exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 3 question 20 discussion

Actual exam question from Microsoft's SC-200
Question #: 20
Topic #: 3
[All SC-200 Questions]

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are configuring Azure Sentinel.
You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.
Solution: You create a Microsoft incident creation rule for a data connector.
Does this meet the goal?

  • A. Yes
  • B. No
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
eddz25
Highly Voted 2 years, 3 months ago
No Creating a Microsoft incident creation rule for a data connector will not meet the goal of creating an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected. An incident creation rule is used to create incidents in Azure Sentinel based on specific criteria, such as when a certain number of alerts are triggered within a certain timeframe. While an incident creation rule can be used in conjunction with data connectors to analyze data from other sources, it does not directly detect sign-ins from malicious IP addresses. To detect sign-ins from malicious IP addresses, you would need to create an analytics rule that looks for specific signs of a malicious IP address, such as a high number of failed login attempts or login attempts from a known malicious IP. Once the rule detects a sign-in from a malicious IP, it can trigger an alert, which can then be used to create an incident in Azure Sentinel.
upvoted 14 times
uday1985
1 year ago
link supporting your answer ?
upvoted 2 times
...
...
Metasploit
Highly Voted 2 years, 6 months ago
Selected Answer: A
YES. https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#configure-the-incident-creation-settings
upvoted 5 times
...
a_kto_to
Most Recent 3 weeks, 2 days ago
Selected Answer: B
ChatGTP: NO, scheduled KQL query ✅ Correct approach: Create a Scheduled Analytics Rule in Sentinel using KQL.
upvoted 1 times
...
cdtplug
8 months ago
Yes according to Copilot Yes, creating a scheduled query rule for a data connector in Azure Sentinel can meet the goal of creating an incident when a sign-in to an Azure virtual machine from a malicious IP address is detected. Here’s why: Scheduled Query Rule: This rule can be configured to run at regular intervals and check for specific conditions, such as sign-ins from malicious IP addresses. Data Connector: By using a data connector, you can ingest relevant log data (e.g., Azure Activity logs, Sign-in logs) into Azure Sentinel. Incident Creation: When the query detects a sign-in from a malicious IP address, it can trigger an alert, which can then be configured to create an incident in Azure Sentinel
upvoted 1 times
...
CollabGuy
1 year, 3 months ago
Selected Answer: B
No. Microsoft Incident Creation rule is to "pull" the incidents created by other Microsoft products (Defender for Endpoint, Defender for Cloud, etc) into Sentinel. This alone would not create an incident from a sign-in from a malicious IP address
upvoted 3 times
...
chepeerick
1 year, 6 months ago
Correct
upvoted 1 times
...
mali1969
1 year, 8 months ago
Selected Answer: A
The answer is A. Yes. Creating a Microsoft incident creation rule for a data connector is a valid way to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.
upvoted 2 times
...
RV025
1 year, 8 months ago
this question is duplicate of question 18 and doesn't make sense
upvoted 1 times
...
tonatiuhop
1 year, 9 months ago
Selected Answer: A
Yes https://learn.microsoft.com/en-us/azure/sentinel/create-incidents-from-alerts
upvoted 2 times
...
D_PaW
1 year, 11 months ago
Selected Answer: B
B - No. The key word is the "Creation" in "Incident Creation Rule" In Azure Sentinel, an Incident Creation Rule and an Incident Rule are two different components used in the incident management workflow: Incident Creation Rule: An Incident Creation Rule is responsible for identifying and creating incidents based on specific conditions or triggers. It is typically used to detect specific patterns, events, or anomalies in the collected data. When the conditions defined in the rule are met, an incident is automatically generated. Incident Rule: An Incident Rule, also known as an Analytics Rule, is responsible for performing analysis on the collected data to identify potential security threats or suspicious activities. It applies specific logic or queries to the data to identify notable events or behavior. When the rule's conditions are met, it generates a notable event, which can later be investigated and potentially escalated to an incident.
upvoted 1 times
...
omar_alhajsalem
1 year, 11 months ago
Selected Answer: B
not meet the goal
upvoted 2 times
...
evilprime
2 years, 1 month ago
Yes. Creating a Microsoft incident creation rule for a data connector can meet the goal of creating an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected. You can create a query that searches for sign-ins to Azure virtual machines from suspicious or malicious IP addresses, and then use that query in a Microsoft incident creation rule. When the rule detects a match, it can create an incident in Azure Sentinel that contains details about the suspicious sign-in. This can enable security teams to investigate the incident and take appropriate actions to mitigate any threats.
upvoted 2 times
...
[Removed]
2 years, 2 months ago
Selected Answer: A
A. Yes, creating a Microsoft incident creation rule for a data connector can meet the goal of creating an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected.
upvoted 2 times
...
amsioso
2 years, 7 months ago
YES https://docs.microsoft.com/en-us/azure/sentinel/connect-defender-for-cloud https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/azure-security-center-auto-connect-to-sentinel/ba-p/1387539
upvoted 1 times
...
Andreew883
3 years, 3 months ago
Correct - yes.
upvoted 2 times
...
DigitalNomad
3 years, 5 months ago
I think this is the correct answer , as this kind of alert is generated by ASC , so we need the Microsoft incident creation rule to create incidents from ASC into sentinel. see https://docs.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago