exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 1 question 14 discussion

Actual exam question from Microsoft's SC-200
Question #: 14
Topic #: 1
[All SC-200 Questions]

HOTSPOT -
You are informed of an increase in malicious email being received by users.
You need to create an advanced hunting query in Microsoft 365 Defender to identify whether the accounts of the email recipients were compromised. The query must return the most recent 20 sign-ins performed by the recipients within an hour of receiving the known malicious email.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
pedromonteirozikado
Highly Voted 3 months ago
The first answer "EmailEvents" is right because only EmailEvents table have the Subject column, but both EmailEvents and EmailAttachmentInfo have the ThreatType table (old MalwareFilterVerdict). The second answer: IdentityLogonEvents, is right, because is the only table that have identity objects related. The third answer: take 20, according to MS "here is no guarantee which records are returned, unless the source data is sorted.", "take and limit are synonyms". I tested by myself, and the only query that return the latest results was: top 20 by Timestamp, because only "top 20" didn't work.
upvoted 41 times
Tuitor01
2 weeks, 1 day ago
it would be top 20 by some table. So answer is de facto take 20 indeed.
upvoted 1 times
...
...
jasonfmj
Highly Voted 2 months, 4 weeks ago
//Define new table for malicious emails let MaliciousEmails=EmailEvents //List emails detected as malware, getting only pertinent columns | where ThreatTypes has "Malware" | project TimeEmail = Timestamp, Subject, SenderFromAddress, AccountName = tostring(split(RecipientEmailAddress, "@")[0]); MaliciousEmails | join ( //Merge malicious emails with logon events to find logons by recipients IdentityLogonEvents | project LogonTime = Timestamp, AccountName, DeviceName ) on AccountName //Check only logons within 30 minutes of receipt of an email | where (LogonTime - TimeEmail) between (0min.. 30min) | take 10
upvoted 11 times
...
Thezuland1098
Most Recent 2 months, 2 weeks ago
Why use take and not top in this scenario? The query in your case doesn't explicitly mention sorting the logon events by a specific column (e.g., timestamp). It simply limits the results to a certain number, so take is appropriate here. If you wanted the 20 most recent logon events, you could use top 20 by LogonTime, which ensures that you are retrieving the most recent events sorted by time.
upvoted 1 times
...
talosDevbot
2 months, 2 weeks ago
The output of KQL queries are sorted by descending order of the first column. So take 20 works out here
upvoted 2 times
...
oreoale
2 months, 4 weeks ago
The answer is correct. Here is an example: https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#review-logon-attempts-after-receipt-of-malicious-emails //Define new table for malicious emails let MaliciousEmails=EmailEvents //List emails detected as malware, getting only pertinent columns | where ThreatTypes has "Malware" | project TimeEmail = Timestamp, Subject, SenderFromAddress, AccountName = tostring(split(RecipientEmailAddress, "@")[0]); MaliciousEmails | join ( //Merge malicious emails with logon events to find logons by recipients IdentityLogonEvents | project LogonTime = Timestamp, AccountName, DeviceName ) on AccountName //Check only logons within 30 minutes of receipt of an email | where (LogonTime - TimeEmail) between (0min.. 30min) | take 10
upvoted 4 times
...
g_man_rap
4 months ago
EmailEvents is used to filter out the malicious emails. IdentityLogonEvents is used to check for sign-ins by those who received the malicious emails. top 20 ensures that only the most recent 20 sign-in events are returned, which matches the requirement of the task.
upvoted 2 times
...
emartiy
6 months, 2 weeks ago
EmailEvents, IdentityLogonEvents, take 20 because take operator in kql returns most recents records in event table..
upvoted 2 times
...
chepeerick
1 year, 2 months ago
correct, There is no guarantee which records are returned, unless the source data is sorted. If the data is sorted, then the top values will be returned.
upvoted 1 times
...
tatendazw
1 year, 6 months ago
EmailEvents, IdentityLogonEvents, take 20
upvoted 3 times
...
Ramkid
1 year, 11 months ago
Given Answer is correct, check the following page that has this query under the section "Review logon attempts after receipt of malicious emails" https://learn.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#review-logon-attempts-after-receipt-of-malicious-emails
upvoted 4 times
danb67
1 year, 2 months ago
This query is wrong and Microsoft need to fix this page. Take 10 will never give you the most recent logins. It gives a random 10 results and is different each time you run it.
upvoted 1 times
danb67
1 year, 2 months ago
ignore this wrong question
upvoted 1 times
...
...
...
Fukacz
2 years, 3 months ago
Correct. Take 20 is equal to top 20 by timestamp here.
upvoted 4 times
danb67
1 year, 2 months ago
why? Would it not need by Timestamp at the end
upvoted 1 times
...
...
its_me_Nat
2 years, 9 months ago
take 20 is correct if you need to select most recent logins.
upvoted 1 times
...
jetodo7615
2 years, 11 months ago
Answer is correct, but the solution is incomplete, as the results needs to be sorted before "take" command (most recent logons). "Top" is not an option here as it needs "by" argument to be correct.
upvoted 6 times
...
RandomNickname
2 years, 11 months ago
Believe given answer to be correct
upvoted 4 times
...
ReginaldoBarreto
3 years ago
take operator There is no guarantee which records are returned, unless the source data is sorted. ------------------------ for this query the correct would not use top ? Since they ask for recent records
upvoted 3 times
pedromonteirozikado
2 years, 10 months ago
Yes, | top 20 by Timestamp
upvoted 3 times
...
zedricko
3 years ago
I guess so top should be used in this case
upvoted 2 times
j888
2 years, 8 months ago
As per 'Pedromonteirozikado' it is missing "by Timestamp" statement. So the given answer is correct.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago