exam questions

Exam MS-500 All Questions

View all questions & answers for the MS-500 exam

Exam MS-500 topic 2 question 33 discussion

Actual exam question from Microsoft's MS-500
Question #: 33
Topic #: 2
[All MS-500 Questions]

You have an Azure Sentinel workspace that has an Azure Active Directory (Azure AD) connector and a Microsoft Office 365 connector.
You need to use a Fusion rule template to detect multistage attacks in which users sign in by using compromised credentials, and then delete multiple files from
Microsoft OneDrive.
Based on the Fusion rule template, you create an active rule that has the default settings.
What should you do next?

  • A. Add data connectors.
  • B. Add a workbook.
  • C. Add a playbook.
  • D. Create a custom rule template.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mbecile
Highly Voted 3 years, 4 months ago
The given answer, B, is correct. If you have Microsoft Sentinel (via Azure AD Premium P1 or P2), you should have the Fusion-based rule with all available connectors enabled by default. > Azure Portal > Microsoft Sentinel > Configuration: Analytics > Advanced Multistage Attack Detection (Rule Type: Fusion, Status: Enabled) Source: https://docs.microsoft.com/en-us/azure/sentinel/configure-fusion-rules The scenario given in the question is already able to be detected by this default rule. Source: https://docs.microsoft.com/en-us/azure/sentinel/fusion-scenario-reference#mass-file-deletion-following-suspicious-azure-ad-sign-in If you are wanting to see a history of this type of event taking place in the organization, you only need to create a Microsoft Sentinel Workbook for it. https://docs.microsoft.com/en-us/azure/sentinel/monitor-your-data
upvoted 10 times
EzeQ
2 years, 9 months ago
I did upvote this question, but in my view the correct option is B, because from the same source you "In order to enable these Fusion-powered attack detection scenarios, any data sources listed must be ingested to your Log Analytics workspace." https://docs.microsoft.com/en-us/azure/sentinel/fusion-scenario-reference
upvoted 2 times
...
...
pete26
Highly Voted 2 years, 10 months ago
Selected Answer: B
MeasureUp prep test states it is a workbook. They are the official Microsoft Test Partner.
upvoted 7 times
...
Maxx4
Most Recent 1 year, 11 months ago
Selected Answer: C
The answer is C, Add a playbook. A playbook is a collection of tasks that can be automated to respond to a security incident. In this case, you can create a playbook that will: Investigate the incident by gathering information from Azure AD and Microsoft OneDrive. Notify the appropriate personnel of the incident. Take steps to mitigate the incident, such as blocking the compromised account. By adding a playbook to your active rule, you can ensure that your organization is prepared to respond to multistage attacks in a timely and effective manner. The other options are incorrect. Adding data connectors will not help you to detect multistage attacks. Adding a workbook will allow you to visualize the data that is collected by your active rule, but it will not help you to respond to incidents. Creating a custom rule template is not necessary in this case, as you can use the default settings of the Fusion rule template.
upvoted 1 times
...
GPerez73
2 years ago
Selected Answer: C
It is C for me.Question is about automation, so playbook
upvoted 2 times
...
abrub
2 years, 2 months ago
Selected Answer: B
Just says 'detect'. B
upvoted 1 times
...
mcclane654
2 years, 4 months ago
Selected Answer: B
They way I understand it after some research is that everything is already enabled. so nothing more has to be done. for example the question starts by telling us that the connectors are already set up. However a workbook makes it easier to monitor and therefore has to be the right answer. Video from Microsoft security showing a demo: https://www.youtube.com/watch?v=2QGN34n6mSo&ab_channel=MicrosoftSecurity
upvoted 1 times
...
ARYMBS
3 years ago
Selected Answer: C
C? PLAYbook is the automation which you create not the WORKbook...
upvoted 4 times
...
Hei
3 years, 2 months ago
The question did mention it is using a template. I did a lookup it seems all the data sources are added in a rule template so probably no need to add data connector. https://docs.microsoft.com/en-us/azure/sentinel/configure-fusion-rules
upvoted 4 times
...
kakakayayaya
3 years, 4 months ago
A - the answer. Azure AD and Office 365 connectors do not provide OneDrive logs.
upvoted 1 times
...
mkoprivnj
3 years, 5 months ago
Selected Answer: B
B is correct!
upvoted 6 times
...
AlexanderSaad
3 years, 5 months ago
Create an automation rule Create a playbook Add actions to a playbook Attach a playbook to an automation rule or an analytics rule to automate threat response https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook
upvoted 5 times
...
Rstilekar
3 years, 6 months ago
You don’t need to have connected all the data sources listed above in order to make Fusion for emerging threats work. However, the more data sources you have connected, the broader the coverage, and the more threats Fusion will find. So A is more correct. The doc doenst mention anything on playbook and workbook (https://docs.microsoft.com/en-us/azure/sentinel/fusion#configure-scheduled-analytics-rules-for-fusion-detections)
upvoted 2 times
...
Brandon_2319
3 years, 6 months ago
I believe A is correct based off this doc. https://docs.microsoft.com/en-us/azure/sentinel/connect-data-sources
upvoted 1 times
...
Fluffhead
3 years, 7 months ago
A is correct. The next step in using the Fusion rule template is to create data connections
upvoted 2 times
...
saeedsaf
3 years, 8 months ago
The link provided points towards creating a workbook, but does not relate to Fusion detections. The answer is most likely A since Fusion detection relies on multiple data sources and we only have Azure AD/Office 365 connected, but nothing from on-prem. https://docs.microsoft.com/en-us/azure/sentinel/fusion#configure-scheduled-analytics-rules-for-fusion-detections
upvoted 2 times
...
kiketxu
4 years, 2 months ago
Agree with B.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...