Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Microsoft SC-200 Exam Actual Questions

The questions for SC-200 were last updated at Nov. 3, 2022.
  • Viewing page 1 out of 32 pages.
  • Viewing questions 1-4 out of 133 questions

Topic 1 - Question Set 1

Question #1 Topic 1

DRAG DROP -
You are investigating an incident by using Microsoft 365 Defender.
You need to create an advanced hunting query to count failed sign-in authentications on three devices named CFOLaptop, CEOLaptop, and COOLaptop.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Select and Place:

Reveal Solution Hide Solution   Discussion   21

Correct Answer:

Question #2 Topic 1

You need to receive a security alert when a user attempts to sign in from a location that was never used by the other users in your organization to sign in.
Which anomaly detection policy should you use?

  • A. Impossible travel
  • B. Activity from anonymous IP addresses
  • C. Activity from infrequent country
  • D. Malware detection
Reveal Solution Hide Solution   Discussion   25

Correct Answer: C 🗳️
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/anomaly-detection-policy

Question #3 Topic 1

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.
You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters.
You need to create a data loss prevention (DLP) policy to protect the sensitive documents.
What should you use to detect which documents are sensitive?

  • A. SharePoint search
  • B. a hunting query in Microsoft 365 Defender
  • C. Azure Information Protection
  • D. RegEx pattern matching
Reveal Solution Hide Solution   Discussion   25

Correct Answer: C 🗳️
Reference:
https://docs.microsoft.com/en-us/azure/information-protection/what-is-information-protection

Question #4 Topic 1

Your company uses line-of-business apps that contain Microsoft Office VBA macros.
You need to prevent users from downloading and running additional payloads from the Office VBA macros as additional child processes.
Which two commands can you run to achieve the goal? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A.

B.

C.

D.

Reveal Solution Hide Solution   Discussion   32

Correct Answer: BC
Reference:
https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...