exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 5 question 16 discussion

Actual exam question from Microsoft's SC-200
Question #: 16
Topic #: 5
[All SC-200 Questions]

You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR.

The security team at your company detects command and control (C2) agent traffic on the network. Agents communicate once every 50 hours.

You need to create a Microsoft Defender XDR custom detection rule that will identify compromised devices and establish a pattern of communication. The solution must meet the following requirements:

• Identify all the devices that have communicated during the past 14 days.
• Minimize how long it takes to identify the devices.

To what should you set the detection frequency for the rule?

  • A. Every 12 hours
  • B. Every 24 hours
  • C. Every three hours
  • D. Every hour
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Sekpluz
Highly Voted 11 months, 4 weeks ago
Selected Answer: A
I believe Option A is the correct answer. Here’s why: Once you create and run the rule for the first time, it will, by default, check for the last 30 days. This means we can already scan the past 14 days as stated in the question. Now, if we choose Option A, which is a 12-hour interval, it checks every 12 hours and scans back 48 hours. This is less than the 50 hours of the Command and Control (C&C), making it the most balanced option. Therefore, I would choose Option A. https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules
upvoted 5 times
...
OneplusOne
Most Recent 2 weeks, 1 day ago
Selected Answer: B
I've been battling with GPT for an hour. My gut says D since every hour with lookback window of 4 would catch the event fast. However, the frequencies with different lookback windows serve different purposes where the 24 hour frequency is ideal for rare or irregular activity. The risk of every hour detection: If you ever had a beacon every 50 hours, and your ingestion delay crept over 4 hours, or logs arrived late, you might miss the one shot — and that's where longer lookback rules shine (despite being slower). So I will choose B since it guarantees the event will be catched within the lookback window of more than 50 hours.
upvoted 1 times
...
0d0dde7
4 weeks ago
Selected Answer: C
chatgpt
upvoted 1 times
...
Optimizor_IT
2 months ago
Selected Answer: D
Set detection frequency to “Every hour” in the custom detection rule wizard (Step 2: Rule settings > Frequency). Lookback period = 14 days ensures all devices from the past 14 days are identified. 1-hour frequency minimizes identification time (max delay = 1 hour vs. 50-hour C2 cycle), meeting the “minimize how long” requirement. Why Not Others? A (12 hours): 12-hour delay—too slow for timely C2 response. B (24 hours): 24-hour delay—misses half a day, risking escalation. C (3 hours): 3-hour delay—better, but still triples the wait vs. hourly.
upvoted 3 times
...
Edindude
3 months, 4 weeks ago
Selected Answer: B
Using a 24-hour detection frequency would certainly work, but it might not be the most efficient choice for your scenario. Here’s why: Communication Pattern: Since the agents communicate once every 50 hours, setting the detection frequency to 24 hours may result in delayed identification of the compromised devices. There's a chance you might miss an entire communication window and only catch it on the next cycle, effectively identifying devices every 72 hours. Balance Between Timeliness and Efficiency: A 12-hour frequency strikes a better balance. It ensures that you have more frequent checks without significantly increasing the load on your system. This means that even if you miss one communication window, you're likely to catch it on the next 12-hour cycle, improving your chances of timely detection. Choosing a 12-hour frequency helps ensure more timely detection and a better understanding of the communication pattern while maintaining efficiency. If you have any more questions or need further assistance, feel free to ask!
upvoted 1 times
Edindude
3 months, 4 weeks ago
I meant to Click A sorry
upvoted 1 times
...
...
dejo
5 months, 2 weeks ago
Selected Answer: D
Don't have experience with CDR but I think about it this way: Hourly runs: Detects C2 communication at ~51 hours, looking back only 4 hours (fastest results) 3-hour runs: Also detects at ~51 hours but processes 12 hours of data (slower) 12-hour runs: Detects at 60 hours, checking 48 hours of data (slower results) 24-hour runs: Detects at 72 hours, checking 30 days of data (longest delay) The first time the rule is run, it will automatically cover the last 30 days, allowing us to examine the 14-day period as outlined in the question (requirement: Identify all the devices that have communicated during the past 14 days.)
upvoted 1 times
...
sapphire
6 months, 4 weeks ago
Selected Answer: B
B is correct answer https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules#rule-frequency
upvoted 2 times
54c341a
3 months ago
This is indeed correct. Every 24 hours - Runs every 24 hours, checking data from the past 30 days. Every 12 hours - Runs every 12 hours, checking data from the past 48 hours. Every 3 hours - Runs every 3 hours, checking data from the past 12 hours. Every hour - Runs hourly, checking data from the past 4 hours.
upvoted 1 times
...
...
12369b6
7 months, 1 week ago
B - every 24 hours You need to identify devices that have communicated during the past 14 days, and the agents communicate every 50 hours. Setting the detection frequency to every 24 hours ensures that you capture all relevant communications within a reasonable time frame while minimizing performance impact.
upvoted 1 times
...
talosDevbot
8 months ago
Selected Answer: B
Every 24 hours — runs every 24 hours, checking data from the past 30 days "Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored."
upvoted 4 times
Sparkletoss
7 months, 3 weeks ago
https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules
upvoted 1 times
...
...
g_man_rap
9 months, 3 weeks ago
Selected Answer: B
Communication Frequency of C2 Agents: The C2 agents communicate once every 50 hours. To effectively catch this communication pattern within the past 14 days, running the detection rule every 24 hours would be sufficient. This frequency allows you to regularly scan for the C2 traffic while balancing the resource usage and performance of your detection system.
upvoted 3 times
...
smosmo
1 year ago
Rule frequency When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback duration based on the frequency you choose: Every 24 hours—runs every 24 hours, checking data from the past 30 days Every 12 hours—runs every 12 hours, checking data from the past 48 hours Every 3 hours—runs every 3 hours, checking data from the past 12 hours Every hour—runs hourly, checking data from the past 4 hours Continuous (NRT)—runs continuously, checking data from events as they're collected and processed in near real-time (NRT), see Continuous (NRT) frequency
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...