Exam Flashcards
3.
DRAG DROP -
You have an Azure subscription linked to an Azure Active Directory (Azure AD) tenant. The tenant contains two users named User1 and User2.
You plan to deploy Azure Defender.
You need to enable User1 and User2 to perform tasks at the subscription level as shown in the following table.
User/Task
User1: - Assign initiatives, - Edit security policies, - enable automatic provisioning
User2: - View alerts and recommendations, -Apply security recommendations, - Dismiss alerts
The solution must use the principle of least privilege.
Which role should you assign to each user? To answer, drag the appropriate roles to the correct users. Each role may be used once, more than once, or not at all.
You may need to drag the split bar between panes or scroll to view content.
Select and Place:
Roles:
Contributor,
Owner,
Security administrator
Security Reader
User1: ?
User2: ?
User1: Owner
User2: Contributor
4.
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365.
You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters.
You need to create a data loss prevention (DLP) policy to protect the sensitive documents.
What should you use to detect which documents are sensitive?
- A. SharePoint search
- B. a hunting query in Microsoft 365 Defender
- C. Azure Information Protection
- D. RegEx pattern matching
C. Azure Information Protection
är rätt, men man kan även använda RegEx, vilket gör även D rätt. Men jag tror C är svaret dom är ute efter.
5.
DRAG DROP -
You have an Azure subscription.
You need to delegate permissions to meet the following requirements:
✑ Enable and disable Azure Defender.
✑ Apply security recommendations to resource.
The solution must use the principle of least privilege.
Which Azure Security Center role should you use for each requirement? To answer, drag the appropriate roles to the correct requirements. Each role may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Select and place:
Roles:
Security Admin
Resource Group Owner
Subscription Contributor
Subscribtion Owner
Answer Area:
Enable and disable Azure Defender: ?
Apply security recommendations to a resource: ?
Enable and disable Azure Defender: Resource Group Owner
Apply security recommendations to a resource: Subscription Contributor
6.
You have a suppression rule in Azure Security Center for 10 virtual machines that are used for testing. The virtual machines run Windows Server.
You are troubleshooting an issue on the virtual machines.
In Security Center, you need to view the alerts generated by the virtual machines during the last five days.
What should you do?
- A. Change the rule expiration date of the suppression rule.
- B. Change the state of the suppression rule to Disabled.
- C. Modify the filter for the Security alerts page.
- D. View the Windows event logs on the virtual machines.
SVAR: C. Modify the filter for the Security alerts page.
(so you display dismissed alerts)
7.
You have a Microsoft 365 subscription that uses Microsoft 365 Defender.
You need to identify all the entities affected by an incident.
Which tab should you use in the Microsoft 365 Defender portal?
- A. Investigations
- B. Devices
- C. Evidence and Response
- D. Alerts
D. Alerts
8.
HOTSPOT -
You purchase a Microsoft 365 subscription.
You plan to configure Microsoft Cloud App Security.
You need to create a custom template-based policy that detects connections to Microsoft 365 apps that originate from a botnet network.
What should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Answer Area:
Policy template type: Access policy, Activity policy, Anomaly detection policy
Filter based on: IP address tag, Source, User agent string
Policy template type: Activity policy
Filter based on: IP address tag
9.
You need to configure Microsoft Cloud App Security to generate alerts and trigger remediation actions in response to external sharing of confidential files.
Which two actions should you perform in the Cloud App Security portal? Each correct answer presents part of the solution.
- A. From Settings, select Information Protection, select Azure Information Protection, and then select Only scan files for Azure Information Protection classification labels and content inspection warnings from this tenant.
- B. Select Investigate files, and then filter App to Office 365.
- C. Select Investigate files, and then select New policy from search.
- D. From Settings, select Information Protection, select Azure Information Protection, and then select Automatically scan new files for Azure Information Protection classification labels and content inspection warnings.
- E. From Settings, select Information Protection, select Files, and then enable file monitoring.
- F. Select Investigate files, and then filter File Type to Document.
D. From Settings, select Information Protection, select Azure Information Protection, and then select Automatically scan new files for Azure Information Protection classification labels and content inspection warnings.
E. From Settings, select Information Protection, select Files, and then enable file monitoring.
10.
Your company stores the data of every project in a different Azure subscription. All the subscriptions use the same Azure Active Directory (Azure AD) tenant.
Every project consists of multiple Azure virtual machines that run Windows Server. The Windows events of the virtual machines are stored in a Log Analytics workspace in each machine’s respective subscription.
You deploy Azure Sentinel to a new Azure subscription.
You need to perform hunting queries in Azure Sentinel to search across all the Log Analytics workspaces of all the subscriptions.
Which two actions should you perform? Each correct answer presents part of the solution.
- A. Add the Security Events connector to the Azure Sentinel workspace.
- B. Create a query that uses the workspace expression and the union operator.
- C. Use the alias statement.
- D. Create a query that uses the resource expression and the alias operator.
- E. Add the Azure Sentinel solution to each workspace.
B. Create a query that uses the workspace expression and the union operator.
E. Add the Azure solution to each workspace.
13.
DRAG DROP -
Your company deploys Azure Sentinel.
You plan to delegate the administration of Azure Sentinel to various groups.
You need to delegate the following tasks:
✑ Create and run playbooks
✑ Create workbooks and analytic rules.
The solution must use the principle of least privilege.
Which role should you assign for each task? To answer, drag the appropriate roles to the correct tasks. Each role may be used once, more than once, or not at all.
Select and Place:
Azure Sentinel Contributor, Azure Sentinel Responder, Azure Sentinel Reader, Logic App Contributor
Create and run playbooks: ?
Create workbooks and analytic rules: ?
Create and run playbooks: Logic App Contributor
Create workbooks and analytic rules: Microsoft Sentinel Contributor
14.
DRAG DROP -
You have an Azure subscription. The subscription contains 10 virtual machines that are onboarded to Microsoft Defender for Cloud.
You need to ensure that when Defender for Cloud detects digital currency mining behavior on a virtual machine, you receive an email notification. The solution must generate a test email.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
- From workflow automation in Defender for cloud, change the status of the workflow automation.
- From the Logic App Designer, run a trigger.
- From Security alerts in Defender for Cloud, create a sample alert.
- From the Logic App Designer, create a logic app.
- From workflow automation in Defender for cloud, add a workflow automation.
- From workflow automation in Defender for cloud, add a workflow automation.
- From the Logic App Designer, create a logic app.
- From Security alerts in Defender for Cloud, create a sample alert.
15.
HOTSPOT -
You have an Azure subscription that has Azure Defender enabled for all supported resource types.
You create an Azure logic app named LA1.
You plan to use LA1 to automatically remediate security risks detected in Azure Security Center.
You need to test LA1 in Security Center.
What should you do? To answer, select the appropriate options in the answer area.
Set the LA1 trigger to:
- When an Azure Security Center Recommendation is created or triggered
- When an Azure Security Center Alert is created or triggered
- When a response to an Azure Security Center alert is triggered
Trigger the execution of LA1 from:
- Recommendations
- Workflow automation
- Security alerts
Set the LA1 trigger to: When the Security Center Recommendation is created or triggered
Trigger the execution of LA1 from: Recommendations
16.
You have a Microsoft 365 subscription that has Microsoft 365 Defender enabled.
You need to identify all the changes made to sensitivity labels during the past seven days.
What should you use?
- A. the Incidents blade of the Microsoft 365 Defender portal
- B. the Alerts settings on the Data Loss Prevention blade of the Microsoft 365 compliance center
- C. Activity explorer in the Microsoft 365 compliance center
- D. the Explorer settings on the Email & collaboration blade of the Microsoft 365 Defender portal
C. Activity explorer in the Microsoft 365 compliance center
17.
You have a Microsoft 365 E5 subscription that uses Microsoft SharePoint Online.
You delete users from the subscription.
You need to be notified if the deleted users downloaded numerous documents from SharePoint Online sites during the month before their accounts were deleted.
What should you use?
- A. a file policy in Microsoft Defender for Cloud Apps
- B. an access review policy
- C. an alert policy in Microsoft Defender for Office 365
- D. an insider risk policy
D. an insider risk policy
18.
You have a Microsoft Sentinel workspace that contains the following incident.
Brute force attack against Azure Portal analytics rule has been triggered.
You need to identify the geolocation information that corresponds to the incident.
What should you do?
- A. From Overview, review the Potential malicious events map.
- B. From Incidents, review the details of the IPCustomEntity entity associated with the incident.
- C. From Incidents, review the details of the AccountCustomEntity entity associated with the incident.
- D. From Investigation, review insights on the incident entity.
B. From Incidents, review the details of the IPCustomEntity entity associated with the incident.
19.
You have a Microsoft Sentinel workspace named workspace1 that contains custom Kusto queries.
You need to create a Python-based Jupyter notebook that will create visuals. The visuals will display the results of the queries and be pinned to a dashboard. The solution must minimize development effort.
What should you use to create the visuals?
- A. plotly
- B. TensorFlow
- C. msticpy
- D. matplotlib
C. msticpy
20.
HOTSPOT -
You have an Azure Storage account that will be accessed by multiple Azure Function apps during the development of an application.
You need to hide Azure Defender alerts for the storage account.
Which entity type and field should you use in a suppression rule? To answer, select the appropriate options in the answer area.
Answer Area:
Entity type: IP address, Azure Resource, Host, User Account
Field: Name, Resource Id, Address, Command line
Entity type: Azure Resource
Field: Resource Id
21.
HOTSPOT -
You have an Azure subscription that uses Azure Defender.
You plan to use Azure Security Center workflow automation to respond to Azure Defender threat alerts.
You need to create an Azure policy that will perform threat remediation automatically.
What should you include in the solution? To answer, select the appropriate options in the answer area.
Hot Area:
Set available effects to: Append, DeployIfNotExists, EnforceRegoPolicy
To perform remediation use:
- An Azure Automation runbook that has a webhook
- An Azure Logic Apps app that has the trigger set to When an Azure Security Center Alert is created or triggered
- An Azure Logic Apps app that has the trigger set to When a response to an Azure Security Center Alert is triggered
Set available effects to: DeployIfNotExist
To perform remediation use: An Azure Logic Apps app that has the trigger set to When an Azure Security Center Alert is created or triggered
22.
You have an Azure subscription that has the enhanced security features in Microsoft Defender for Cloud enabled and contains a user named User1.
You need to ensure that User1 can export alert data from Defender for Cloud. The solution must use the principle of least privilege.
Which role should you assign to User1?
- A. User Access Administrator
- B. Owner
- C. Contributor
- D. Reader
B. Owner
23.
You have an Azure subscription that uses Microsoft Sentinel.
You need to minimize the administrative effort required to respond to the incidents and remediate the security threats detected by Microsoft Sentinel.
Which two features should you use? Each correct answer presents part of the solution.
- A. Microsoft Sentinel bookmarks
- B. Azure Automation runbooks
- C. Microsoft Sentinel automation rules
- D. Microsoft Sentinel playbooks
- E. Azure Functions apps
C. Microsoft Sentinel automation rules
D. Microsoft Sentinel playbooks
24.
You are investigating an incident in Azure Sentinel that contains more than 127 alerts.
You discover eight alerts in the incident that require further investigation.
You need to escalate the alerts to another Azure Sentinel administrator.
What should you do to provide the alerts to the administrator?
- A. Create a Microsoft incident creation rule
- B. Share the incident URL
- C. Create a scheduled query rule
- D. Assign the incident
D. Assign the incident
- You plan to create a custom Azure Sentinel query that will track anomalous Azure Active Directory (Azure AD) sign-in activity and present the activity as a time chart aggregated by day.
You need to create a query that will be used to display the time chart.
What should you include in the query?
- A. extend
- B. bin
- C. makeset
- D. workspace
B. bin
26.
A company uses Azure Sentinel.
You need to create an automated threat response.
What should you use?
- A. a data connector
- B. a playbook
- C. a workbook
- D. a Microsoft incident creation rule
B. a playbook
27.
You have five on-premises Linux servers.
You have an Azure subscription that uses Microsoft Defender for Cloud.
You need to use Defender for Cloud to protect the Linux servers.
What should you install on the servers first?
- A. the Dependency agent
- B. the Log Analytics agent
- C. the Azure Connected Machine agent
- D. the Guest Configuration extension
B. the Log Analytics Agent
28.
DRAG DROP -
You have an Azure Functions app that generates thousands of alerts in Azure Security Center each day for normal activity.
You need to hide the alerts automatically in Security Center.
Which three actions should you perform in sequence in Security Center? Each correct answer presents part of the solution.
Select and Place:
* Select Pricing & Settings.
* Select IP as the entity type and specify the IP address.
* Select Azure Resource as the entity type and specify the Resource ID.
* Select Security policy.
* Select Security alerts
* Select Suppression rules, and then select Create new suppression rule.
- Select Security alerts
- Select suppression rules, and then select Create new suppression rule
- Select Azure Resource as the entity type and specify the Resource ID