
SC-200 Part 1- Microsoft Defender
Authored by CloudThat Technologies
Computers
Professional Development
Used 28+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which report lists the software vulnerabilities your devices are exposed to by listing the Common Vulnerabilities and Exposures (CVE) ID?
Event Timeline
Weakness
Severity level graphs
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which file type can be used to upload Indicators?
JSON
XML
CSV
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which filter is included as part of an Alert notification rule?
Alert Severity
Account
Subject IDs
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security operations analyst needs to exclude a custom executable file c:\myapp\myapp.exe, which exclusion type should they use?
File
Extension
folder
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security operations analyst can create a custom detection from which of the following?
An alert
Advanced Hunting
An incident
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You can classify an Incident as which of the following?
High alert
Test alert
True alert
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The Devices page shows information from which Defender product?
Microsoft Cloud App Security
Microsoft Defender for Identity
Microsoft Defender for Endpoint
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?