exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 1 question 9 discussion

Actual exam question from Microsoft's SC-200
Question #: 9
Topic #: 1
[All SC-200 Questions]

You are investigating a potential attack that deploys a new ransomware strain.
You have three custom device groups. The groups contain devices that store highly sensitive information.
You plan to perform automated actions on all devices.
You need to be able to temporarily group the machines to perform actions on the devices.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. Assign a tag to the device group.
  • B. Add the device users to the admin role.
  • C. Add a tag to the machines.
  • D. Create a new device group that has a rank of 1.
  • E. Create a new admin role.
  • F. Create a new device group that has a rank of 4.
Show Suggested Answer Hide Answer
Suggested Answer: ACD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Metasploit
Highly Voted 7 months, 1 week ago
Selected Answer: ACD
Setting the scene: There are 3 device groups. You want to take action on all devices. Meaning you want 1(One) Device group with all devices. --> A: So you create this custom group(AllDeviceTempGroup) and add a Tag filter(RansomIRTag) to group devices into this device group. You see that there are no devices in this group. Why? You have not tagged your devices yet. --> B: You add the tag, RansomIRTag, to all devices. You notice that your devices have not populated your new device group, AllDeviceTempGroup. Why? In the details of the question, you are informed that these devices already have a group. Which means if your group is not promoted to highest rank, then the devices will choose their original group instead. -->C: Promote AllDeviceTempGroup to highest rank.
upvoted 90 times
Wutan
2 years, 3 months ago
This is so well explained and in depth, thank you so much.
upvoted 4 times
...
Nikki0222
6 months, 1 week ago
This answer is correct
upvoted 1 times
...
DaraVasu
2 years, 2 months ago
Great explanation
upvoted 2 times
...
Metasploit
2 years, 6 months ago
Answer is ACD. My brain listed the answers in order of 1,2,3,a,b,c while I typed.
upvoted 9 times
...
...
Ken88
Highly Voted 3 years, 1 month ago
Selected Answer: ACD
Admin role is not required. Given answer:ACD is correct
upvoted 10 times
...
lilou123
Most Recent 2 months, 1 week ago
Selected Answer: ACD
A. Assign a tag to the device group. This allows you to easily identify and filter the devices within those groups for automated actions. You can target actions based on tags. C. Add a tag to the machines. This allows for granular control. Even within a device group, tagging specific machines lets you isolate and target only the ones you need for a particular action related to the ransomware investigation. D. Create a new device group that has a rank of 1. Device group ranking allows you to prioritize actions. A rank of 1 means this group will be targeted first, ensuring your automated actions are applied to the most critical devices (those with highly sensitive information) as quickly as possible
upvoted 1 times
...
lilou123
2 months, 1 week ago
Selected Answer: ACD
A. Assign a tag to the device group. This allows you to easily identify and filter the devices within those groups for automated actions. You can target actions based on tags. C. Add a tag to the machines. This allows for granular control. Even within a device group, tagging specific machines lets you isolate and target only the ones you need for a particular action related to the ransomware investigation. D. Create a new device group that has a rank of 1. Device group ranking allows you to prioritize actions. A rank of 1 means this group will be targeted first, ensuring your automated actions are applied to the most critical devices (those with highly sensitive information) as quickly as possible.
upvoted 1 times
...
chepeerick
1 year, 6 months ago
Selected Answer: ACD
correct
upvoted 1 times
...
Kanguro007
2 years, 3 months ago
https://www.drware.com/how-to-use-tagging-effectively-in-microsoft-defender-for-endpoint-part-1/
upvoted 1 times
...
Hamatew
2 years, 3 months ago
Thanks for the explanation. Probably i skipped some aspect while studying, i have this question, Assuming i have 100s of devices how can i tag all at once. I need to give RansomIRtag to 100 devices, will i start adding one by one?
upvoted 1 times
...
Tx4free
3 years, 1 month ago
Selected Answer: ACD
Best answer
upvoted 2 times
...
Tx4free
3 years, 1 month ago
Selected Answer: ACE
Best answer
upvoted 2 times
...
liberty123
3 years, 2 months ago
Selected Answer: ACD
ACD correct
upvoted 3 times
...
stromnessian
3 years, 3 months ago
ACD. No admin role is required in the scenario given (automated), and obviously the rank needs to be 1, not 4 for the group that contains the tagged devices.
upvoted 2 times
...
RandomNickname
3 years, 3 months ago
Think given answer is correct, but not 100%. C: Tag all machines ( as requested ), to ensure they can be grouped temporarily. A: Add the tagged machines to the group to be able to perform automated actions on all. D: Ensure has rank of 1, so given tagged machines are added, in case of devices match other groups.
upvoted 7 times
...
Mastersin
3 years, 4 months ago
BDE https://docs.microsoft.com/en-us/learn/modules/deploy-microsoft-defender-for-endpoints-environment/6-configure-device-groups
upvoted 3 times
...
Nail
3 years, 5 months ago
As far as I can tell, you can't assign tag to a device group, only devices. And why would you need to assign tags to both devices and device groups? So I think the answer must be CDE.
upvoted 2 times
Nail
3 years, 4 months ago
On second thought, I think this answer is correct, ACD. You would add the tag to the devices, then assign the tag to the device group to create a group based on the tags, and then rank it #1 so it takes precedence over the other groups.
upvoted 11 times
...
...
kakakayayaya
3 years, 6 months ago
Correct answer but reference is not so useful.
upvoted 1 times
Metasploit
2 years, 6 months ago
Watch the video in the reference. The video explains this answer 100%. ACD.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago