exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 3 question 52 discussion

Actual exam question from Microsoft's SC-200
Question #: 52
Topic #: 3
[All SC-200 Questions]

You have a Microsoft Sentinel workspace.

You receive multiple alerts for failed sign-in attempts to an account.

You identify that the alerts are false positives.

You need to prevent additional failed sign-in alerts from being generated for the account. The solution must meet the following requirements:

• Ensure that failed sign-in alerts are generated for other accounts.
• Minimize administrative effort

What should do?

  • A. Modify the analytics rule.
  • B. Create a watchlist.
  • C. Add an activity template to the entity behavior.
  • D. Create an automation rule.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ct1984
Highly Voted 1 year, 5 months ago
The correct answer on SC-200 Practice Assesment from Microsoft is A
upvoted 24 times
...
ACSC
Highly Voted 1 year, 10 months ago
Selected Answer: D
https://learn.microsoft.com/en-us/azure/sentinel/false-positives
upvoted 11 times
MoSea
1 year, 10 months ago
Agreed. In the article it states: "This article describes two methods for avoiding false positives: Automation rules create exceptions without modifying analytics rules. Scheduled analytics rules modifications permit more detailed and permanent exceptions."
upvoted 4 times
...
...
xRiot007
Most Recent 4 days, 16 hours ago
Selected Answer: A
A is the correct answer - we need to modify the analytics rule itself to avoid generating alerts. An automation rules does not prevent alert generation, instead it can be used to automatically solve alerts.
upvoted 1 times
...
talosDevbot
2 months, 1 week ago
Selected Answer: A
Lets say the account name is "user123". You need to modify the KQL query in the rule to exclude user123. Something like: SecurityEvents | where EventID == 4625 | where Account != "user123"
upvoted 1 times
...
user636
3 months, 3 weeks ago
Selected Answer: A
Answer is A. Modifying the analytics rule will not let the alert be generated at first place. Automation rule does not stop the alert generation. The alert will be generated & later be closed/handled by the automation rule, depending upon what it is configured as.
upvoted 2 times
...
user636
3 months, 3 weeks ago
Selected Answer: A
Answer is A.
upvoted 1 times
...
smanzana
4 months, 2 weeks ago
A and D look correct, the key is “Minimize administrative effort” to choose option A
upvoted 1 times
...
Max_DeJaV
6 months, 2 weeks ago
Selected Answer: B
Creating a watchlist containing the involved user is the best way to prevent alert from being generated as the question asks: "You need to prevent additional failed sign-in alerts from being generated for the account" A watchlist is also easy to manage because entries can be added or deleted without modifying the analytics rule. The automation rule plays a role once the alert has already been generated, as the triggers are "When incident is created" and "When alert is created"
upvoted 2 times
...
uday1985
7 months, 1 week ago
D https://learn.microsoft.com/en-us/azure/sentinel/false-positives#add-exceptions-by-using-automation-rules
upvoted 1 times
...
Sneekygeek
7 months, 3 weeks ago
Selected Answer: D
Super lame that Microsoft would have a question with an arguably subjective answer but based on the verbiage in the doc where it says automation rules are "often created by analysts" they seem to be implying this method takes less administrative effort. https://learn.microsoft.com/en-us/azure/sentinel/false-positives
upvoted 2 times
...
DChilds
8 months, 1 week ago
Selected Answer: A
The level of granularity in modifying analytic rules will always ensure the least administrative effort. It is the more complex of the two available options but it results in the least administration afterwards. Notice administrative effort does not mean least complex approach. Allow advanced boolean expressions and subnet-based exceptions. Let you use watchlists to centralize exception management. Typically require implementation by Security Operations Center (SOC) engineers. Are the most flexible and complete false positive solution, but are more complex. https://learn.microsoft.com/en-us/azure/sentinel/false-positives
upvoted 1 times
...
meg4321
8 months, 2 weeks ago
Selected Answer: B
Wouldn't creating a watchlist integrated in the analytic rule to exclude this account (and maybe more in the future) be easier to maintain? (less admin effort)
upvoted 3 times
...
Cloud_EG
9 months, 2 weeks ago
Selected Answer: D
D. Create an automation rule. The key point is that "the solution must minimize administrative effort". so the answer is automation rule per below link which says Analytics rules modifications are more complex. https://learn.microsoft.com/en-us/azure/sentinel/false-positives#false-positive-causes-and-prevention
upvoted 2 times
...
luisM14
10 months, 3 weeks ago
Selected Answer: A
"Being generated". Create an automation rule, will not prevent the alert to be generated
upvoted 2 times
...
estyj
11 months, 2 weeks ago
A. Two methods for avoiding false positives. Automation rules create exceptions without modifying analytics rules. https://learn.microsoft.com/en-us/azure/sentinel/false-positives. Scheduled analytics rules modifications permit more detailed and permanent exceptions.
upvoted 2 times
...
Murtuza
11 months, 3 weeks ago
Analytical rules = Are the most flexible and complete false positive solution, but are more complex Automation Rules = Allow applying exceptions for a limited time. For example, maintenance work might trigger false positives that outside the maintenance timeframe would be true incidents. https://learn.microsoft.com/en-us/azure/sentinel/false-positives
upvoted 1 times
...
Applonce
1 year ago
Selected Answer: A
Suppression rule supposed to be implemented, so most likely answer i see here is A
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago