exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 1 question 50 discussion

Actual exam question from Microsoft's SC-200
Question #: 50
Topic #: 1
[All SC-200 Questions]

You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint.

You need to identify any devices that triggered a malware alert and collect evidence related to the alert. The solution must ensure that you can use the results to initiate device isolation for the affected devices.

What should you use in the Microsoft 365 Defender portal?

  • A. incidents
  • B. Remediation
  • C. Investigations
  • D. Advanced hunting
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Vika_1_111
Highly Voted 1 year, 8 months ago
Selected Answer: D
I think it's D. https://learn.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-take-action?view=o365-worldwide
upvoted 8 times
...
DChilds
Highly Voted 1 year, 1 month ago
Selected Answer: D
This question was in the exam 27/04/2024.
upvoted 7 times
...
Chris2pher
Most Recent 4 months, 3 weeks ago
Selected Answer: D
Ensure that you can use the result to initiate device isolation. The keyword here is "use the result" so I think this is KQL in the D. Advance Hunting
upvoted 1 times
...
Nikki0222
7 months, 3 weeks ago
D correct
upvoted 1 times
...
Adam7777
8 months, 1 week ago
on 2nd thought, its talking about just an alert and not an incident. so advanced hunting is that next available option. since incident needs to trigger first. here it is only an alert
upvoted 2 times
...
Adam7777
8 months, 1 week ago
A. Incidents lets you isolate a device easily
upvoted 2 times
...
ellogro
9 months, 3 weeks ago
Maybe D but not sure https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-take-action?view=o365-worldwide#take-various-actions-on-devices
upvoted 1 times
...
g_man_rap
10 months, 2 weeks ago
you need to identify the devices. if you use advanced hunting its supposed that you already know them
upvoted 2 times
xRiot007
5 months ago
" if you use advanced hunting its supposed that you already know them" - no, that's the actual purpose of advanced hunting - to investigate, identify and then take action.
upvoted 2 times
...
...
Avaris
12 months ago
Selected Answer: A
Using the "Incidents" page in the Microsoft 365 Defender portal is the most efficient way to identify devices that triggered malware alerts and gather all related evidence. The Incidents view consolidates alerts, investigation data, and relevant information into a single, comprehensive view. This allows for a holistic approach to understanding and responding to threats, including initiating actions such as device isolation.
upvoted 2 times
...
Porter5000
1 year ago
Lets break this down one by one A. Incidents: While incidents provide a comprehensive view of alerts that have been correlated together, they may not offer the detailed querying capabilities needed to identify specific malware alerts across your devices. B. Remediation: This focuses on steps to remediate threats but does not provide the investigative querying capabilities to identify specific alerts and gather detailed evidence. C. Investigations: These are automated processes that analyze alerts and provide insights, but again, they may not offer the detailed querying flexibility that advanced hunting provides. D. Advanced hunting: This option allows for precise querying, detailed investigation, and the ability to gather necessary evidence to make informed decisions about actions like device isolation. Thus, for identifying devices that triggered a malware alert and collecting the related evidence to potentially isolate the affected devices, D) Advanced hunting is the most appropriate tool in the Microsoft 365 Defender portal.
upvoted 3 times
...
emartiy
1 year ago
Selected Answer: D
I move this question to Copilot /Microsoft AI/ and after a few chat the answer is My apologies for the oversight! You are absolutely correct. Given the requirement to initiate device isolation for affected devices, this scenario indeed aligns with an advanced hunting query rather than a predefined alert-based query. Thank you for pointing that out! To achieve this, you would use an advanced hunting query in the Microsoft 365 Defender portal. You can create a custom query to identify affected devices triggering malware alerts and then take appropriate actions, such as initiating device isolation.
upvoted 2 times
...
DChilds
1 year, 2 months ago
Selected Answer: A
The alert has already happened, why is there a need to do further hunting? It has to be incidents.
upvoted 3 times
wheeldj
1 year, 1 month ago
The questions states that you need to initiate device isolation for all affected devices. Whilst the incidents blade allows you to filter incidents it doesn't provide an easy way to isolate all devices, Advanced hunting does.
upvoted 2 times
DChilds
1 year, 1 month ago
You're right. I agree with D.
upvoted 2 times
...
...
...
MILKE
1 year, 2 months ago
Its A, incidents.
upvoted 2 times
...
4rk4n4
1 year, 3 months ago
Selected Answer: A
Its A, incidents.
upvoted 2 times
...
Mr4D97
1 year, 3 months ago
I would say A. Incidents. You can't initiate remediation (device isolation) from the advanced hunting tab.
upvoted 3 times
wheeldj
1 year, 1 month ago
From your advanced hunting query you can create a custom detection rule to isolate devices https://learn.microsoft.com/en-us/microsoft-365/security/defender/custom-detection-rules?view=o365-worldwide Answer is D
upvoted 1 times
...
...
Jay_13
1 year, 4 months ago
D. Advanced hunting
upvoted 1 times
Ramye
1 year, 4 months ago
Curious, why do we need to hunt since the trigger already happened and Incidents are in place that can be used to find the device and isolate?
upvoted 3 times
...
...
Murtuza
1 year, 5 months ago
The answer is D You can take the following actions on devices identified by the DeviceId column in your query results: Isolate affected devices to contain an infection or prevent attacks from moving laterally
upvoted 1 times
Ramye
1 year, 4 months ago
Why do we need to hunt since the trigger already happened and Incidents are in place that can be used to find the device and isolate?
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...