لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint. You need to add threat indicators for all the IP addresses in a range of 171.23.3432-171.2334.63. The solution must minimize administrative effort. What should you do in the Microsoft 365 Defender portal?
A. Create an import file that contains the IP address of 171
B. Select Add indicator and set the IP address to 171
C. Select Add indicator and set the IP address to 171
D. Create an import file that contains the individual IP addresses in the rang
E. Select Import and import the file
عرض الإجابة
اجابة صحيحة: A
السؤال #2
You are investigating an incident by using Microsoft 365 Defender. You need to create an advanced hunting query to detect failed sign-in authentications on three devices named CFOLaptop, CEOLaptop, and COOLaptop. How should you complete the query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: BC
السؤال #3
You have an Azure subscription that contains a Microsoft Sentinel workspace. The workspace contains a Microsoft Defender for Cloud data connector. You need to customize which details will be included when an alert is created for a specific event. What should you do?
A. Modify the properties of the connector
B. Create a Data Collection Rule (DCR)
C. Create a scheduled query rule
D. Enable User and Entity Behavior Analytics (UEBA)
عرض الإجابة
اجابة صحيحة: C
السؤال #4
You need to create the test rule to meet the Azure Sentinel requirements. What should you do when you create the rule?
A. From Set rule logic, turn off suppression
B. From Analytics rule details, configure the tactics
C. From Set rule logic, map the entities
D. From Analytics rule details, configure the severity
عرض الإجابة
اجابة صحيحة: C
السؤال #5
You have a Microsoft Sentinel workspace that contains an Azure AD data connector. You need to associate a bookmark with an Azure AD-related incident. What should you do? To answer, drag the appropriate blades to the correct tasks. Each blade may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content NOTE: Each correct selection is worth one point.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
You provision Azure Sentinel for a new Azure subscription. You are configuring the Security Events connector. While creating a new rule from a template in the connector, you decide to generate a new alert for every event. You create the following rule query. By which two components can you group alerts into incidents? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. user
B. resource group
C. IP address
D. computer
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Your company uses Azure Sentinel. A new security analyst reports that she cannot assign and dismiss incidents in Azure Sentinel. You need to resolve the issue for the analyst. The solution must use the principle of least privilege. Which role should you assign to the analyst?
A. Azure Sentinel Responder
B. Logic App Contributor
C. Azure Sentinel Contributor
D. Azure Sentinel Reader
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You use Azure Security Center. You receive a security alert in Security Center
A. Yes
B. No
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You use Azure Security Center. You receive a security alert in Security Center
A. Yes
B. No
عرض الإجابة
اجابة صحيحة: C
السؤال #10
You have an Azure subscription that contains a virtual machine named VM1 and uses Azure Defender. Azure Defender has automatic provisioning enabled. You need to create a custom alert suppression rule that will supress false positive alerts for suspicious use of PowerShell on VM1. What should you do first?
A. From Azure Security Center, add a workflow automation
B. On VM1, run the Get-MPThreatCatalog cmdlet
C. On VM1 trigger a PowerShell alert
D. From Azure Security Center, export the alerts to a Log Analytics workspace
عرض الإجابة
اجابة صحيحة: C
السؤال #11
The issue for which team can be resolved by using Microsoft Defender for Office 365?
A. executive
B. marketing
C. security
D. sales
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Your company uses Azure Sentinel to manage alerts from more than 10,000 IoT devices. A security manager at the company reports that tracking security threats is increasingly difficult due to the large number of incidents. You need to recommend a solution to provide a custom visualization to simplify the investigation of threats and to infer threats by using machine learning. What should you include in the recommendation?
A. built-in queries
B. livestream
C. notebooks
D. bookmarks
عرض الإجابة
اجابة صحيحة: A
السؤال #13
You need to modify the anomaly detection policy settings to meet the Cloud App Security requirements. Which policy should you modify?
A. Activity from suspicious IP addresses
B. Activity from anonymous IP addresses
C. Impossible travel
D. Risky sign-in
عرض الإجابة
اجابة صحيحة: C
السؤال #14
You plan to create a custom Azure Sentinel query that will provide a visual representation of the security alerts generated by Azure Security Center. You need to create a query that will be used to display a bar graph. What should you include in the query?
A. extend
B. bin
C. count
D. workspace
عرض الإجابة
اجابة صحيحة: B
السؤال #15
You have an Azure subscription that uses Microsoft Sentinel. You detect a new threat by using a hunting query. You need to ensure that Microsoft Sentinel automatically detects the threat. The solution must minimize administrative effort. What should you do?
A. Create a playbook
B. Create a watchlist
C. Create an analytics rule
D. Add the query to a workbook
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: