1ic2 and Tactic3 only

D.

Taclic1. Tac1ic2. andTactic3

Question # 9

You have a Microsoft 365 subscription that uses Microsoft 365 Defender A remediation action for an automated investigation quarantines a file across multiple devices. You need to mark the file as safe and remove the file from quarantine on the devices. What should you use m the Microsoft 365 Defender portal?

A.

From Threat tracker, review the queries.

B.

From the History tab in the Action center, revert the actions.

C.

From the investigation page, review the AIR processes.

D.

From Quarantine from the Review page, modify the rules.

Question # 10

You have an Azure subscription that uses Microsoft Defender for Cloud and contains 100 virtual machines that run Windows Server.

You need to configure Defender for Cloud to collect event data from the virtual machines. The solution must minimize administrative effort and costs.

Which two actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

A.

From the workspace created by Defender for Cloud, set the data collection level to Common

B.

From the Microsoft Endpoint Manager admin center, enable automatic enrollment.

C.

From the Azure portal, create an Azure Event Grid subscription.

D.

From the workspace created by Defender for Cloud, set the data collection level to All Events

E.

From Defender for Cloud in the Azure portal, enable automatic provisioning for the virtual machines.

Page: 1 / 6
Total 56 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 29 Sep 2025