exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 1 question 8 discussion

Actual exam question from Microsoft's SC-200
Question #: 8
Topic #: 1
[All SC-200 Questions]

You have the following advanced hunting query in Microsoft 365 Defender.

You need to receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. Create a detection rule.
  • B. Create a suppression rule.
  • C. Add | order by Timestamp to the query.
  • D. Replace DeviceProcessEvents with DeviceNetworkEvents.
  • E. Add DeviceId and ReportId to the output of the query.
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
teehex
Highly Voted 3 months, 1 week ago
Correct query is DeviceProcessEvents | where Timestamp > ago (24h) //Pivoting for rundll32 | where InitiatingProcessFileName =~ 'rundll32.exe' //Looking for empty command line and InitiatingProcessCommandLine !contains " " and InitiatingProcessCommandLine != "" //Looking for schtasks.exe as the created process and FileName in~ ('schtasks.exe') //Disabling system restore and ProcessCommandLine has 'Change' and ProcessCommandLine has 'SystemRestore' and ProcessCommandLine has 'disable' | project Timestamp, AccountName, ProcessCommandLine, DeviceId, ReportId Given answer is correct. - Create detection rule - Add ReportId and DeviceId to the output. Both fields are supported in DeviceProcessEvents table.(https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-deviceprocessevents-table?view=o365-worldwide) The sample query can be found here https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-find-ransomware?view=o365-worldwide#turning-off-system-restore
upvoted 45 times
...
ArciOfficial
Highly Voted 3 years, 5 months ago
Given answer is CORRECT: According to the link below, DeviceID and ReportID are REQUIRED columns for any custom query. https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-alerts?view=o365-worldwide#suppress-an-alert-and-create-a-new-suppression-rule
upvoted 8 times
im20batman
1 year ago
You mean this link https://learn.microsoft.com/en-us/microsoft-365/security/defender/custom-detection-rules?view=o365-worldwide
upvoted 1 times
...
...
nk_exam
Most Recent 1 month, 3 weeks ago
Given answers are correct
upvoted 1 times
...
Nikki0222
2 months, 1 week ago
Given answer is correct
upvoted 1 times
...
Metasploit
3 months, 1 week ago
Selected Answer: AE
A = Requirement is to create an alert. Not B = This will hide the the alert. Not C = Avoid filtering custom detections using the Timestamp column. The data used for custom detections is pre-filtered based on the detection frequency. Not D = Random filler answer E = To create a custom detection rule, the query must return the following columns: ->Timestamp—used to set the timestamp for generated alerts ->ReportId—enables lookups for the original records One of the following columns that identify specific devices, users, or mailboxes: -> DeviceId
upvoted 6 times
...
Oryx360
3 months, 1 week ago
It is C&E C. Adding | order by Timestamp to the query ensures that the results are ordered by the Timestamp in ascending or descending order, depending on your requirement. This helps you easily identify the most recent events related to the disabling of System Restore. E. Adding DeviceId and ReportId to the output of the query provides additional context about the affected device and the specific report associated with the event. This information is valuable for investigation and tracking purposes. The other options (B and D) are not relevant to the task of creating an alert for detecting the disabling of System Restore by a process. Suppression rules are used to manage and control alert noise, and replacing DeviceProcessEvents with DeviceNetworkEvents changes the source of data, which isn't related to the objective of the question.
upvoted 1 times
...
smanzana
10 months, 3 weeks ago
I agree with AE
upvoted 1 times
...
chepeerick
1 year, 2 months ago
correct
upvoted 1 times
...
P0wned
1 year, 3 months ago
Selected Answer: AE
A and E
upvoted 1 times
...
JuNanski
1 year, 8 months ago
correct
upvoted 1 times
...
Apocalypse03
2 years ago
Selected Answer: AD
Create a detection rule: A detection rule is a configuration in Microsoft 365 Defender that specifies the conditions under which an alert should be generated. You can create a detection rule based on the advanced hunting query provided, which will trigger an alert whenever the query returns any results. Add DeviceId and ReportId to the output of the query: In order to include relevant information about the device and alert in the generated alert, you should include the DeviceId and ReportId fields in the output of the query. You can do this by adding DeviceId and ReportId to the list of fields selected by the project operator at the end of the query.
upvoted 3 times
...
Fukacz
2 years, 3 months ago
Selected Answer: AE
correct
upvoted 2 times
...
Tx4free
2 years, 9 months ago
Selected Answer: AE
Best answer
upvoted 3 times
...
liberty123
2 years, 10 months ago
Selected Answer: AE
Agree with AE
upvoted 4 times
...
stromnessian
2 years, 11 months ago
Selected Answer: AE
Simples.
upvoted 4 times
...
stromnessian
2 years, 11 months ago
Selected Answer: AE
AE is correct
upvoted 3 times
...
Hacker00
3 years ago
Given answer is correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago