exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 1 question 7 discussion

Actual exam question from Microsoft's SC-200
Question #: 7
Topic #: 1
[All SC-200 Questions]

HOTSPOT -
You have a Microsoft 365 E5 subscription.
You plan to perform cross-domain investigations by using Microsoft 365 Defender.
You need to create an advanced hunting query to identify devices affected by a malicious email attachment.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/mtp/advanced-hunting-query-emails-devices?view=o365-worldwide

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
teehex
Highly Voted 4 years ago
EmailAttachmentInfo | where SenderFromAddress =~ "[email protected]" //Get emails with attachments identified by a SHA-256 | where isnotempty(SHA256) | join ( //Check devices for any activity involving the attachments DeviceFileEvents | project FileName, SHA256 ) on SHA256 | project Timestamp, FileName , SHA256, DeviceName, DeviceId, NetworkMessageId, SenderFromAddress, RecipientEmailAddress Already posted here https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#check-if-files-from-a-known-malicious-sender-are-on-your-devices
upvoted 52 times
JoeP1
1 year, 10 months ago
On that web site the current version has "| project FileName, SHA256, DeviceName, DeviceId" with both DevcieName and DeviceId on that line. Without DeviceName and DeviceId explicitly listed it should probably be Extend on that line with the full set of answers: Join, Extend, Project.
upvoted 3 times
...
...
PJR
Highly Voted 8 months, 1 week ago
The query posted on MS docs doesnt actually work (I have tested in a live tenant) - it needs to be amended to match the below before it returns results (note the requirement to add DeviceName, and DeviceId fields to the first project statement). EmailAttachmentInfo | where SenderFromAddress =~ "[email protected]" | where isnotempty(SHA256) | join ( DeviceFileEvents | project FileName, SHA256, DeviceName, DeviceId ) on SHA256 | project Timestamp, FileName , SHA256, DeviceName, DeviceId, NetworkMessageId, SenderFromAddress, RecipientEmailAddress But if you choose the following from the answers presented in the question you will get the results you need to answer the question: EmailAttachmentInfo | where SenderFromAddress =~ "[email protected]" | where isnotempty(SHA256) | join ( DeviceFileEvents | extend FileName, SHA256 ) on SHA256 | project Timestamp, FileName, SHA256, DeviceName, DeviceId, NetworkMessageId, SenderFromAddress, RecipientEmailAddress ie Choose, Join, Extend, Project from the drop downs This has also been tested on live tenants and returns the correct result.
upvoted 36 times
DigitalNomad
3 years, 7 months ago
you are correct , I have tested it ,the query in the docs is correct as it contains DeviceName , DeviceId , but the one in the exam question is missing the DeviceName , DeviceId , so the answer should be Join , Extend , Project as you mentioned , but in case the real exam question has DeviceName , DeviceId then Join , Project , Project can be a correct answer like the example in the docs
upvoted 7 times
Contactfornitish
3 years, 3 months ago
Well! Extend operator is for calculated columns and would followed by a custom variable name and equal to sign (something akin to let but in context of table) Doesn't make sense to use the same in join context https://docs.microsoft.com/en-us/azure/data-explorer/kusto/query/extendoperator
upvoted 3 times
Contactfornitish
3 years, 3 months ago
Refer to topic 1 question 17 on examtopics itself for differently worded but the same query
upvoted 1 times
...
...
...
arcausbd
1 year, 8 months ago
Microsoft documents correct but in the above question DeviceName, DeviceId are missing. as per Microsoft documents Kusto query should be: EmailAttachmentInfo | where SenderFromAddress =~ "[email protected]" //Get emails with attachments identified by a SHA-256 | where isnotempty(SHA256) | join ( //Check devices for any activity involving the attachments DeviceFileEvents | project FileName, SHA256, DeviceName, DeviceId ) on SHA256 | project Timestamp, FileName , SHA256, DeviceName, DeviceId, NetworkMessageId, SenderFromAddress, RecipientEmailAddress link: https://learn.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#:~:text=Check%20if%20files%20from%20a%20known%20malicious%20sender%20are%20on%20your%20devices
upvoted 1 times
...
...
Nikki0222
Most Recent 7 months, 1 week ago
Join , project, project
upvoted 2 times
...
Apocalypse03
8 months, 1 week ago
The EmailAttachmentInfo table is selected, which contains information about email attachments. The where clause filters the attachments to only include those that were sent from the address "[email protected]" and have a non-empty SHA256 hash value. This effectively filters the results to only include attachments from the specified sender and that have a known hash value. The join operator combines the results of the previous step with the results of a second query that selects the DeviceFileEvent table and projects the FileName and SHA256 fields. This effectively creates a join between the two tables based on the SHA256 field, linking the attachments with file events on devices. The project operator selects the desired fields from the joined results and includes them in the final output.
upvoted 2 times
...
0610fcd
8 months, 1 week ago
EmailAttachmentInfo | where SenderFromAddress =~ "[email protected]" //Get emails with attachments identified by a SHA-256 | where isnotempty(SHA256) | join ( //Check devices for any activity involving the attachments DeviceFileEvents | project FileName, SHA256, DeviceName, DeviceId ) on SHA256 | project Timestamp, FileName , SHA256, DeviceName, DeviceId, NetworkMessageId, SenderFromAddress, RecipientEmailAddress
upvoted 1 times
...
KTM_999
8 months, 1 week ago
Check file from a known malicious sender EmailAttachmentInfo | where SenderFromAddress =~ "[email protected]" //Get emails with attachments identified by a SHA-256 | where isnotempty(SHA256) | join ( //Check devices for any activity involving the attachments DeviceFileEvents | project FileName, SHA256, DeviceName, DeviceId ) on SHA256 | project Timestamp, FileName , SHA256, DeviceName, DeviceId, NetworkMessageId, SenderFromAddress, RecipientEmailAddress - https://learn.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#check-if-files-from-a-known-malicious-sender-are-on-your-devices
upvoted 1 times
...
scfitzp
10 months, 3 weeks ago
You have to use join, EXTEND, project. If you use join, project, project you get the following error 'project' operator: Failed to resolve scalar expression named 'DeviceName'
upvoted 1 times
...
4b097e5
11 months, 1 week ago
given answer is correct as you can project anything and it doesn't matter if the question doesn't have device name and device id in it as compared to Microsoft docs. The answer should still remain the same as Join, Project, Project
upvoted 1 times
...
emartiy
12 months ago
When clearly read this KQL hunting query.. First you get EmailAttachmentInfo based on some filters and then add second column by using Join operator (check this syntax and you will see it is clearly "Join") the other 2 is Project. You return selected entities of event table log to merge all in a table (output). I will chose Join, Project Project for my exam if I see this question in exam :)
upvoted 1 times
emartiy
12 months ago
First column of "Join" operator is Email AttachmentInfo and second column is DeviceFileEvents.. So join is the first selection and other 2 is only get specific entities in log table (FileName, TimesStamp, RecipientsEmailAddresses etc..
upvoted 1 times
...
...
Harryd82
1 year ago
Join, Extend, Project.
upvoted 1 times
...
ae88d96
1 year, 3 months ago
The answer provided is correct. It is also mentioned here https://learn.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#check-if-files-from-a-known-malicious-sender-are-on-your-devices
upvoted 2 times
...
smanzana
1 year, 6 months ago
join-extend-project —> for the answer presented for Exam Topics) or join-project-project —> if the answer were “join ( DeviceFileEvents | project FileName, SHA256, DeviceName, DeviceId ) on SHA256” —> including “DeviceName” and “DeviceId”
upvoted 1 times
mb0812
1 year, 3 months ago
Its wrong. extend keyword usage includes '='
upvoted 1 times
...
...
billo79152718
1 year, 10 months ago
join extend project
upvoted 2 times
...
donathon
1 year, 10 months ago
Join, Project, Project
upvoted 2 times
...
User_Mowgli
2 years, 7 months ago
Join, Extend, Project.
upvoted 1 times
...
danb67
2 years, 9 months ago
Correct Answer is 100% Join/Project/Project. This does not give error at all. Why would we use extend here? Extend is for creating calculated columns and there is no requirement for this. See https://www.examtopics.com/discussions/microsoft/view/60115-exam-sc-200-topic-1-question-17-discussion/ EmailAttachmentInfo | where isnotempty (SHA256) | join (DeviceFileEvents | project FileName, SHA256) on SHA256 | project Timestamp, NetworkMessageId, etc, etc
upvoted 2 times
Metasploit
2 years, 7 months ago
Please proof test before you answer. I receive the below errors when creating the hunting query on advanced hunting page with join,project,project. Why? because "Only the columns specified in the arguments are included in the result. Any other columns in the input are dropped." https://learn.microsoft.com/en-us/azure/data-explorer/kusto/query/projectoperator. For this current query to work, "DeviceName" and "DeviceID" need to be projected by the project within the join. "Error message 'project' operator: Failed to resolve scalar expression named 'DeviceName' How to resolve Fix semantic errors in your query" Correct answer is: Join, extend, project. Extend can just append a column as well.
upvoted 13 times
gyaansastra
2 years, 5 months ago
@Metasploit is absolutely correct.
upvoted 2 times
danb67
1 year, 7 months ago
Quite a few of the KQL queries in these dumps are wrong so I would not assume you are seeing the full query. I would be ready both both scenarios for the exam. Either the query above is in full and correct which means Metasploit is correcrt. Or the Query is missing the Projection of DeviceId and I am correct.
upvoted 1 times
...
...
danb67
1 year, 7 months ago
You recieve the error because the query is wrong and is missing DeviceName imo. So if the query itself is correct and not missing part of it then you are correct. If the query is wrong and is actally missing parts then I am correct.
upvoted 1 times
...
...
...
Shubham020
3 years, 2 months ago
The correct answer is join/extend/project This case is little different from the case given in the link below https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#check-if-files-from-a-known-malicious-sender-are-on-your-devices In this case inside join there is no DeviceName and DeviceID(in this queue), to join the column of this table we have to extend it. I tested this in live environment with join, project, project, it gives an error. Join, extend, project just says no results found and if I change the sender email address I'm getting results.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...