[2025-December-New]Braindump2go SC-200 Exam Dumps PDF Free[Q313-Q360]
2025/December Latest Braindump2go SC-200 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go SC-200 Real Exam Questions!
QUESTION 313
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint Plan 2 and contains 500 Windows devices.
As part of an incident investigation, you identify the following suspected malware files:
– sys
– pdf
– docx
– xlsx
You need to create indicator hashes to block users from downloading the files to the devices.
Which files can you block by using the indicator hashes?
A. File1.sys only
B. File1.sys and File3.docx only
C. File1.sys, File3.docx, and File4.xlsx only
D. File2.pdf, File3.docx, and File4.xlsx only
E. File1.sys, File2.pdf, File3.docx, and File4.xlsx
Answer: E
Explanation:
Based on File hashes, you should be able to block each and every file with this hash, regardless the name of the file.
QUESTION 314
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint and contains a user named User1 and a Microsoft 365 group named Group1. All users are assigned a Defender for Endpoint Plan 1 license.
You enable Microsoft Defender XDR Unified role-based access control (RBAC) for Endpoints & Vulnerability Management.
You need to ensure that User1 can configure alerts that will send email notifications to Group1. The solution must follow the principle of least privilege.
Which permissions should you assign to User1?
A. Defender Vulnerability Management – Remediation handling
B. Alerts investigation
C. Live response capabilities: Basic
D. Manage security settings
Answer: D
QUESTION 315
Hotspot Question
You have an Azure subscription that uses Microsoft Defender for Cloud.
You need to use an Azure Resource Manager (ARM) template to create a workflow automation that will trigger a logic app when specific alerts are received by Microsoft Defender for Cloud.
How should you complete the template? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 316
You have an Azure subscription named Sub1 that uses Microsoft Defender for Cloud.
You need to assign the PCI DSS 4.0 initiative to Sub1 and have the initiative displayed in the Defender for Cloud Regulatory compliance dashboard.
From Security policies in the Environment settings, you discover that the option to add more industry and regulatory standards is unavailable.
What should you do first?
A. Configure the Continuous export settings for Log Analytics.
B. Enable the Cloud Security Posture Management (CSPM) plan for the subscription.
C. Configure the Continuous export settings for Azure Event Hubs.
D. Disable the Microsoft Cloud Security Benchmark (MCSB) assignment.
Answer: B
QUESTION 317
You have a Microsoft Sentinel workspace named SW1.
You need to identify which anomaly rules are enabled in SW1.
What should you review in Microsoft Sentinel?
A. Content hub
B. Entity behavior
C. Analytics
D. Settings
Answer: C
QUESTION 318
You have an Azure subscription that contains a Microsoft Sentinel workspace named WS1.
You create a hunting query that detects a new attack vector. The attack vector maps to a tactic listed in the MITRE ATT&CK database.
You need to ensure that an incident is created in WS1 when the new attack vector is detected.
What should you configure?
A. a hunting livestream session
B. a query bookmark
C. a scheduled query rule
D. a Fusion rule
Answer: C
QUESTION 319
You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR.
The security team at your company detects command and control (C2) agent traffic on the network. Agents communicate once every 50 hours.
You need to create a Microsoft Defender XDR custom detection rule that will identify compromised devices and establish a pattern of communication. The solution must meet the following requirements:
– Identify all the devices that have communicated during the past 14 days.
– Minimize how long it takes to identify the devices.
To what should you set the detection frequency for the rule?
A. Every 12 hours
B. Every 24 hours
C. Every three hours
D. Every hour
Answer: B
Explanation:
Every 24 hours – runs every 24 hours, checking data from the past 30 days
“Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.”
https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules
QUESTION 320
Hotspot Question
You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR and contains a Windows device named Device1.
You investigate Device1 for malicious activity and discover a suspicious file named File1.exe. You collect an investigation package from Device1.
You need to review the following forensic data points:
– Is an attacker currently accessing Device1 remotely?
– When was File1.exe first executed?
Which folder in the investigation package should you review for each data point? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 321
Hotspot Question
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint Plan 2 and contains a Windows device named Device1.
Twenty files on Device1 are quarantined by custom indicators as part of an investigation.
You need to release the 20 files from quarantine.
How should you complete the command? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 322
You have a Microsoft 365 E5 subscription.
Automated investigation and response (AIR) is enabled in Microsoft Defender for Office 365 and devices use full automation in Microsoft Defender for Endpoint.
You have an incident involving a user that received malware-infected email messages on a managed device.
Which action requires manual remediation of the incident?
A. soft deleting the email message
B. hard deleting the email message
C. isolating the device
D. containing the device
Answer: C
QUESTION 323
You have a Microsoft 365 subscription that uses Microsoft Defender XDR and contains a Windows device named Device1.
The timeline of Device1 includes three files named File1.ps1, File2.exe, and File3.dll.
You need to submit files for deep analysis in Microsoft Defender XDR.
Which files can you submit?
A. File1.ps1 only
B. File2.exe only
C. File3.dll only
D. File2.exe and File3.dll only
E. File1.ps1 and File2.exe only
F. File1.ps1, File2.exe, and File3.dll
Answer: D
Explanation:
Deep analysis currently supports extensive analysis of portable executable (PE) files (including .exe and .dll files). PE files typically have .exe or .dll extensions (executable programs or applications).
https://learn.microsoft.com/en-us/defender-endpoint/respond-file-alerts#deep-analysis
QUESTION 324
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You need to identify all the entities affected by an incident.
Which tab should you use in the Microsoft Defender portal?
A. Investigations
B. Assets
C. Evidence and Response
D. Alerts
Answer: C
QUESTION 325
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.
![]()
You need to search for malicious activities in your organization.
Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?
A. Tactic1 only
B. Tactic2 only
C. Tactic1 and Tactic3 only
D. Tactic2 and Tactic3 only
E. Tactic1, Tactic2, and Tactic3
Answer: E
QUESTION 326
Hotspot Question
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint Plan 2 and contains a Windows device named Device1.
You initiate a live response session on Device1 and launch an executable file named File1.exe in the background.
You need to perform the following actions:
– Identify the command ID of File1.exe.
– Interact with File1.exe.
Which live response command should you run for each action? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
Explanation:
https://learn.microsoft.com/en-us/defender-endpoint/live-response
QUESTION 327
Hotspot Question
You have a Microsoft 365 subscription that uses Microsoft Purview and contains a Microsoft SharePoint Online site named Site1.
Site1 contains the files shown in the following table.
![]()
From Microsoft Purview, you create the content search queries shown in the following table.
![]()
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 328
You have a Microsoft Sentinel workspace named SW1.
In SW1, you investigate an incident that is associated with the following entities:
– Host
– IP address
– User account
– Malware name
Which entity can be labeled as an indicator of compromise (IoC) directly from the incident’s page?
A. malware name
B. host
C. user account
D. IP address
Answer: D
QUESTION 329
Hotspot Question
You have a Microsoft Sentinel workspace that contains a custom workbook.
You need to query for a summary of security events. The solution must meet the following requirements:
– Identify the number of security events ingested during the past week.
– Display the count of events by day in a chart.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 330
Hotspot Question
You have a Microsoft Sentinel workspace that contains a custom workbook named Workbook1.
You need to create a visual in Workbook1 that will display the logon count for accounts that have logon event IDs of 4624 and 4634.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 331
You have 500 on-premises Windows 11 devices that use Microsoft Defender for Endpoint.
You enable Network device discovery.
You need to create a hunting query that will identify discovered network devices and return the identity of the onboarded device that discovered each network device.
Which built-in function should you use?
A. SeenBy()
B. DeviceFromIP()
C. next()
D. current_cluster_endpoint()
Answer: A
Explanation:
By invoking the SeenBy function, in your advanced hunting query, you can get detail on which onboarded device a discovered device was seen by. This information can help determine the network location of each discovered device and subsequently, help to identify it in the network.
https://learn.microsoft.com/en-us/defender-endpoint/device-discovery
QUESTION 332
You have an Azure subscription that contains a resource group named RG1. RG1 contains a Microsoft Sentinel workspace. The subscription is linked to a Microsoft Entra tenant that contains a user named User1.
You need to ensure that User1 can deploy and customize Microsoft Sentinel workbook templates. The solution must follow the principle of least privilege.
Which role should you assign to User1 for RG1?
A. Microsoft Sentinel Contributor
B. Workbook Contributor
C. Microsoft Sentinel Automation Contributor
D. Contributor
Answer: B
QUESTION 333
Hotspot Question
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You need to create a custom detection rule that will identify devices that had more than five antivirus detections within the last 24 hours.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
Explanation:
https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules
QUESTION 334
You have a Microsoft 365 subscription that uses Microsoft Purview.
Your company has a project named Project1.
You need to identify all the email messages that have the word Project1 in the subject line. The solution must search only the mailboxes of users that worked on Project1.
What should you do?
A. Perform a user data search.
B. Create a records management disposition.
C. Perform an audit search.
D. Perform a content search.
Answer: D
Explanation:
Content search in Microsoft Purview allows you to search for specific content across user mailboxes, SharePoint sites, and OneDrive locations. In this case, you want to identify email messages that contain the word Project1 in the subject line. A content search will allow you to specify the keyword “Project1” and narrow down the search to the mailboxes of specific users who worked on the project.
User data search is not a feature in Microsoft Purview that matches this requirement.
Records management disposition deals with managing records and their lifecycle (such as retention and deletion), but it is not related to searching email messages.
Audit search allows you to search the audit logs for activities performed by users, but it does not search the content of emails or documents.
QUESTION 335
Hotspot Question
You have an on-premises datacenter that contains a custom web app named App1. App1 uses Active Directory Domain Services (AD DS) authentication and is accessible by using Microsoft Entra application proxy.
You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR.
You receive an alert that a user downloaded highly confidential documents.
You need to remediate the risk associated with the alert by requiring multi-factor authentication (MFA) when users use App1 to initiate the download of documents that have a Highly Confidential sensitivity label applied.
What should you do? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
Explanation:
Box 1: Conditional Access
Conditional Access in Microsoft Entra (formerly Azure AD) is the correct mechanism for enforcing multi-factor authentication (MFA) based on specific conditions, such as accessing App1 when sensitive documents are involved. Conditional Access policies can enforce MFA based on user risk, location, or the sensitivity of the data being accessed.
Box 2: Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps allows you to implement session control policies that monitor and control user sessions in real time. It can enforce policies such as blocking downloads of sensitive documents or enforcing additional authentication measures during specific activities within the session.
QUESTION 336
You have an Azure subscription that contains a Microsoft Sentinel workspace named Workspace1.
From Content Hub, you deploy the Microsoft Entra solution for Microsoft Sentinel and configure a connector.
You need to analyze actions performed by users that have administrative privileges to the subscription.
Which workbook should you use?
A. Azure Activity
B. Microsoft Entra Audit logs
C. Microsoft Entra Sign-ins logs
D. Identity & Access
Answer: A
Explanation:
The Azure Monitor Activity Log is a platform log that provides insight into subscription-level events.
https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/activity-log-insights
QUESTION 337
You have an Azure subscription that contains a Microsoft Sentinel workspace named Workspace1 and a user named User1.
You need to ensure that User1 can investigate incidents by using Workspace1. The solution must follow the principle of least privilege.
Which role should you assign to User1?
A. Microsoft Sentinel Responder
B. Microsoft Sentinel Contributor
C. Microsoft Sentinel Automation Contributor
D. Microsoft Sentinel Reader
Answer: A
Explanation:
The Microsoft Sentinel Responder role is specifically designed for users who need to investigate and respond to incidents in Microsoft Sentinel. This role provides the necessary permissions to investigate incidents and alerts, while adhering to the principle of least privilege, as it does not grant permissions beyond what is needed for incident response.
QUESTION 338
Hotspot Question
You have an Azure subscription that contains a Log Analytics workspace named Workspace1.
You configure Azure activity logs and Microsoft Entra ID logs to be forwarded to Workspace1.
You need to query Workspace1 to identify all the requests that failed due to insufficient authorization.
How should you complete the KQL query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
Explanation:
https://learn.microsoft.com/en-us/troubleshoot/developer/webapps/iis/www-administration-management/http-status-code
QUESTION 339
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You have a query that contains the following statements.
![]()
You need to configure a custom detection rule that will use the query. The solution must minimize how long it takes to be notified about events that match the query.
Which frequency should you select for the rule?
A. Every hour
B. Continuous (NRT)
C. Every 12 hours
D. Every 3 hours
Answer: B
QUESTION 340
Hotspot Question
You have a Microsoft 365 E5 subscription that contains the hosts shown in the following table.
![]()
You have indicators in Microsoft Defender for Endpoint as shown in the following table.
![]()
ID1 and ID2 reference the same file as ID3.
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 341
Hotspot Question
You have a Microsoft 365 subscription that uses Microsoft Defender XDR and Microsoft Defender for Endpoint. The subscription contains the devices shown in the following table.
![]()
You discover the following forensic data:
– During the startup of Device1, a connection is established to Device2 via port 5555.
– Device2 connects to Device3 by using port 5555.
– Device4 connects to Device1 by using port 5555.
You perform the following actions:
– Initiate a live response session on Device1 and run the processes
– From Devices in the Microsoft Defender portal, isolate Device1 and Device2.
For each of the following statements, select Yes if True. Otherwise select No.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 342
Hotspot Question
You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR and contains a Windows device named Device1.
You detect malicious activity on Device1.
You initiate a live response session on Device1.
You need to perform the following actions:
– Download a file from the live response library.
– Stop a process that is running on Device1.
Which live response command should you run for each action? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 343
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint and contains the devices shown in the following table.
![]()
You initiate a live response session on each device.
You need to collect a Defender for Endpoint investigation package from each device.
On which devices can you collect the package by running advanced live response commands from the command-line interface (CLI)?
A. Device1 and Device2 only
B. Device1, Device2, and Device3 only
C. Device3 and Device4 only
D. Device1, Device2, Device3, and Device4
Answer: C
Explanation:
https://learn.microsoft.com/en-us/defender-endpoint/live-response
QUESTION 344
Hotspot Question
You have a Microsoft Sentinel workspace.
You need to configure the Fusion analytics rule to temporarily suppress incidents generated by a Microsoft Defender connector. The solution must meet the following requirements:
– Minimize impact on the ability to detect multistage attacks.
– Minimize administrative effort.
How should you configure the rule? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 345
You have a Microsoft Sentinel workspace.
You are investigating an incident that involves multiple alerts, events, and entities.
You need to create a bookmark for the investigation. The solution must minimize administrative effort.
Which settings should you use?
A. Incidents
B. Hunting
C. Content hub
D. Logs
Answer: B
Explanation:
https://learn.microsoft.com/en-us/azure/sentinel/bookmarks#add-bookmarks-to-a-new-or-existing-incident
QUESTION 346
Hotspot Question
You need to build a KQL query in a Microsoft Sentinel workspace. The query must return the SecurityEvent record for accounts that have the last record with an EventID value of 4624.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
QUESTION 347
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You discover that when Microsoft Defender for Endpoint generates alerts for a commonly used executable file, it causes alert fatigue.
You need to tune the alerts.
Which two actions can an alert tuning rule perform for the alerts? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. delete
B. hide
C. resolve
D. merge
E. assign
Answer: BC
Explanation:
Hide : This action allows you to hide alerts generated by the specified executable file, reducing the noise and alert fatigue. These hidden alerts will not appear in the incident queue but will still be logged for historical purposes.
Resolve : This action automatically resolves alerts generated by the specified executable file. The alerts are marked as resolved, indicating that no further action is required. This helps in managing alert fatigue by automatically handling known benign alerts.
QUESTION 348
Note: This section contains one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem. You must determine whether the solution meets the stated goals. More than one solution in the set might solve the problem. It is also possible that none of the solutions in the set solve the problem.
After you answer a question in this section, you will NOT be able to return. As a result, these questions do not appear on the Review Screen.
You have a Microsoft 365 subscription.
You have 1,000 Windows devices that have a third-party antivirus product installed and Microsoft Defender Antivirus in passive mode.
You need to ensure that the devices are protected from malicious artifacts that were undetected by the third-party antivirus product.
Solution: You configure endpoint detection and response (EDR) in block mode.
Does this meet the goal?
A. Yes
B. No
Answer: A
Explanation:
Configuring Endpoint Detection and Response (EDR) in block mode meets the goal.
EDR in block mode allows Microsoft Defender for Endpoint to detect and remediate malicious artifacts even when Microsoft Defender Antivirus is in passive mode due to the presence of a third-party antivirus. This ensures that threats missed by the third-party antivirus can still be addressed by Microsoft Defender for Endpoint’s advanced detection and response capabilities.
Thus, enabling EDR in block mode effectively provides the required protection in this scenario.
QUESTION 349
Note: This section contains one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem. You must determine whether the solution meets the stated goals. More than one solution in the set might solve the problem. It is also possible that none of the solutions in the set solve the problem.
After you answer a question in this section, you will NOT be able to return. As a result, these questions do not appear on the Review Screen.
You have a Microsoft 365 subscription.
You have 1,000 Windows devices that have a third-party antivirus product installed and Microsoft Defender Antivirus in passive mode.
You need to ensure that the devices are protected from malicious artifacts that were undetected by the third-party antivirus product.
Solution: You configure Controlled folder access.
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation:
Configuring Controlled Folder Access does not meet the goal. Controlled Folder Access is a feature of Microsoft Defender Antivirus that protects specific folders from unauthorized changes by ransomware or other malicious apps. However, this feature requires Microsoft Defender Antivirus to be active and does not address the scenario where Defender Antivirus is in passive mode due to the presence of a third-party antivirus.
To meet the goal of protecting the devices from malicious artifacts undetected by the third-party antivirus, you should enable EDR in block mode. EDR in block mode works even when Microsoft Defender Antivirus is in passive mode, allowing Microsoft Defender for Endpoint to remediate threats missed by the third-party antivirus.
Thus, configuring Controlled Folder Access is not the correct solution in this scenario.
QUESTION 350
Note: This section contains one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem. You must determine whether the solution meets the stated goals. More than one solution in the set might solve the problem. It is also possible that none of the solutions in the set solve the problem.
After you answer a question in this section, you will NOT be able to return. As a result, these questions do not appear on the Review Screen.
You have a Microsoft 365 subscription.
You have 1,000 Windows devices that have a third-party antivirus product installed and Microsoft Defender Antivirus in passive mode.
You need to ensure that the devices are protected from malicious artifacts that were undetected by the third-party antivirus product.
Solution: You enable automated investigation and response (AIR).
Does this meet the goal?
A. Yes
B. No
Answer: B
Explanation:
Enabling automated investigation and response (AIR) alone does not meet the goal. While AIR can investigate and respond to threats, it requires that Microsoft Defender Antivirus is active or that other components of Microsoft Defender for Endpoint, such as endpoint detection and response (EDR), are operational.
Since Microsoft Defender Antivirus is in passive mode, it cannot actively scan and detect malicious artifacts that were missed by the third-party antivirus. To achieve the goal, you need to enable EDR in block mode in addition to AIR. EDR in block mode works even when Microsoft Defender Antivirus is in passive mode, allowing Microsoft Defender for Endpoint to detect and remediate threats that the third-party antivirus missed.
Thus, simply enabling AIR is not sufficient to protect the devices in this scenario.
QUESTION 351
Note: This section contains one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem. You must determine whether the solution meets the stated goals. More than one solution in the set might solve the problem. It is also possible that none of the solutions in the set solve the problem.
After you answer a question in this section, you will NOT be able to return. As a result, these questions do not appear on the Review Screen.
You have a Microsoft 365 subscription.
You have 1,000 Windows devices that have a third-party antivirus product installed and Microsoft Defender Antivirus in passive mode.
All Windows devices are onboarded to Microsoft Defender for Endpoint.
You need to ensure that the devices are protected from malicious artifacts that were undetected by the third-party antivirus product.
Solution: You enable Live Response.
Does this meet the goal?
A. Yes
B. No
Answer: B
QUESTION 352
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You need to implement deception rules. The solution must ensure that you can limit the scope of the rules.
What should you create first?
A. device groups
B. device tags
C. honeytoken entity tags
D. sensitive entity tags
Answer: B
Explanation:
When configuring a deception role there’s no option to use a device group, only device tags.
https://learn.microsoft.com/en-us/defender-xdr/configure-deception
QUESTION 353
You have a Microsoft 365 subscription that uses Microsoft Defender XDR.
You are investigating an incident.
You need to review the incident tasks that were performed. The solution must include a query that will display the incidents in a workbook, and then display the tasks of each incident in another grid.
Which table should you target in the query?
A. SecurityIncident
B. SecurityEvent
C. SentinelAudit
D. SecurityAlert
Answer: A
Explanation:
The SecurityIncident table in Microsoft Sentinel contains information about incidents, including details such as incident ID, severity, status, and tasks.
QUESTION 354
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have an Azure subscription that uses Microsoft Defender XDR.
From the Microsoft Defender portal, you perform an audit search and export the results as a file named File1.csv that contains 10,000 rows.
You use Microsoft Excel to perform Get & Transform Data operations to parse the AuditData column from File1.csv. The operations fail to generate columns for specific JSON properties.
You need to ensure that Excel generates columns for the specific JSON properties in the audit search results.
Solution: From Excel, you apply filters to the existing columns in File1.csv to reduce the number of JSON properties, and then you perform the Get 8t Transform Data operations to parse the AuditData column.
Does this meet the requirement?
A. Yes
B. No
Answer: B
Explanation:
No, this solution will not ensure that Excel generates columns for specific JSON properties in the AuditData column. Applying filters in Excel will only help reduce data quantity but won’t address the issue of correctly parsing the JSON data in the AuditData column into separate columns for each JSON property.
QUESTION 355
You have a Microsoft 365 E5 subscription that contains two users named User1 and User2 and uses Microsoft Copilot for Security.
From the Copilot for Security portal, User1 starts a session and creates the following prompts:
– Prompt1: Provides access to the Entra plugin
– Prompt2: Provides access to the Intune plugin
– Prompt3: Provides access to the Entra plugin
User1 shares the session with User2.
User2 does NOT have access to Microsoft Intune.
For which prompts can User2 view results during the shared session?
A. Prompt1 only
B. Prompt1 and Prompt2 only
C. Prompt3 only
D. Prompt1 and Prompt3 only
E. Prompt1, Prompt2, and Prompt3
Answer: D
QUESTION 356
You have a Microsoft 365 E5 subscription that uses Microsoft Copilot for Security. Copilot for Security has the default settings configured.
You need to ensure that a user named User can use Copilot for Security to perform the following tasks:
– Upload files.
– View the usage dashboard.
– Share promptbooks with all users.
The solution must follow the principle of least privilege
Which role should you assign to User?
A. Copilot owner Most Voted
B. Cloud Application Administrator
C. Security Administrator
D. Copilot Contributor
Answer: A
Explanation:
https://learn.microsoft.com/en-us/copilot/security/authentication
QUESTION 358
You have a Microsoft 365 E5 subscription.
You have a PowerShell script that queries the unified audit log.
You discover that the query returns only the first page of results due to server-side paging.
You need to ensure that you get all the results.
Which property should you query in the results?
A. @odata.context
B. @odata.count
C. @odata.nextLink
D. @odata.deltaLink
Answer: C
QUESTION 359
You have a Microsoft 365 E5 subscription that contains two groups named Group1 and Group2 and uses Microsoft Copilot for Security.
You need to configure Copilot for Security role assignments to meet the following requirements:
– Ensure that members of Group1 can run prompts and respond to Microsoft Defender XDR security incidents.
– Ensure that members of Group2 can run prompts.
– Follow the principle of least privilege.
You remove Everyone from the Copilot Contributor role.
Which two actions should you perform next? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Assign the Security Operator role to Group1.
B. Assign the Copilot Owner role to Group2.
C. Assign the Copilot Owner role to Group1 Most Voted
D. Assign the Security Operator role to Group2.
E. Assign the Copilot Contributor role to Group2. Most Voted
Answer: AE
Explanation:
To follow the principle of least privilege, we must carefully assign roles based on minimum necessary permissions.
Requirement Breakdown:
Group1 needs to run prompts AND respond to Microsoft Defender XDR security incidents.
Solution: Assign the Security Operator role.
The Security Operator role allows responding to Microsoft Defender XDR incidents.
This role provides incident response privileges, but not full administrative rights.
Group2 needs to run prompts ONLY.
Solution: Assign the Copilot Contributor role.
This role allows running prompts without elevated security permissions.
QUESTION 360
Hotspot Question
You have an Azure subscription named Sub1. Sub1 contains a Microsoft Sentinel workspace named SW1 and a virtual machine named VM1 that runs Windows Server. SW1 collects security logs from VM1 by using the Windows Security Events via AMA connector.
You need to limit the scope of events collected from VM1. The solution must ensure that only audit failure events are collected.
How should you complete the filter expression for the connector? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
![]()
Answer:
![]()
Resources From:
1.2025 Latest Braindump2go SC-200 Exam Dumps (PDF & VCE) Free Share:
https://www.braindump2go.com/sc-200.html
2.2025 Latest Braindump2go SC-200 PDF and SC-200 VCE Dumps Free Share:
https://drive.google.com/drive/folders/1IE9DMPPLO4DhDEbH-R7ugD_zKUjJxFsH?usp=sharing
3.2025 Free Braindump2go SC-200 Exam Questions Download:
https://www.braindump2go.com/free-online-pdf/SC-200-VCE-Dumps(313-360).pdf
Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!