exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 2 question 36 discussion

Actual exam question from Microsoft's SC-200
Question #: 36
Topic #: 2
[All SC-200 Questions]

You plan to review Microsoft Defender for Cloud alerts by using a third-party security information and event management (SIEM) solution.

You need to locate alerts that indicate the use of the Privilege Escalation MITRE ATT&CK tactic.

Which JSON key should you search?

  • A. Description
  • B. Intent
  • C. ExtendedProperies
  • D. Entities
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
VictorLiu
Highly Voted 2 years, 3 months ago
Selected Answer: B
B. Intent https://learn.microsoft.com/en-us/rest/api/defenderforcloud/alerts/list?tabs=HTTP#intent
upvoted 20 times
Fcnet
2 years, 3 months ago
Intent PrivilegeEscalation string Privilege escalation is the result of actions that allow an adversary to obtain a higher level of permissions on a system or network.
upvoted 4 times
...
...
HAjouz
Most Recent 2 months ago
Selected Answer: C
Within the JSON structure of a Microsoft Defender for Cloud alert, the MITRE ATT&CK tactic information is stored within the ExtendedProperties section.
upvoted 1 times
...
g_man_rap
8 months, 3 weeks ago
Correct Answer: C. ExtendedProperties Explanation: The ExtendedProperties JSON key is designed to hold additional and structured information about the alert. In the context of Microsoft Defender for Cloud and other security platforms, this often includes detailed metadata such as MITRE ATT&CK tactic mappings. Therefore, searching the ExtendedProperties key will likely yield results that specifically indicate the Privilege Escalation tactic.
upvoted 2 times
...
falkendarkness
1 year, 2 months ago
Option B ("Intent") is not typically used to directly represent the MITRE ATT&CK tactics or techniques associated with an alert in Microsoft Defender for Cloud. The "Intent" field, if present in the alert data, might provide information about the suspected purpose or objective of the observed activity. However, it does not specifically indicate the MITRE ATT&CK tactic or technique being employed. On the other hand, the "ExtendedProperties" field often contains additional contextual information about the alert, including any associated MITRE ATT&CK tactics and techniques. This field is more likely to contain the specific details needed to identify alerts related to the Privilege Escalation tactic. Therefore, in the context of locating alerts related to the Privilege Escalation MITRE ATT&CK tactic, the "ExtendedProperties" field (Option C) is more relevant to search within the JSON data.
upvoted 1 times
Durden871
1 year ago
I used ChatGPT as well and got the same answer. Every other dump seems to indicate intent is the answer. No one who says ExtendedProperties has given a link as to why this is the case. I normally trust ChatGPT, but this case I don't. Properties.Intent: The kill chain related intent behind the alert. For list of supported values, and explanations of Azure Security Center's supported kill chain intents. https://learn.microsoft.com/en-us/rest/api/defenderforcloud/alerts/list?view=rest-defenderforcloud-2022-01-01&tabs=HTTP#intent
upvoted 1 times
...
...
neo73
1 year, 2 months ago
To locate Privilege Escalation MITRE ATT&CK tactic alerts in Microsoft Defender for Cloud, search the Description JSON key. To locate alerts that indicate the use of the Privilege Escalation MITRE ATT&CK tactic in Microsoft Defender for Cloud, you should search the Description JSON key. The Description key provides a detailed explanation or summary of the alert, and it may include information about the observed behavior or activity related to privilege escalation. By searching the Description key, you can filter and identify alerts that specifically mention or describe privilege escalation techniques. This can help in effectively reviewing and addressing such alerts using the third-party security information and event management (SIEM) solution.
upvoted 1 times
...
chepeerick
1 year, 6 months ago
B intent
upvoted 1 times
...
NICKTON81
1 year, 7 months ago
Selected Answer: B
B. Intent https://learn.microsoft.com/en-us/rest/api/defenderforcloud/alerts/list?tabs=HTTP#intent:~:text=%22High%22%2C-,%22intent%22%3A%20%22Execution%22%2C,-%22startTimeUtc%22%3A
upvoted 1 times
...
mali1969
1 year, 8 months ago
Selected Answer: D
The JSON key that you should search for alerts that indicate the use of the Privilege Escalation MITRE ATT&CK tactic is Entities. This key contains information about the entities involved in the alert, such as users, devices, files, etc. The value of this key can include a MITRETechniques property that lists the MITRE ATT&CK techniques associated with the alert.
upvoted 1 times
...
mimguy
1 year, 9 months ago
On the exam July 7 2023
upvoted 4 times
srajal
1 year, 9 months ago
Which is correct answer
upvoted 2 times
...
...
[Removed]
2 years, 2 months ago
Selected Answer: B
The "Intent" key is part of the JSON format used by Microsoft Defender for Cloud to transmit security alert data to third-party security information and event management (SIEM) solutions. The "Intent" key provides information on the type of attack or tactic that the alert is related to, and can be used to identify alerts that are specifically related to the Privilege Escalation tactic.
upvoted 3 times
...
PhoenixSlasher
2 years, 2 months ago
Selected Answer: B
B. Intent Personally find the extendedProperties to contain the data as well but Intent clearly defines Privilege Escalation without digging around in extended properties.
upvoted 3 times
...
[Removed]
2 years, 2 months ago
Selected Answer: B
B - https://learn.microsoft.com/en-us/rest/api/defenderforcloud/alerts/list?tabs=HTTP#intent:~:text=%22High%22%2C-,%22intent%22%3A%20%22Execution%22%2C,-%22startTimeUtc%22%3A
upvoted 4 times
...
jayek
2 years, 2 months ago
https://learn.microsoft.com/en-us/rest/api/defenderforcloud/alerts/list?tabs=HTTP#intent:~:text=%22High%22%2C-,%22intent%22%3A%20%22Execution%22%2C,-%22startTimeUtc%22%3A
upvoted 2 times
...
WRITER00347
2 years, 3 months ago
The JSON key you should search for to locate alerts that indicate the use of the Privilege Escalation MITRE ATT&CK tactic is extendedProperties. The extendedProperties key in the JSON structure of an alert contains the MITRE ATT&CK information for the alert, such as the tactics and techniques used by the attacker. The key contains the tactic name in the MITRE ATT&CK framework, such as "Privilege Escalation", "Initial Access", "Execution" and so on. You can use the extendedProperties key to filter and search for alerts that are related to the Privilege Escalation tactic in your third-party SIEM solution. It's also important to note that, the other options A,B,C are not related to the MITRE ATT&CK information and are used for different purposes.
upvoted 1 times
WRITER00347
2 years, 3 months ago
so C. ExtendedProperties
upvoted 2 times
Fcnet
2 years, 3 months ago
https://learn.microsoft.com/en-us/rest/api/defenderforcloud/alerts/list?tabs=HTTP#intent
upvoted 3 times
Fcnet
2 years, 3 months ago
this is for the intent answer wich is the right answer
upvoted 4 times
...
...
...
...
JoshJosh
2 years, 3 months ago
Entities
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago