Answer is C:
A. User enrichment settings in the context of Defender for Cloud Apps typically involve enriching user data with additional info from external sources. While user enrichment can be beneficial, it is not directly related to investigating threats using the unified audit log.
B. The Azure connector is generally used for connecting Defender for Cloud Apps to Azure services. It is not specifically related to investigating threats in the unified audit log.
C. Configuring the Office 365 connector allows Microsoft Defender for Cloud Apps to collect and analyze audit logs, which are vital for investigating and responding to security threats.
D. While automatic log upload settings are important for ensuring that the logs are regularly uploaded, it's the configuration of the specific connectors (such as the Office 365 connector) that determines which logs are collected and made available for investigation.
This new question arrived today 9th september 2023.
Can someone please verify the correct answer?
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.SC-200 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Porter5000
Highly Voted 1 year, 4 months agoNikki0222
Most Recent 7 months, 3 weeks agoconu
1 year, 2 months agochepeerick
1 year, 7 months agoNICKTON81
1 year, 9 months agomali1969
1 year, 9 months agoFez786
1 year, 9 months ago