Topic 3: Misc. Questions

You create an Azure subscription.
You enable Microsoft Defender for Cloud for the subscription.
You need to use Defender for Cloud to protect on-premises computers.
What should you do on the on-premises computers?

A. Configure the Hybrid Runbook Worker role

B. Install the Connected Machine agent

C. Install the Log Analytics agent

D. Install the Dependency agent.

C.   Install the Log Analytics agent

Explanation:
To protect on-premises computers using Microsoft Defender for Cloud, those machines must first connect to Azure Defender through a Log Analytics workspace. This connection is established by installing the Log Analytics agent (also known as the Microsoft Monitoring Agent - MMA) on each on-premises computer.
Once the Log Analytics agent is installed and reporting to the Defender for Cloud workspace:
Defender for Cloud can collect security data from the machine.
You can enable plans such as Defender for Servers or Defender for Endpoint for threat detection, vulnerability management, and compliance monitoring.
Security recommendations, alerts, and compliance assessments are then visible in Defender for Cloud.

Typical Setup Steps:
In the Azure portal → Microsoft Defender for Cloud → Environment Settings.
Connect an existing or create a new Log Analytics workspace.
On each on-premises computer, install the Log Analytics agent and configure it to report to that workspace.
Once done, Defender for Cloud starts monitoring those machines.

🚫 Why Other Options Are Incorrect:
A. Configure the Hybrid Runbook Worker role
Used for Azure Automation to run runbooks on-premises — unrelated to Defender for Cloud onboarding.
B. Install the Connected Machine agent
This is used for Azure Arc to manage servers as Azure resources — optional, not required for Defender for Cloud protection (though Defender can extend via Arc later).
D. Install the Dependency agent
This is used for map and dependency visualization (Service Map feature), but it requires the Log Analytics agent first — it’s not enough alone.

📘 Reference:
Microsoft Learn: Connect non-Azure machines to Microsoft Defender for Cloud
Microsoft Learn: Install the Log Analytics agent on Windows computers

Note: This question is part of a series of questions that present the same scenario.
Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are configuring Microsoft Defender for Identity integration with Active Directory.
From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.
Solution: You add each account as a Sensitive account.
Does this meet the goal?

A. Yes

B. No

B.   No

Explanation:
In Microsoft Defender for Identity, you can mark accounts as “Sensitive accounts” — but this is used to protect them, not to simulate or bait attackers.
Sensitive accounts (like domain admins, privileged users, etc.) are monitored more closely so that any suspicious activity involving them triggers high-severity alerts. However, they are not used as decoy or honeypot accounts to lure attackers.
To configure accounts for attackers to exploit, you must instead configure honeytoken accounts.

✅ What You Should Do Instead:
You should add each account as a Honeytoken account in the Defender for Identity portal. Honeytoken accounts are decoy Active Directory accounts that no legitimate user should use. If these accounts are accessed, Defender for Identity raises an immediate alert, indicating possible malicious activity.

🚫 Why This Solution Does NOT Meet the Goal:
Adding them as Sensitive accounts only increases monitoring sensitivity — it does not make them decoy accounts.
The goal explicitly states to “configure several accounts for attackers to exploit,” which refers to honeytokens, not sensitive accounts.

📘 Reference:
Microsoft Learn: Configure honeytoken accounts in Microsoft Defender for Identity
Microsoft Learn: Sensitive accounts in Defender for Identity

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are configuring Microsoft Defender for Identity integration with Active Directory. From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit. Solution: From Entity tags, you add the accounts as Honeytoken accounts. Does this meet the goal?

A. Yes

B. No

A.   Yes

Explanation:
The question asks you to configure several accounts for attackers to exploit using Microsoft Defender for Identity.
The correct way to do this is to designate them as Honeytoken accounts from the Entity tags section of the Defender for Identity portal.

What Are Honeytoken Accounts?
A honeytoken account is a decoy Active Directory account that should never be used for legitimate activity.
If an attacker attempts to authenticate or access resources using a honeytoken account, Defender for Identity immediately raises an alert, because such activity indicates compromise or reconnaissance.
This technique helps detect attackers early in the lateral movement or privilege escalation phase.

⚙️ How to Configure in Defender for Identity:
Go to Microsoft 365 Defender portal → Microsoft Defender for Identity → Entity tags. Select + Add tag → Choose Honeytoken account.
Add the desired AD accounts (decoys) to the list.

🚫 Why This Meets the Goal (and Others Don’t):
Adding as Sensitive accounts
→ Protects high-value accounts, doesn’t lure attackers.
Adding as Honeytoken accounts
→ Creates fake accounts specifically meant for attack detection.

📘 Reference:
Microsoft Learn: Configure honeytoken accounts in Microsoft Defender for Identity

You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365. You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters. You need to create a data loss prevention (DLP) policy to protect the sensitive documents. What should you use to detect which documents are sensitive?

A. SharePoint search

B. a hunting query in Microsoft 365 Defender

C. Azure Information Protection

D. RegEx pattern matching

D.   RegEx pattern matching

Explanation:
A 32-character alphanumeric pattern is a well-defined, structured piece of sensitive information. Regular Expression (RegEx) pattern matching is the core mechanism within Microsoft Purview DLP policies designed specifically for this purpose.
You would create a custom sensitive information type that uses a RegEx pattern (e.g., [a-zA-Z0-9]{32}) to accurately identify the customer account numbers within the documents stored in SharePoint Online. This method provides the precise, automated detection required for a DLP policy to either block sharing, require justification, or encrypt the documents.

Why the Other Options Are Not Correct
A. SharePoint search:
This is a manual, end-user tool for finding documents by name or content. It is not an enforceable, automated mechanism that can be integrated into a DLP policy to perform real-time protection actions like blocking or encrypting.
B. a hunting query in Microsoft 365 Defender:
Hunting queries are for proactive threat searching across logs and events after they have occurred. They are a reactive investigative tool, not a preventive control for enforcing data protection policies on documents at rest in SharePoint.
C. Azure Information Protection (AIP):
While AIP can classify and protect sensitive documents, its unified labeling client is being integrated into the Microsoft Purview suite. The modern, recommended approach is to use the sensitive information types and DLP policies within the Microsoft Purview compliance portal, which inherently use RegEx and other patterns for detection. Recommending "AIP" is less precise than specifying the core detection mechanism (RegEx) used by the DLP service.

Reference:
Microsoft Learn: Create a custom sensitive information type using PowerShell
This documentation details how to define a custom sensitive information type, which is built around a primary XML element containing the Regular Expression (RegEx) pattern.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have Linux virtual machines on Amazon Web Services (AWS). You deploy Azure Defender and enable auto-provisioning. You need to monitor the virtual machines by using Azure Defender. Solution: You enable Azure Arc and onboard the virtual machines to Azure Arc. Does this meet the goal?

A. Yes

B. No

B.   No

Explanation:
While the solution moves in the right direction, it is incomplete and therefore does not fully meet the goal. Here's why:

Azure Arc is a Prerequisite, Not the Final Step:
Enabling Azure Arc and onboarding the VMs is the correct first step. Azure Arc allows your AWS Linux VMs to be recognized and managed as "connected machines" within your Azure resource inventory. This is a mandatory requirement for using Azure Defender on non-Azure machines.
The Critical Missing Step:
The solution stops after onboarding to Azure Arc. To actually monitor the VMs using Azure Defender, you must take the additional step of enabling the Azure Defender for servers plan on the subscription that contains these Arc-connected servers. Simply connecting them via Arc does not automatically activate the threat detection, vulnerability assessment, and security monitoring provided by Azure Defender.
In short:
Azure Arc provides the connectivity, but you must still explicitly enable the security service (Azure Defender) to protect them.

Reference
Microsoft Learn: Protect non-Azure machines with Defender for Cloud
This documentation clearly outlines the two-part process: 1) Connect the machine with Azure Arc, and 2) Enable Defender for servers.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are configuring Azure Sentinel. You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected. Solution: You create a livestream from a query. Does this meet the goal?

A. Yes

B. No

B.   No

Explanation:
A livestream in Microsoft Sentinel is used for real-time monitoring of data — it allows analysts to observe ongoing events that match a specific KQL query.
However, a livestream does not generate incidents or alerts automatically. It is a threat hunting tool, not an alerting or automation mechanism.
To create incidents when specific conditions (like sign-ins from malicious IPs) are detected, you need to use an Analytics rule, not a livestream.

✅ Correct Approach:
To meet the goal, you should:
Create a Scheduled Analytics Rule in Azure Sentinel.
Use a Kusto Query Language (KQL) query that detects sign-ins from known malicious IPs.
Configure the rule to create an incident when the query conditions are met.
This allows Sentinel to continuously monitor logs (like SigninLogs or SecurityEvent) and trigger alerts/incidents automatically.

🚫 Why the Solution Does NOT Meet the Goal:
Livestreams allow real-time observation of data streams.
They do not trigger alerts or create incidents in Sentinel.
Only analytics rules can generate incidents.

📘 Reference:
Microsoft Learn: Create custom analytics rules in Microsoft Sentinel
Microsoft Learn: Use livestream to hunt in real time in Microsoft Sentinel

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are configuring Azure Sentinel. You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected. Solution: You create a hunting bookmark. Does this meet the goal?

A. Yes

B. No

B.   No

Explanation:
A hunting bookmark in Microsoft Sentinel is used to save specific findings from threat-hunting queries — it helps analysts track and investigate interesting events manually.
However, bookmarks do not automatically generate alerts or incidents. They are designed for manual investigation and evidence collection, not for automated detection and response.

✅ Correct Way to Meet the Goal:
To automatically create incidents when a sign-in to an Azure VM from a malicious IP is detected, you should:
Create a Scheduled Analytics Rule in Sentinel.
Write a KQL query (for example, using SigninLogs or SecurityEvent tables) that detects sign-ins from malicious IPs (using Microsoft Threat Intelligence or watchlists).
Configure the rule to trigger an alert and create an incident automatically.

🚫 Why This Solution Does NOT Meet the Goal:
Hunting bookmarks = manual, for investigation purposes.
Analytics rules = automated, for detection and incident creation. Therefore, a bookmark does not meet the goal of creating incidents automatically.

📘 Reference:
Microsoft Learn: Use bookmarks to save and investigate hunting findings
Microsoft Learn: Create custom analytics rules in Microsoft Sentinel

You have an Azure Sentinel deployment in the East US Azure region. You create a Log Analytics workspace named LogsWest in the West US Azure region. You need to ensure that you can use scheduled analytics rules in the existing Azure Sentinel deployment to generate alerts based on queries to LogsWest. What should you do first?

A. Deploy Azure Data Catalog to the West US Azure region.

B. Modify the workspace settings of the existing Azure Sentinel deployment

C. Add Microsoft Sentinel to a workspace.

D. Create a data connector in Azure Sentinel.

C.   Add Microsoft Sentinel to a workspace.

Explanation:
Microsoft Sentinel operates at the Log Analytics workspace level — each workspace can host its own Sentinel instance.
Your existing Sentinel deployment is in the East US region, connected to a specific Log Analytics workspace. If you create another workspace (LogsWest) in the West US region, that workspace is not automatically connected to your existing Sentinel instance.
To run scheduled analytics rules and generate alerts based on data in LogsWest, you must first enable Microsoft Sentinel on the LogsWest workspace.
Once Sentinel is added to that workspace, you can:
Create analytics rules based on queries in that workspace.
Generate alerts and incidents.
Use connectors, workbooks, and automation rules independently.

⚙️ Steps to Do This:
In the Azure portal, go to Microsoft Sentinel.
Select + Add.
Choose the LogsWest workspace.
Click Add Microsoft Sentinel.
After that, you can create analytics rules within the LogsWest Sentinel instance.

🚫 Why Other Options Are Incorrect:
A. Deploy Azure Data Catalog:
Not related to Sentinel or Log Analytics — used for data discovery and cataloging.
B. Modify workspace settings of the existing Sentinel deployment:
You cannot change or merge the workspace for an existing Sentinel instance; Sentinel is bound to its original workspace.
D. Create a data connector in Azure Sentinel:
Data connectors bring data into a workspace, but you cannot use a connector to make Sentinel in one workspace query another workspace.

📘 Reference:
Microsoft Learn: Regions supported by Microsoft Sentinel
Microsoft Learn: Add Microsoft Sentinel to a workspace
Microsoft Learn: Workspaces in Microsoft Sentinel

You have an Azure subscription that uses Microsoft Sentinel. You need to minimize the administrative effort required to respond to the incidents and remediate the security threats detected by Microsoft Sentinel. Which two features should you use? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A. Microsoft Sentinel bookmarks

B. Azure Automation runbooks

C. Microsoft Sentinel automation rules

D. Microsoft Sentinel playbooks

E. Azure Functions apps

C.   Microsoft Sentinel automation rules
D.   Microsoft Sentinel playbooks

Explanation:
To minimize administrative effort for incident response and remediation, you need to automate the workflow. This is achieved by combining Automation Rules and Playbooks in Microsoft Sentinel.

C. Microsoft Sentinel automation rules:
These are the orchestrators. They automatically trigger when an incident is created or updated. You use them to define:
What happens: Assign incidents to an analyst, change status/severity, add tags, and most importantly—trigger a playbook.
Automation rules handle the repetitive, tactical decisions about incident handling, reducing manual effort significantly.

D. Microsoft Sentinel playbooks:
These are the action-takers. A playbook is a collection of automated remediation and response steps, built on Azure Logic Apps. When triggered by an automation rule, a playbook can perform actions like:
Isolating a compromised VM in Azure.
Disabling a user account in Active Directory.
Sending a detailed notification to a Slack channel or ITSM tool.
Blocking a malicious IP address in a firewall.
Together, they form the complete automation solution: An Automation Rule automatically detects a new incident and triggers a Playbook to execute the complex remediation tasks.

Why the Other Options Are Incorrect
A. Microsoft Sentinel bookmarks:
These are for investigation, not automation. They help an analyst save interesting query results during a hunting session but do not perform any automated response.
B. Azure Automation runbooks:
While powerful for executing scripts, they are not the primary tool for this specific task. Playbooks (Logic Apps) are the native, integrated way to build automated responses in Sentinel, offering a visual designer and hundreds of connectors. A playbook can call a runbook, but runbooks alone are not the direct answer.
E. Azure Functions apps:
Similar to runbooks, this is a general-purpose compute service. It is not the dedicated, low-code automation and integration tool built for security orchestration in Sentinel. Playbooks are the standard method.

Reference
Microsoft Learn: Automate threat response with playbooks in Microsoft Sentinel
This documentation explains how automation rules and playbooks work together to automate incident response.

You are configuring Azure Sentinel.
You need to send a Microsoft Teams message to a channel whenever an incident representing a sign-in risk event is activated in Azure Sentinel.
Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Enable Entity behavior analytics.

B. Associate a playbook to the analytics rule that triggered the incident

C. Enable the Fusion rule

D. Add a playbook

E. Create a workbook

B.   Associate a playbook to the analytics rule that triggered the incident
D.   Add a playbook

Explanation:
To send a Microsoft Teams message automatically when a sign-in risk incident is triggered in Microsoft Sentinel, you must use automation via playbooks.

1. Add a playbook (D)
A playbook in Microsoft Sentinel is built using Azure Logic Apps.
It allows you to automate actions such as:
Sending Teams messages
Sending emails
Disabling user accounts
You can create a playbook with the Microsoft Teams connector that posts a message to a specific Teams channel when triggered.
💡 Example:
When a “Sign-in from risky IP” incident is created → Logic App sends a Teams alert message.
2. Associate the playbook with the analytics rule (B)
Once the playbook is created, you must link (associate) it with the analytics rule that generates the incident.
This ensures the playbook runs automatically when that specific rule triggers.
💡 This linkage enables automated incident response — no manual triggering required.

🚫 Incorrect Options:
A. Enable Entity behavior analytics
Used to analyze user and entity behavior — doesn’t send alerts or messages.
C. Enable the Fusion rule
Fusion detects multi-stage attacks automatically but doesn’t handle notifications or Teams messages.
E. Create a workbook
Used for visual reporting and dashboards, not automation or alerts.

📘 Reference:
Microsoft Learn: Automate threat response with playbooks in Microsoft Sentinel
Microsoft Learn: Associate playbooks with analytics rules

Page 2 out of 16 Pages
SC-200 Practice Test

Are You Truly Prepared?

Don't risk your exam fee on uncertainty. Take this definitive practice test to validate your readiness for the Microsoft SC-200 exam.