exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 6 question 4 discussion

Actual exam question from Microsoft's SC-200
Question #: 4
Topic #: 6
[All SC-200 Questions]

You have an Azure subscription that contains a user named User1 and a Microsoft Sentinel workspace named WS1. WS1 uses Microsoft Defender for Cloud.

You have the Microsoft security analytics rules shown in the following table.



User1 performs an action that matches Rule1, Rule2, Rule3, and Rule4.

How many incidents will be created in WS1?

  • A. 1
  • B. 2
  • C. 3
  • D. 4
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RedZtopics
Highly Voted 11 months, 3 weeks ago
Selected Answer: D
D for me
upvoted 6 times
...
rkrau
Most Recent 2 months, 3 weeks ago
Selected Answer: D
Rule Settings: If the rules (Rule1, Rule2, Rule3, Rule4) are independent of each other (i.e., they don't have the same incident grouping criteria), each rule will create its own incident. However, if the incident grouping feature is enabled and the rules have matching criteria (e.g., same user or same event), they could be grouped into a single incident. Incident Grouping: Incident grouping is a feature that groups alerts from different detection rules into a single incident based on specific matching criteria like the same entity (e.g., user, IP address, or device). If the rules match the same underlying entity (for example, User1), the system might group those alerts into one incident. Without grouping, each rule will generate a separate incident. There is nothing about grouping mentioned, so D
upvoted 1 times
rkrau
2 months, 3 weeks ago
Incident grouping is enabled by default in Microsoft Sentinel. so I revert my decision to A
upvoted 1 times
...
...
HAjouz
4 months, 1 week ago
Selected Answer: A
The answer is A. 1. Here's why: Incident Grouping: Microsoft Sentinel has a built-in mechanism to group related alerts into a single incident. This helps reduce alert fatigue and provides a more comprehensive view of security events.
upvoted 1 times
Adel614
1 week, 4 days ago
Apart from the entity "User1", nothing leads that the 4 created incidents are related. Plus, it explicitly says in the documentation (https://learn.microsoft.com/en-us/defender-xdr/alerts-incidents-correlation) that it "Applies to: Microsoft Defender XDR, Microsoft Sentinel in the Microsoft Defender portal": The incidents merging is not applied on the Sentinel platform.
upvoted 1 times
...
xRiot007
3 months, 1 week ago
Grouping is not done by default. The default is 1 rule - 1 incident. Given these 4 rules there could be multiple groupings configured, for example rule 1+2 and 3+4 or maybe 1+2+3 and 4 with no group and so on.
upvoted 2 times
...
...
Tuitor01
4 months, 4 weeks ago
Selected Answer: D
1 analytics rule generates alerts based on the KQL query you use, these alerts are grouped together or not , according to you configuration choice and these alerts can be turned into incidents if you so choose. You can group the incidents into one single incidents too based on multiple factors like, say: all common entities, or one common entity or again, group them all together no matter what the entities are. This is all configurable on a per Analytics Rule basis. So One Analytics Rule generates one incident or alert or multiple incidents or alerts . Here You have four Analytics rules that detect different things where all the conditions for each rules match a particular event. So 1 incident at least per rule would be created following that logic, therefore 4 incidents.
upvoted 2 times
...
sapphire
5 months, 2 weeks ago
Selected Answer: A
I go with A, Microsoft Defender groups alerts in Incident when the same user generated this alerts.
upvoted 1 times
Tuitor01
4 months, 4 weeks ago
1 analytics rule generated alerts based on the KQL query you use, these alerts are grouped together or nor , according to you configuration choice and these alerts can be turned into incidents if you so choose. You can group the incidents into one single incidents too based on multiple factors like, say by all common entities, or one common entity or again, groups them all together no matter what the entities are. This is all configurable on a per Analytics Rule basis. So One Analytic Rule generates one incident or alert or multiple incidents or alerts . Here You have four Analytics rules that detect different things where all the conditions for each rules matches a particular events. So 1 incident at least per rule would be created following that logic.
upvoted 2 times
...
...
xrxss
6 months ago
https://learn.microsoft.com/en-us/defender-xdr/alerts-incidents-correlation\ - A for me Incident correlation and merging Microsoft Defender XDR's correlation activities don't stop when incidents are created. Defender XDR continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Defender XDR merges the incidents into a single incident. How does Defender XDR make that determination? Defender XDR's correlation engine merges incidents when it recognizes common elements between alerts in separate incidents, based on its deep knowledge of the data and the attack behavior. Some of these elements include: Entities—assets like users, devices, mailboxes, and others Artifacts—files, processes, email senders, and others Time frames Sequences of events that point to multistage attacks—for example, a malicious email click event that follows closely on a phishing email detection.
upvoted 1 times
...
Franc_Coetzee
8 months, 2 weeks ago
Selected Answer: A
Even though all 4 rules were triggered, they were triggered by a single user. Defender will then group all alerts and incidents under the single user
upvoted 2 times
Sparkletoss
6 months, 1 week ago
I hope I am correct with this one Alerts are grouped together if they share identical values for all of the mapped entities, alert details, and custom details selected from the respective drop-down lists.
upvoted 1 times
...
...
jacobtriestech
9 months, 3 weeks ago
Selected Answer: D
https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications
upvoted 1 times
Studytime2023
9 months, 2 weeks ago
I'm not sure if this question has anything to do with email alerts? It only asked how many incidents will be created. Maybe this link will provide some insight. https://learn.microsoft.com/en-us/azure/sentinel/create-analytics-rules?tabs=azure-portal#configure-the-incident-creation-settings
upvoted 3 times
...
...
Peachy7
11 months, 4 weeks ago
Answer: D https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago