Search Header Logo

SC-200 Part 1- Microsoft Defender

Authored by CloudThat Technologies

Computers

Professional Development

Used 28+ times

SC-200 Part 1- Microsoft Defender
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which report lists the software vulnerabilities your devices are exposed to by listing the Common Vulnerabilities and Exposures (CVE) ID?

Event Timeline
Weakness
Severity level graphs

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which file type can be used to upload Indicators?

JSON
XML
CSV

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which filter is included as part of an Alert notification rule?

Alert Severity
Account
Subject IDs

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security operations analyst needs to exclude a custom executable file c:\myapp\myapp.exe, which exclusion type should they use?

File
Extension
folder

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security operations analyst can create a custom detection from which of the following?

An alert
Advanced Hunting
An incident

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You can classify an Incident as which of the following?

High alert
Test alert
True alert

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The Devices page shows information from which Defender product?

Microsoft Cloud App Security
Microsoft Defender for Identity
Microsoft Defender for Endpoint

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?