Exam Details

  • Exam Code
    :SC-200
  • Exam Name
    :Microsoft Security Operations Analyst
  • Certification
    :Microsoft Certifications
  • Vendor
    :Microsoft
  • Total Questions
    :394 Q&As
  • Last Updated
    :Mar 22, 2025

Microsoft Microsoft Certifications SC-200 Questions & Answers

  • Question 91:

    You receive a security bulletin about a potential attack that uses an image file.

    You need to create an indicator of compromise (IoC) in Microsoft Defender for Endpoint to prevent the attack.

    Which indicator type should you use?

    A. a URL/domain indicator that has Action set to Alert only

    B. a URL/domain indicator that has Action set to Alert and block

    C. a file hash indicator that has Action set to Alert and block

    D. a certificate indicator that has Action set to Alert and block

  • Question 92:

    You use Azure Sentinel.

    By using a built-in role, you have to provide a security analyst with the ability to edit the queries of custom Azure Sentinel workbooks.

    Which role should you assign to the analyst if using the principle of least privilege ?

    A. Security Administrator

    B. Azure Sentinel Responder

    C. Azure Sentinel Contributor

    D. Logic App Contributor

  • Question 93:

    You implement Safe Attachments policies in Microsoft Defender for Office 365.

    Users report that email messages containing attachments take longer than expected to be received.

    You need to reduce the amount of time it takes to deliver messages that contain attachments without compromising security. The attachments must be scanned for malware, and any messages that contain malware must be blocked.

    What should you configure in the Safe Attachments policies?

    A. Dynamic Delivery

    B. Replace

    C. Block and Enable redirect

    D. Monitor and Enable redirect

  • Question 94:

    You are responsible for responding to Azure Defender for Key Vault alerts.

    During an investigation of an alert, you discover unauthorized attempts to access a key vault from a Tor exit node.

    What should you configure to mitigate the threat?

    A. Key Vault firewalls and virtual networks

    B. Azure Active Directory (Azure AD) permissions

    C. role-based access control (RBAC) for the key vault

    D. the access policy settings of the key vault

  • Question 95:

    You have an Azure subscription that contains a Log Analytics workspace.

    You need to enable just-in-time (JIT) VM access and network detections for Azure resources.

    Where should you enable Azure Defender?

    A. at the subscription level

    B. at the workspace level

    C. at the resource level

  • Question 96:

    You use Azure Defender.

    You have an Azure Storage account that contains sensitive information.

    You need to run a PowerShell script if someone accesses the storage account from a suspicious IP address.

    Which two actions should you perform? Each correct answer presents part of the solution.

    NOTE: Each correct selection is worth one point.

    A. From Azure Security Center, enable workflow automation.

    B. Create an Azure logic app that has a manual trigger.

    C. Create an Azure logic app that has an Azure Security Center alert trigger.

    D. Create an Azure logic app that has an HTTP trigger.

    E. From Azure Active Directory (Azure AD), add an app registration.

  • Question 97:

    You have an Azure subscription that has Azure Defender enabled for all supported resource types.

    You need to configure the continuous export of high-severity alerts to enable their retrieval from a third- party security information and event management (SIEM) solution.

    To which service should you export the alerts?

    A. Azure Cosmos DB

    B. Azure Event Grid

    C. Azure Event Hubs

    D. Azure Data Lake

  • Question 98:

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while

    others might not have a correct solution.

    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

    You are configuring Azure Sentinel.

    You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

    Solution: You create a hunting bookmark. Does this meet the goal?

    A. Yes

    B. No

  • Question 99:

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while

    others might not have a correct solution.

    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

    You are configuring Azure Sentinel.

    You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

    Solution: You create a Microsoft incident creation rule for a data connector.

    Does this meet the goal?

    A. Yes

    B. No

  • Question 100:

    Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while

    others might not have a correct solution.

    After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

    You are configuring Azure Sentinel.

    You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.

    Solution: You create a scheduled query rule for a data connector.

    Does this meet the goal?

    A. Yes

    B. No

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SC-200 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.