Correct.
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response.
Azure Sentinel comes with a number of connectors for Microsoft solutions, available out of the box and providing real-time integration, including Microsoft 365 Defender (formerly Microsoft Threat Protection) solutions, and Microsoft 365 sources, including Office 365, Azure AD, Microsoft Defender for Identity (formerly Azure ATP), and Microsoft Cloud App Security, and more.
https://docs.microsoft.com/en-us/azure/sentinel/overview
Also true, Azure Sentinel is never mentioned in any of the Microsoft exam prepation manual, so unless you studied other exams, happen to know it or visit sites like these you don't get the knowledge you need to go on exam.
A is the answer.
https://learn.microsoft.com/en-us/azure/sentinel/overview
Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise. With Microsoft Sentinel, you get a single solution for attack detection, threat visibility, proactive hunting, and threat response.
https://learn.microsoft.com/en-us/azure/sentinel/overview#collect-data-by-using-data-connectors
Microsoft Sentinel comes with many connectors for Microsoft solutions that are available out of the box and provide real-time integration. Some of these connectors include:
- Azure service sources like Azure Active Directory, Azure Activity, Azure Storage, Azure Key Vault, Azure Kubernetes service, and more.
Azure Sentinel is a cloud-native security information and event management (SIEM) and security orchestration automated response (SOAR) solution. It can be used to collect and analyze security events from various sources, including Azure Active Directory (Azure AD). With Azure Sentinel, you can use predefined queries, built-in connectors, and the use of playbooks to investigate and respond to security incidents.
This section is not available anymore. Please use the main Exam Page.AZ-900 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
jamesf
Highly Voted 2 years, 11 months agopatje
Highly Voted 2 years, 9 months agoOlamz
2 years, 9 months agoAppuhami
Most Recent 6 months, 1 week agozellck
1 year, 3 months agozellck
1 year, 3 months agozellck
1 year, 3 months agoHHHo
2 years agotacobear
2 years, 1 month agoBea25
2 years, 2 months agoAjaykrish
2 years, 5 months agoJason71
2 years, 6 months agoalex1491
2 years, 6 months agoOsmanly
2 years, 8 months agofercho
2 years, 8 months agoSarahxx
2 years, 9 months agoJudah
2 years, 11 months agorickysanyal
3 years agotvl
3 years ago