
SC-200 Quiz
Authored by Avinash Kumar
Professional Development
Professional Development
cloud security covered
Used 38+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are various components in DLP. Which among the following classifies as a document, and which component can protect content in locations like SharePoint Online?
Sensitive info types and Access Policy
Access Policy and DLP Policy
Sensitivity label and DLP Policy
DLP Policy and Retention Policy
Tags
cloud security
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization uses Microsoft defender for cloud. In Microsoft defender for cloud, you want to see the topology of your workloads. Which feature of Defender enables you to see it:
Secure Score
Inventory
Network map
Biometric analytics
Tags
Cloud security
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization has Microsoft 365 Defender, Microsoft Defender for Endpoint. Your organization need you to do an in-depth investigation and take immediate response action on identified threats in real-time? What should you use:
Hunt for emerging threats
Live device investigation manager
Live response
Security operations
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which live response basic command is used to Initiates a live response session to the device?
connect
processes
connections
Init
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have Microsoft Defender for Endpoint. In Indicators, which file type and type is used to upload and accepted type?
CSV and Certificates
CSV and Code data
XML and Certificates
JSON and Email subject line
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What types of risks are there in Azure AD?
User and sign-in risks
Credentials and identity risks
Sign-in and identity risk
User and identity risks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization has Microsoft Defender for Cloud. You need to protect against identity risk. Your organization’s specialist expertise is in retail and not a security specialist. What can you use to protect against identity risk?
Security Center
Security manager
Identity manager
Azure AD Identity Protection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?