Questions explained Flashcards

(37 cards)

1
Q

You have a Microsoft 365 E5 subscription.

You plan to deploy Microsoft Defender for Cloud Apps.

You need to create a policy that will implement data loss prevention (DLP).

Which two types of policies should you create? Each correct answer presents part of the solution.

Select all answers that apply.

access policy

app discovery policy

file policy

session policy

A

C & D

A File policy is used to scan and enforce DLP on files that are already stored in your cloud apps.

A Session policy is used for real-time monitoring and control of user activity within your cloud applications. It is particularly effective for preventing data exfiltration.

For true DLP, you need File policies to manage data at rest and Session policies to manage data in transit and control in-session activities.

NOT

App discovery policies are focused on Shadow IT management and visibility, not data protection.

Access policies are designed for access control and authentication management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have a Microsoft Sentinel workspace.

You need to create an analytics rule that will use entity mapping.

Which type of rule should you create?

Select only one answer.

anomaly

fusion

machine learning (ML) behavioral analytics

scheduled

A

D

Microsoft Sentinel includes 4 main types of analytical rules.

Scheduled
Near Real time NRT
Anomoly
Microsoft Security rules

Entity Mapping- a feature in analytics rules that links data fields from a query to specific entity types, such as accounts, IP addresses, hosts, or files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Will a parser work with a filter by time?

A

No
The query that uses the parser will apply the required time range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have a Microsoft Sentinel workspace.

You need to prevent a built-in Advanced Security Information Model (ASIM) parser from being updated automatically.

Which two actions can you perform? Each answer presents a complete solution.

Select all answers that apply.

Build a custom unifying parser and include the built-in parser version.

Create a hunting query and reference the built-in parser.

Create an analytics rule and include the built-in parser.

Redeploy the built-in parser and specify a CallerContext value of Any and a SourceSpecificParser value of Any.

Redeploy the built-in parser and specify a CallerContext value of Built-in.

A

A & D

By using a unifying Parser, you can “lock in” the version

Add a new record to the ASimDisabledParsers watchlist.

Define the CallerContext value as Exclude<parser>, where <parser> is the name of the unifying parser from which you want to exclude a source-specific parser.
Define the SourceSpecificParser value as Exclude<parser>, where <parser> is the name of the source-specific parser you want to exclude (without a version specifier).</parser></parser></parser></parser>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Parser’s

A

ASi - prefix for source specific parser (parameter-less parsers)
ASim - unifying parsers, It does not accept filtering parameters
im - unifying parser that supports filtering parameters
vim - source-specific parsers that accept filtering parameters
Im - Microsoft’s built-in unifying parsers. The underscore indicates that it is a system-provided function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where to access DLP alerts

A

Purview compliance portal & Defender portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User1 leaves the company, and the user’s account is deleted.

You need to identify whether User1 downloaded files from Site1 during the 30 days before the account was deleted.

Which type of policy should you create?

a Microsoft Defender for Cloud Apps file policy

a Microsoft Defender for Office 365 alert policy

a Microsoft Purview insider risk management policy

This answer is correct.

a Microsoft Entra Governance access review

A

C

you can create an insider risk policy that triggers an alert if suspicious activity, such as mass file download, is detected up to 90 days before a user account is deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your company uses Microsoft Defender for Cloud.

During a 24-hour period, Defender for Cloud generates the following alerts:

12 low-severity alerts
Six medium-severity alerts
Three high-severity alerts
What is the maximum number of email notifications that Defender for Cloud will send during the 24 hours?

Select only one answer.

3

6

9

12

21

A

B

Default max notifications for Defender for Cloud:

High Severity - 1 per 6 hours
Medium Severity - 1 per 12 hours
Low severity - 1 per 24 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have a Microsoft Sentinel workspace.

You need to investigate incidents by using the Microsoft Sentinel investigation graph.

What is the maximum age of the incidents that can be investigated by using the investigation graph?

Select only one answer.

7 days

14 days

30 days

90 days

A

C

30 is the max within Sentinel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Within an investigation graph, what is shown when you hover over an entry or VM?

A

if you hover your mouse over Azure virtual machine, you will get the list of running processes on that virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Within Sentinel workspace testing a playbook from an alert

A

Incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have an Azure subscription that contains a resource group named RG1 and a Microsoft Sentinel workspace.

In RG1, you create a playbook named Play1.

You need to ensure that the Azure Security Insights identity can run Play1. The solution must follow the principle of least privilege.

What should you do?

Select only one answer.

Delegate the Logic App Contributor role on Play1.

Delegate the Logic App Contributor role on RG1.

Delegate the Microsoft Sentinel Automation Contributor role on Play1.

Delegate the Microsoft Sentinel Automation Contributor role on RG1.

A

D

You must delegate Microsoft Sentinel Automation Contributor role to the Azure Security Insights identity on the resource group in which the playbook is deployed. If you delegate a role on the playbook itself or delegate the Logic App Contributor role, the playbook still cannot be selected in Microsoft Sentinel (it is unavailable).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Defender for Endpoint capabilities

A

Attack surface reduction –– Provides rules to target certain software behaviors, such as launching executable files and scripts and running unsigned processes.

Block at first site –– A threat protection feature that detects new malware and blocks it within seconds.

Controlled folder access –– Protects data by checking apps against a list of known and trusted apps.

Exploit protection –– Helps protect against malware that uses exploits to infect devices and spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have an Azure Storage account named storage1 that contains the following resources:

A blob container named container1
A file share named share1
A queue named queue1
A table named table1
You enable Microsoft Defender for Cloud for storage1.

Which resources will be protected?

Select only one answer.

container1 and share1 only

container1 only

container1, share1, and table1 only

container, share1, queue1, and table1

share1 only

A

A

Defender for Cloud includes Microsoft Defender for Storage

Defender for Storage continually analyzes the telemetry stream generated by the Azure Blob storage and Azure Files services, but not queues and tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You have the following cloud environments:

An Azure subscription that uses Microsoft Defender for Cloud
A Microsoft 365 tenant.
An Amazon Web Services (AWS) account
A Google Cloud Platform (GCP) project
You need to ensure that you can use Defender for Cloud to perform Cloud Security Posture Management (CSPM) for the environments.

Which environments will require that a connector be deployed?

A

AWS & GCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is required for a new Sentinel Workspace?

A

an Azure subscription, a Microsoft Entra tenant, and a Log Analytics workspace

17
Q

Your on-premises network contains multiple devices that provide logs in Common Event Format (CEF).

You have an Azure subscription and a Microsoft Sentinel workspace named Workspace1.

You need to ingest the logs from the devices into Workspace1.

What should you do first?

Select only one answer.

Add the Security Events via Legacy Agent data connector in Microsoft Sentinel.

Add the Syslog data connector in Microsoft Sentinel.

Deploy a computer that runs Linux.

Deploy a server that runs Windows Server.

A

C

To ingest Syslog and CEF logs into Microsoft Sentinel, particularly from devices and appliances onto which you cannot install the Log Analytics agent directly, you must designate and configure a Linux machine that will collect the logs from your devices and forward them to your Microsoft Sentinel workspace. This machine can be a physical or a virtual machine in your on-premises environment, an Azure virtual machine, or a virtual machine in another cloud.

18
Q

You have a Microsoft Sentinel workspace.

You plan to deploy a Syslog data connector in Microsoft Sentinel.

You download an agent to a computer that runs Linux.

You need to onboard the agent to Microsoft Sentinel.

Which information do you need?

Select only one answer.

the Azure subscription ID and the name of the Microsoft Sentinel workspace

the Azure subscription ID and the workspace primary key

the Microsoft Sentinel workspace ID and the workspace secondary key

the name of the Microsoft Sentinel workspace and the credentials of the user assigned the Microsoft Sentinel Reader role

A

C

During installation of the agent, you must provide the workspace ID and the primary or secondary key of the workspace to install the agent.

19
Q

Key Properties for Microsoft Defender XDR Custom Detection Rules

A

All custom detection rules require a Timestamp and a unique event identifier.

Timestamp (or TimeGenerated) Sets the time of the alert. N/A (Rule won’t save without it)

ReportId	Unique ID for the specific event record.	Links back to raw event data

DeviceId	Unique ID for the impacted device.	Isolates device, runs AV scan

AccountUpn	User Principal Name (UPN).	Mark user as compromised, disable user

AccountObjectId Microsoft Entra Object ID. Mark user as compromised, disable user

AccountSid Account Security Identifier. Mark user as compromised, disable user

RecipientEmailAddress Email address of the recipient. Soft delete email, move to junk

NetworkMessageId Unique ID for the email message. Soft delete email, move to junk

SenderFromAddress The sender’s email address. Soft delete email, move to junk

20
Q

What can you start a livestream from?

A

a hunting query

21
Q

You have a Microsoft Sentinel workspace that has the following data connectors configured:

SigninLogs
AuditLogs
SecurityAlerts
You need to create a query that will look for an IP address across the three configured data tables and return the matching rows.

Which operator should you use?

Select only one answer.

extend

join

lookup

union

A

D

The union operator takes two or more tables and returns the rows from all of them.

The join operator merges the rows of two tables to form a new table by matching the specified columns’ values from each table.

The extend operator creates calculated columns and appends the new columns to the result set.

The lookup operator extends the columns of a fact table with looked-up values from a dimension table.

23
Q

You have a Microsoft Sentinel workspace.

You plan to add a workbook to Microsoft Sentinel.

You create a workbook query.

You need to display the query results in a time chart.

Which keyword should you include in the query?

Select only one answer.

extend

print

project

render

summarize

A

D

In KQL, the render keyword renders results as graphical output.

24
Q

Workbook templates

A

Security Operations Efficiency -
Tracks Key Performance Indicators (KPIs) related to your SOC team’s performance, such as incident metrics, time-to-triage, and mean time to resolution (MTTR). This is used to measure and improve SOC effectiveness. EX: MTTR 15% down this quarter

Data collection-
health monitoring Monitors the health and status of data connectors and log ingestion within Microsoft Sentinel to ensure that all expected logs are being ingested correctly and on time EX: new data source fails to show data

Identity & Access -
Provides visibility into user sign-ins, identity-related threats, and access patterns. EX: investigate a cluster of failed sign in attempts

Incident Overview -
Offers a high-level summary and detailed view of all active and past incidents. EX: tier 1 analyst daily starting point (incidnets assigned and unassigned)

Azure Activity -
Visualizes all subscription-level resource creation and management events (control plane logs). EX: suspicous resource deployment

Azure Security Benchmark -
Maps ingested data against the controls and recommendations defined in the Azure Security Benchmark (ASB). EX: show compliance posture evidence

25
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Identity. You need to download a Defender for Identity detailed alert report. Which format will the report use?You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Identity. You need to download a Defender for Identity detailed alert report. Which format will the report use? CSV JSON TXT XLSX
XLSX
26
Where can you monitor an AD Domain Services domain?
Defender for Identity
27
How long Defender for Endpoint data is retained?
By default data is retained for 180 days, the minimum you can set is 30 days.
28
CWP Plans (Which resources can be protected by Defender for Cloud)
Servers App Service Databases Storage Containers
29
You added a Entra ID Protection data connector into Sentinel, what table is the data ingested? AzureDiagnotics CommonSecurityLog SecurityAlert SecurityEvents
C
30
You need to enable UEBA (user and entity behvior analytics0 in Sentinel, which 4 data sources support the use of UEBA? Azure Activity Azure SQL Databases Microsoft 365 Security Events Threat Intelligence platform Audit Logs Signin Logs
A, D, F, G
31
When you create an automation rule within Sentinel, you can configure an Incident provider condition, what providers are available?
Sentenel, 365 Defender
32
How to grant permission to a playbook from Sentinel
Sentenel must be granted explicit permission. You must delegate Microsoft Sentinel Automation Contributor role to the Azure Security Insights identity on the resource group in which the playbook is deployed TLDR: Sentenel needs Sentinel Automation contributor role on the resource group of the playbook
33
How to know a table is part of thr ASIM Schema (from ASIM parser)?
Prefix of "im"
34
Steps to build an ASIM parser
1. Collect sample logs 2. ID relevant schema (Authentication, DNS, NetworkSession etc) 3. Map the fields from raw data to normalized fields defined in the ASIM schema 4. Write KQL that transforms raw data into normalized format, you can choose from 2 sub parser options (Filtering Parser {im} & Parameter-less parser {ASim}
35
Microsoft Defender for Office 365 Policie Safe Links
Safe Links - time-of-click protection against malicious URLs When an email arrives, Defender for Office 365 scans all hyperlinks. By default, it rewrites (wraps) the original URLs with a secure Microsoft URL prefix (e.g., https://nam01.safelinks.protection.outlook.com When a user clicks the wrapped link, the Safe Links service immediately checks the destination in real-time: If the link is safe, the user is seamlessly redirected to the original destination website. If the link is malicious or suspicious, the user is blocked from accessing the site and presented with a warning page, preventing a potential phishing attack or malware infection.
36
Microsoft Defender for Office 365 Policie Safe Attachments
zero-day protection against unknown malware and viruses in email attachments. When an email with an attachment is received, the Safe Attachments feature routes a copy of the attachment to a secure, virtual environment (a process known as detonation or sandboxing) to analyze its behavior. If the attachment is found to be clean, the email and attachment are delivered to the recipient's inbox. If the attachment is malicious, it is removed (or "detonated" and blocked) from the email message. The recipient receives the email body, but the malicious attachment is replaced with a text file notification explaining why it was removed
37
Within Microsoft 365 Defender Ant-Malware Zero- hour purge
When a malware email slips by, someone can report it and it removed that same email from whoever received it and puts it into the junk.