Traditional Flashcards
Question #61 Topic 3
You have a custom Microsoft Sentinel workbook named Workbook1.
You need to add a grid to Workbook1. The solution must ensure that the grid contains a maximum of 100 rows.
What should you do?
A. In the grid query, include the take operator.
B. In the grid query, include the project operator.
C. In the query editor interface, configure Settings.
D. In the query editor interface, select Advanced Editor.
A. In the grid query, include the take operator.
Here’s why:
take operator: This Kusto Query Language (KQL) operator is used to limit the number of records returned from a query.
Question #51 Topic 3
You have an Azure subscription that uses Microsoft Sentinel.
You need to create a custom report that will visualise sign-in information over time.
What should you create first?
A. a hunting query
B. a workbook
C. a notebook
D. a playbook
B. a workbook
Workbooks in Microsoft Sentinel are the primary tool for creating custom visualizations and reports.
Question #38 Topic 3
You have a Microsoft Sentinel workspace named workspace1 that contains custom Kusto queries.
You need to create a Python-based Jupyter notebook that will create visuals. The visuals will display the results of the queries and be pinned to a dashboard. The solution must minimize development effort.
What should you use to create the visuals?
A. plotly
B. TensorFlow
C. msticpy
D. matplotlib
C. msticpy
msticpy is a Python library specifically designed for security analysts working in Azure Sentinel (now Microsoft Sentinel) and Azure Notebooks.
Question #9 Topic 4 (CHECK)
You have an Azure subscription.
You need to stream the Microsoft Graph activity logs to a third-party security information and event management (SIEM) tool. The solution must minimize administrative effort.
To where should you stream the logs?
A. an Azure Event Hubs namespace
B. an Azure Storage account
C. an Azure Event Grid namespace
D. a Log Analytics workspace
A. an Azure Event Hubs namespace
Azure Event Hubs is the best option for streaming Microsoft Graph activity logs to a third-party SIEM tool.
Question #23 Topic 2
A security administrator receives email alerts from Azure Defender for activities such as potential malware uploaded to a storage account and potential successful brute force attacks.
The security administrator does NOT receive email alerts for activities such as antimalware action failed and suspicious network activity.
The alerts appear in Azure Security Center.
You need to ensure that the security administrator receives email alerts for all the activities.
What should you configure in the Security Center settings?
A. the severity level of email notifications
B. a cloud connector
C. the Azure Defender plans
D. the integration settings for Threat detection
A. the severity level of email notifications
Azure Security Center (now Microsoft Defender for Cloud) allows you to configure the severity level of email notifications
Question #8 Topic 2
Your company uses Azure Security Center and Azure Defender.
The security operations team at the company informs you that it does NOT receive email notifications for security alerts.
What should you configure in Security Center to enable the email notifications?
A. Security solutions
B. Security policy
C. Pricing & settings
D. Security alerts
E. Azure Defender
C. Pricing & settings
To configure email notifications for security alerts in Azure Security Center (now Microsoft Defender for Cloud), you need to go to the Pricing & settings section.
Question #15 Topic 5
You have an Azure subscription that contains a Microsoft Sentinel workspace named WS1.
You create a hunting query that detects a new attack vector. The attack vector maps to a tactic listed in the MITRE ATT&CK database.
You need to ensure that an incident is created in WS1 when the new attack vector is detected.
What should you configure?
A. a hunting livestream session
B. a query bookmark
C. a scheduled query rule
D. a Fusion rule
C. a scheduled query rule
To ensure that an incident is automatically created in Microsoft Sentinel when a new attack vector is detected by a query, you need to configure a scheduled query rule.
Question #23 Topic 3
You need to visualize Azure Sentinel data and enrich the data by using third-party data sources to identify indicators of compromise (IoC).
What should you use?
A. notebooks in Azure Sentinel
B. Microsoft Cloud App Security
C. Azure Monitor
D. hunting queries in Azure Sentinel
A. notebooks in Azure Sentinel
Notebooks in Azure Sentinel allow you to visualize data and perform advanced data analysis. They provide the flexibility to integrate with and enrich data from third-party sources, such as threat intelligence feeds, to help identify indicators of compromise (IoCs).
Question #41 Topic 1
You have a Microsoft 365 E5 subscription that uses Microsoft 365 Defender.
You need to review new attack techniques discovered by Microsoft and identify vulnerable resources in the subscription. The solution must minimize administrative effort.
Which blade should you use in the Microsoft 365 Defender portal?
A. Advanced hunting
B. Threat analytics
C. Incidents & alerts
D. Learning hub
B. Threat analytics
The Threat analytics blade in Microsoft 365 Defender provides detailed information about new attack techniques discovered by Microsoft.
Question #24 Topic 3
You plan to create a custom Azure Sentinel query that will provide a visual representation of the security alerts generated by Azure Security Center.
You need to create a query that will be used to display a bar graph.
What should you include in the query?
A. extend
B. bin
C. count
D. workspace
C. count (1x)
Question #21 Topic 3
You plan to create a custom Azure Sentinel query that will track anomalous Azure Active Directory (Azure AD) sign-in activity and present the activity as a time chart aggregated by day.
You need to create a query that will be used to display the time chart.
What should you include in the query?
A. extend
B. bin
C. makeset
D. workspace
B. bin
To create a custom Azure Sentinel query that tracks anomalous Azure Active Directory (Azure AD) sign-in activity and presents it as a time chart aggregated by day, you should use the bin function.
Question #34 Topic 1
You have a Microsoft 365 subscription that uses Microsoft 365 Defender.
You plan to create a hunting query from Microsoft Defender.
You need to create a custom tracked query that will be used to assess the threat status of the subscription.
From the Microsoft 365 Defender portal, which page should you use to create the query?
A. Threat analytics
B. Advanced Hunting
C. Explorer
D. Policies & rules
B. Advanced Hunting
In the Microsoft 365 Defender portal, you should use the Advanced Hunting page to create custom tracked queries.
Question #54 Topic 1
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint.
You need to create a query that will link the AlertInfo, AlertEvidence, and DeviceLogonEvents tables. The solution must return all the rows in the tables.
Which operator should you use?
A. search *
B. union kind = inner
C. join kind = inner
D. evaluate hint.remote =
B. union kind = inner
To link multiple tables and return all rows from those tables in Microsoft 365 Defender for Endpoint, you should use the union operator with the kind = inner option.
Question #53 Topic 1
You have a Microsoft 365 subscription that uses Microsoft Purview and Microsoft Teams.
You have a team named Team1 that has a project named Project1.
You need to identify any Project1 files that were stored on the team site of Team1 between February 1, 2023, and February 10, 2023.
Which KQL query should you run?
A. (c:c)(Project1)(date=(2023-02-01)..date=(2023-02-10))
B. AuditLogs -
| where FileName contains “Project1”
C. Project1(c:c)(date=2023-02-01..2023-02-10)
D. AuditLogs -
| where Timestamp > ago(10d)
| where FileName contains “Project1”
where Timestamp between (datetime(2023-02-01)..datetime(2023-02-10))
C. Project1(c:c)(date=2023-02-01..2023-02-10)
where Timestamp between (datetime(2023-02-01)..datetime(2023-02-10))
Question #10 Topic 7 (CHECK)
You have 500 on-premises Windows 11 devices that use Microsoft Defender for Endpoint.
You enable Network device discovery.
You need to create a hunting query that will identify discovered network devices and return the identity of the onboarded device that discovered each network device.
Which built-in function should you use?
A. SeenBy()
B. DeviceFromIP()
C. next()
D. current_cluster_endpoint()
A. SeenBy()
The SeenBy() function is used in Microsoft Defender for Endpoint hunting queries to identify devices that have observed or detected certain network devices.
Question #4 Topic 7
Your on-premises network contains an Active Directory Domain Services (AD DS) forest.
You have a Microsoft Entra tenant that uses Microsoft Defender for Identity. The AD DS forest syncs with the tenant.
You need to create a hunting query that will identify LDAP simple binds to the AD DS domain controllers.
Which table should you query?
A. AADServicePrincipalRiskEvents
B. AADDomainServicesAccountLogon
C. SigninLogs
D. IdentityLogonEvents
D. IdentityLogonEvents
To identify LDAP simple binds to the Active Directory Domain Services (AD DS) domain controllers, you should query the IdentityLogonEvents table in Microsoft Defender for Identity.
Question #9 Topic 3 (CHECK)
You have an Azure Sentinel workspace.
You need to test a playbook manually in the Azure portal.
From where can you run the test in Azure Sentinel?
A. Playbooks
B. Analytics
C. Threat intelligence
D. Incidents
A. Playbooks (2x)
In the Azure Sentinel workspace, playbooks are essentially Azure Logic Apps used for automation and orchestration. You can manually run or test a playbook from the Playbooks section where you can select your playbook and use the “Run” or “Test” option to execute it.
D. Incidents (1x)
Question #78 Topic 3 (CHECK)
You have a Microsoft Sentinel playbook that is triggered by using the Azure Activity connector.
You need to create a new near-real-time (NRT) analytics rule that will use the playbook.
What should you configure for the rule?
A. the incident automation settings
B. the query rule
C. entity mapping
D. the Alert automation settings
D. the Alert automation settings (2x)
To use a playbook with a near-real-time (NRT) analytics rule in Microsoft Sentinel, you need to configure the Alert automation settings.
A. the incident automation settings (1x)
Question #3 Topic 6 (CHECK)
You have an Azure subscription that uses Microsoft Sentinel.
You need to minimize the administrative effort required to respond to the incidents and remediate the security threats detected by Microsoft Sentinel.
Which two features should you use? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Microsoft Sentinel workbooks
B. Azure Automation runbooks
C. Microsoft Sentinel automation rules
D. Microsoft Sentinel playbooks
E. Azure Functions apps
C. Microsoft Sentinel automation rules
D. Microsoft Sentinel playbooks
Automation rules in Microsoft Sentinel allow you to automatically trigger actions based on specific incident conditions, reducing manual intervention.
Playbooks in Microsoft Sentinel automate responses to incidents, helping to remediate threats by performing predefined actions, such as sending notifications or interacting with other Azure services.
Question #64 Topic 3
You have an Azure subscription that contains a Microsoft Sentinel workspace.
You need to create a playbook that will run automatically in response to a Microsoft Sentinel alert.
What should you create first?
A. a hunting query in Microsoft Sentinel
B. an Azure logic app
C. an automation rule in Microsoft Sentinel
D. a trigger in Azure Functions
B. an Azure logic app
To create a playbook that runs automatically in response to a Microsoft Sentinel alert, you first need to create an Azure Logic App.
Question #44 Topic 3 (CHECK)
You have an Azure subscription that contains an Azure logic app named app1 and a Microsoft Sentinel workspace that has an Azure Active Directory (Azure AD) connector.
You need to ensure that app1 launches when Microsoft Sentinel detects an Azure AD-generated alert.
What should you create first?
A. a repository connection
B. a watchlist
C. an analytics rule
D. an automation rule
C. an analytics rule
To ensure that a Logic App (app1) launches when Microsoft Sentinel detects an Azure AD-generated alert, you first need to create an analytics rule.
D. an automation rule (top)
Question #28 Topic 3
You are configuring Azure Sentinel.
You need to send a Microsoft Teams message to a channel whenever an incident representing a sign-in risk event is activated in Azure Sentinel.
Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Enable Entity behavior analytics.
B. Associate a playbook to the analytics rule that triggered the incident.
C. Enable the Fusion rule.
D. Add a playbook.
E. Create a workbook.
B. Associate a playbook to the analytics rule that triggered the incident.
D. Add a playbook.
To send a Microsoft Teams message to a channel when an incident is triggered in Azure Sentinel:
Add a playbook (D) that includes the action to send a Microsoft Teams message.
Associate the playbook to the analytics rule (B) that detects the sign-in risk event, so it runs automatically when the incident is triggered.
Question #22 Topic 3
You are configuring Azure Sentinel.
You need to send a Microsoft Teams message to a channel whenever a sign-in from a suspicious IP address is detected.
Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Add a playbook.
B. Associate a playbook to an incident.
C. Enable Entity behavior analytics.
D. Create a workbook.
E. Enable the Fusion rule.
A. Add a playbook.
B. Associate a playbook to an incident.
To send a Microsoft Teams message when a sign-in from a suspicious IP address is detected in Azure Sentinel:
Add a playbook (A) that includes an action to send a message to the Microsoft Teams channel.
Associate the playbook to an incident (B), so the playbook runs when an incident is generated for suspicious sign-ins.
Question #6 Topic 3 (CHECK)
You have a playbook in Azure Sentinel.
When you trigger the playbook, it sends an email to a distribution group.
You need to modify the playbook to send the email to the owner of the resource instead of the distribution group.
What should you do?
A. Add a parameter and modify the trigger.
B. Add a custom data connector and modify the trigger.
C. Add a condition and modify the action.
D. Add an alert and modify the action.
C. Add a condition and modify the action.
Here’s what this entails:
Add a condition: You would typically need to add logic or conditions within the playbook to dynamically fetch or determine who the resource owner is. This could involve querying Azure AD or another system where resource ownership is defined.
Modify the action: Change the email action within the playbook to use the resource owner’s email address instead of the static distribution group email. This might involve setting up a variable or parameter at runtime that contains the email address of the resource owner based on the incident or alert details.
A. Add a parameter and modify the trigger. (top)
D. Add an alert and modify the action.