exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 3 question 28 discussion

Actual exam question from Microsoft's SC-200
Question #: 28
Topic #: 3
[All SC-200 Questions]

You are configuring Azure Sentinel.
You need to send a Microsoft Teams message to a channel whenever an incident representing a sign-in risk event is activated in Azure Sentinel.
Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. Enable Entity behavior analytics.
  • B. Associate a playbook to the analytics rule that triggered the incident.
  • C. Enable the Fusion rule.
  • D. Add a playbook.
  • E. Create a workbook.
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Eltooth
Highly Voted 2 years, 7 months ago
I would say B & D as you need the playbook to be created first then associated.
upvoted 38 times
7c0a
11 months ago
I'm with you. UEBA (answer A) indeed have multiple sign in activity related rules, but don't forget about the identity protection connector, and even custom made analytical rules, which makes answer B most appropriate - Associate a playbook to the analytics rule that triggered the incident.
upvoted 2 times
...
JohnAvlakiotis
2 years, 7 months ago
I'm leaning towards the same answer as you, since it was my first reaction.
upvoted 4 times
...
AlaReAla
2 years, 7 months ago
I echo
upvoted 3 times
...
...
Python46
Highly Voted 2 years, 2 months ago
Hi all, I did the exam yesterday and this came up, I selected B&D and scored 925
upvoted 31 times
...
chepeerick
Most Recent 6 months, 4 weeks ago
Selected Answer: AB
Correct option
upvoted 1 times
...
[Removed]
1 year, 2 months ago
Selected Answer: BD
Add a playbook to Azure Sentinel that includes the action to send a message to a Microsoft Teams channel. Associate the playbook to the analytics rule that triggers the incident.
upvoted 1 times
...
[Removed]
1 year, 3 months ago
So the playbook was already created? You can associate if there is no playbook. I would have to pick B&D.
upvoted 1 times
...
eddz25
1 year, 4 months ago
Selected Answer: B
To send a Microsoft Teams message to a channel whenever an incident representing a sign-in risk event is activated in Azure Sentinel, you will need to perform two actions: Add a playbook: A playbook is a set of actions that can be triggered in response to an incident, such as sending a message to a channel in Microsoft Teams. To add a playbook, you will need to navigate to the Playbooks tab in Azure Sentinel and create a new playbook that includes an action to send a message to a Microsoft Teams channel. Associate a playbook to the analytics rule that triggered the incident: After creating the playbook, you will need to associate it with the analytics rule that triggered the incident. This can be done by navigating to the Analytics tab in Azure Sentinel, select the analytics rule that you want to associate the playbook with, and then selecting the "Associate Playbook" button and selecting the playbook that you created.
upvoted 1 times
...
BhanuD
1 year, 6 months ago
I think there is similar question but it was incident access from suspicious iPaddress and for that no need to enable entity behaviour hence the steps were Associate Playbook and Add playbook but for this issue is related to sign-in risk event which needed signin logs data source which has to enabled first, hence the answers changed to A and B
upvoted 1 times
...
Metasploit
1 year, 6 months ago
Selected Answer: BD
Answer is D Add a playbook B Associate a playbook to the analytics rule that triggered the incident. UEBA also requires data sources from Azure and/or Thirdparty and will be able to help analyze and investigate an incident. This is not relevant to the question. So we have to assume data connectors are in place.
upvoted 6 times
...
Fukacz
1 year, 8 months ago
Selected Answer: BD
B+D is the right way
upvoted 2 times
...
Whatsamattr81
1 year, 9 months ago
Surely would be easier to connect Identity Protection to Sentinel than use the UEBA stuff... Which seems more for intelligent insider risk (i think - never used EUBA). I'd go B and D.
upvoted 2 times
...
Kamal_SriLanka
1 year, 10 months ago
Answer is B and D
upvoted 1 times
...
Lion007
1 year, 10 months ago
Selected Answer: AB
Correct answers A&B. You can't assume you have the data source needed to capture risky sign-ins. You should check whether you have the required data source on First then worry about how to do the rest. So answer A is required. Now that you are left with only one remaining correct answer. D on its on doesn't provide a complete solution (having a playbook on its own is not enough). Hence answer B provides a complete solution.
upvoted 1 times
Lion007
1 year, 10 months ago
I take it back. Correct answers should be A & D. See Question #22 previously had the same options and the correct answers where "Add a playbook" then "Associate a playbook to an incident"
upvoted 2 times
...
...
M20200713
2 years, 1 month ago
Selected Answer: BD
BD aswell
upvoted 1 times
...
homeysl
2 years, 1 month ago
Selected Answer: BD
should be BD
upvoted 1 times
...
RckStdy
2 years, 2 months ago
Selected Answer: AB
A, Risky sign in has to do with Entity behavior analytics. B, agree with everyone else
upvoted 3 times
...
RckStdy
2 years, 2 months ago
It seems like answer A is related to the fact that it is "an incident representing a sign-in risk event" and sign in risks are in the category of Entity Behavior. Not sure, but that is only thing I can find to make answer A make sense.
upvoted 2 times
...
RckStdy
2 years, 2 months ago
The scenario in the link about playbooks goes along with answer B. Orchestration Use the SOC chat platform to better control the incidents queue. For example: A Microsoft Sentinel incident was created from an alert by an analytics rule that generates username and IP address entities. The incident triggers an automation rule which runs a playbook with the following steps: Start when a new Microsoft Sentinel incident is created. Send a message to your security operations channel in Microsoft Teams or Slack to make sure your security analysts are aware of the incident. Send all the information in the alert by email to your senior network admin and security admin. The email message will include Block and Ignore user option buttons. Wait until a response is received from the admins, then continue to run. If the admins have chosen Block, send a command to the firewall to block the IP address in the alert, and another to Azure AD to disable the user.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...