Udemy Questions Flashcards

(51 cards)

1
Q

What type of data is updated every 10 minutes in Advanced Hunting?

A) Event data
B) Entity data
C) Alert data
D) Log data

A

A

Event Data: This refers to the records of activities that occur within the system, such as user logins, file access, network connections, and other actions that can indicate potential security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which autodiscovery method is NOT supported by Microsoft Defender for Endpoint for proxy detection?
Correct answer
A) Transparent proxy
B) WPAD
C) Static proxy
D) DNS-based discovery

A

A

A transparent proxy is a type of proxy server that intercepts the communication between the client and the server without modifying requests or responses.

transparent proxies, which operate without requiring client-side configuration, making them difficult for endpoint security solutions to detect and manage effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Microsoft Defender categorize timestamp information in Advanced Hunting queries?
A) UTC, with time zone offsets
B) GMT with daylight saving time
C) Local device time
Correct answer
D) UTC without any offset

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the required condition for a custom query to be used in a detection rule?
A) The query must include an IP address filter
B) The query must return specific device identification fields
C) The query must be part of a predefined template
D) The query must be limited to a single log type

A

B

option B is the most suitable proposition because returning specific device identification fields is crucial for the effectiveness of detection rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the ‘Vulnerable assets’ report in Microsoft Defender show?
A) Devices with active malware detections
B) Devices that are non-compliant with security policies
C) Devices with vulnerabilities, including their severity
D) Devices experiencing network connectivity issues

A

C

The ‘Vulnerable assets’ report in Microsoft Defender is specifically designed to identify and list devices within an organization that have known vulnerabilities. These vulnerabilities can stem from outdated software, unpatched systems, or misconfigurations that could be exploited by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What action can be undone in the History tab of the Action Center?
A) User-submitted security incidents
B) Automated and manual response actions
C) Data retention policies
D) Network connectivity settings

A

B

This option refers to the actions taken by the system (automated) or by users (manual) in response to security incidents or alerts. These actions can include quarantining files, blocking IP addresses, or applying patches. The History tab allows users to review these actions and, in many cases, to revert or undo them if they were taken in error or if the situation has changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which report helps monitor inbound and outbound connection attempts blocked by the firewall?
A) Email & Collaboration report
B) Attack Surface Reduction report
C) Firewall Configuration report
D) Firewall report

A

D

C) Firewall Configuration report**: This report usually details the settings and rules configured within the firewall. It provides information about how the firewall is set up but does not monitor or log the actual connection attempts that are being blocked. - D) Firewall report: This report is specifically designed to monitor and log activities related to the firewall. It includes information about both inbound and outbound traffic, detailing which connection attempts were made and which were blocked based on the firewall rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of notifying a user when a reported email message is marked within the portal?

A) To inform them of the message’s removal from the mailbox
B) To notify them of the message’s classification as phishing or safe
C) To delete the message from the user’s mailbox
D) To trigger an investigation into the sender’s address

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which feature in Threat Analytics provides insight into organizational resilience to specific threats?
A) Real-Time Device Monitoring
B) Exposure & Mitigation section
C) Secure Score Dashboard
D) Incident Review section

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first step in configuring email notifications for new threat analytics reports?
A) Set up recipients in the Device Inventory tab
B) Create a new notification rule under Email notifications in the Settings
C) Define the categories of threats to be notified about
D) Set up the frequency of email alerts in the Advanced Settings

A

B

By creating a notification rule, you are establishing the parameters for what triggers the email alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What action is taken when the ‘Isolate device’ function is applied via a custom detection rule?
A) The device is blocked from the network completely
B) The device’s firewall is disabled
C) The device is disconnected from all network applications except Defender for Endpoint
D) The device is immediately reset to factory settings

A

C

When a device is isolated, it remains operational but is restricted in its ability to communicate with other devices and network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which method is required to configure proxy settings in Microsoft Defender for Endpoint without needing special configurations?
A) Static IP configuration
B) Transparent proxy and WPAD
C) DNS-based autodiscovery
D) Manual proxy configuration

A

B

A transparent proxy is a server that intercepts the communication between a client and the internet without requiring any special configuration on the client side.

WPAD is a protocol that allows clients to automatically discover the appropriate proxy settings without manual configuration. It uses DHCP or DNS to provide the necessary configuration to the client, enabling it to connect to the proxy server seamlessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you access the settings to configure email notifications for alerts in Microsoft Defender XDR?
A) Through the Device Inventory section
B) By selecting ‘Email Configuration’ under Settings
C) By navigating to Settings > Microsoft Defender XDR > Email notifications
D) Through the Reports tab

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which table in the Advanced Hunting schema should you query to investigate sign-in activities including the evaluation of conditional access policies?
A) DeviceTvmSoftwareInventory
B) AlertInfo
C) AADSignInEventsBeta
D) DeviceFileEvents

A

C

This table is specifically designed to log Azure Active Directory (AAD) sign-in events. It includes detailed information about user sign-ins, such as timestamps, user identities, IP addresses, and the results of conditional access policies applied during the sign-in process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which feature in the schema reference provides quick access to information about a table in Microsoft Defender?
A) Query preview
B) View reference
C) Schema editor
D) Entity column

A

B

The view reference feature is tailored for users who need to quickly understand the structure and attributes of a table. It typically includes descriptions of each column, data types, constraints, and any relationships with other tables, making it a one-stop resource for understanding how to interact with that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What function does WinHTTP serve in Microsoft Defender for Endpoint?
A) To configure network security policies
B) To enable communication between the endpoint sensor and the Defender cloud service
C) To store user activity logs locally
D) To manage device-specific antivirus settings

A

B

WinHTTP (Windows HTTP Services) is a Microsoft API that facilitates HTTP communication for applications. It is designed to provide a way for applications to send and receive HTTP requests and responses over the internet or intranet. WinHTTP is often used in scenarios where applications need to communicate with web services or cloud-based solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which setting in Microsoft Defender for Endpoint cannot be modified once configured?
A) Data retention period
B) Notification email recipients
C) Data storage location
D) Device management settings

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When reviewing admin submissions in Microsoft Defender, which of the following can you find in relation to a flagged URL?
A) The network packet details associated with the URL
B) The web traffic source IP address
C) Sender authentication failures and policy hits
D) Delivery times and load metrics for the URL

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do the alert categories in Microsoft Defender map to the MITRE ATT&CK framework?

A) They correspond exactly to the MITRE tactics without any additional categories
B) They are loosely connected to the ATT&CK framework with unique organizational categories
C) They are mapped but exclude defensive evasion and impact techniques
D) They are mapped strictly to the lateral movement and initial access techniques

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What happens when there are no pending actions in the Action Center of Microsoft Defender?

A) The Pending tab remains visible, indicating no actions to approve
B) The Pending tab is hidden from view
C) The Action Center automatically escalates unresolved alerts
D) The History tab is removed from the Action Center

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can you link a new alert to an existing incident in Microsoft Defender?
A) By creating a new incident for the alert manually
B) By assigning the alert to a different analyst for review
C) By linking the alert directly to the existing ongoing incident
D) By suppressing the alert from the active incident list

22
Q

What information does the “Result” column in admin submissions provide for each flagged email?
A) A detailed summary of the email content and metadata
B) The outcome of the analysis performed by Microsoft Defender (e.g., malicious or clean)
C) The email delivery time and timestamps
D) A list of actions performed on the email during submission

23
Q

If you are investigating an email flagged as a false positive in Microsoft Defender, what might you expect to see in the submission detail?
A) The detailed message delivery timeline for the flagged email
B) The policy hits that influenced the email’s verdict
C) The list of all recipients of the flagged email
D) The antivirus scanning results that bypassed detection

A

B

Policy hits refer to specific rules or criteria set within Microsoft Defender that trigger a flag on an email.

By reviewing the policy hits, you can pinpoint the exact reasons the email was flagged.

24
Q

What does the “Action source” column in the Microsoft Defender Action Center indicate?
A) The severity of the incident associated with the action
B) The device group associated with each action
C) The origin of the remediation action (manual, automated, or advanced hunting)
D) Whether the action is part of a larger incident or standalone

25
Severity Levels
**High Severity**: Typically assigned to threats that pose an immediate and significant risk to the organization’s data, systems, or operations. These alerts often require immediate action and can lead to severe consequences if not addressed **Medium Severity**: Indicates a notable risk that requires attention but may not necessitate immediate action. This level suggests that while the threat is serious, it has been mitigated or contained, and the situation can be managed without urgent intervention. **Informational**: Usually pertains to alerts that do not indicate a threat but provide useful information. These alerts do not require action and are more about awareness. **Low Severity**: Assigned to minor issues or alerts that do not pose a significant risk to the organization. These alerts may be informational but are not critical to the organization’s security posture.
26
What does the "Customize columns" option on the Submissions page allow an admin to do? A) Apply advanced filters to the displayed submission results B) Sort submission results by severity or submission time C) Select and display up to seven columns of data D) Export submission data to an external file for offline analysis
C
27
How can you confirm if a user-reported email was escalated to an admin submission? A) Review the Result column in Admin submissions to see conversion details B) Check for the "Converted to admin submission" field in User reported messages C) Look in the History tab for actions related to the email D) Search for the email in the Alerts tab for further processing
B
28
How are user-reported messages handled if the organization is configured to use a custom mailbox for reporting? A) Messages are automatically converted into admin submissions for further analysis B) User-reported messages are quarantined until reviewed by an admin C) Messages appear in the "User reported messages" tab without results, as they are not rescanned D) The user is notified that their message cannot be processed due to mailbox configuration
A
29
What distinguishes the "Admin submissions" tab from the "User reported messages" tab in Microsoft Defender? A) The "Admin submissions" tab shows detailed sender information not available in user reports B) The "Admin submissions" tab lists emails flagged by users for submission to Microsoft C) The "Admin submissions" tab provides detailed analysis outcomes, including sender authentication failures D) The "User reported messages" tab displays detailed metadata about user-reported emails, unlike the admin submissions
C
30
When reviewing the History tab in the Action Center of Microsoft Defender, what types of actions can be undone? A) File quarantines and device isolation actions only B) Only actions that were manually performed by an analyst C) Quarantine file, isolate device, and stop service actions D) Suppression actions and alert dismissals
C
31
When reviewing alert metadata in Microsoft Defender, what does the "Determination" field represent? A) The likelihood that the alert is a false positive based on historical data B) The severity level of the alert and its impact on the organization C) Additional detail provided to refine true positive classifications D) The recommended next steps for investigating the alert
A
32
What query design would best identify devices exhibiting abnormal privilege escalation activities using local accounts? A. IdentityLogonEvents filtered by LogonResult and LogonType for administrative logons B. DeviceProcessEvents with filters for ParentProcessName and elevated ActionType C. DeviceRegistryEvents filtered for modifications to "Run" registry keys D. AlertEvidence aggregated by severity and DeviceId for all administrative events
B
33
Which table and query filters would you use to detect unauthorized Active Directory privilege escalations? A. IdentityQueryEvents filtered by ObjectType and QueryType for admin groups B. DeviceLogonEvents filtered by LogonType and AccountName for elevated privileges C. IdentityLogonEvents with filters for LogonResult and AccountType "Privileged" D. AlertEvidence aggregated by severity and affected users
A
34
When working with datasets updated at different intervals, how can you ensure accurate alignment in your advanced hunting queries? A. Exclude the slower-refreshing table from the query to simplify results B. Use the latest data from the most frequently updated table to prioritize freshness C. Apply a time filter based on the slower table’s refresh rate to ensure alignment D. Summarize data across both tables without considering refresh rates
C By applying a time filter based on the slower table’s refresh rate, you ensure that the data being queried from both tables is relevant and comparable. This means that you are only pulling data that has been updated to the same time frame, thus maintaining consistency.
35
You are tasked with monitoring a critical environment for unauthorized PowerShell script executions. What configuration ensures optimal detection capabilities? A. Enable live response for all devices to capture and analyze PowerShell script executions. B. Set up custom KQL queries in advanced hunting to track PowerShell processes by hash. C. Activate Tamper Protection to ensure script execution policies cannot be altered. D. Enable "Monitor unsigned PowerShell script executions" under Advanced Features.
D
36
Your team identifies a surge in DDoS attacks originating from a known malicious domain. What prerequisite must be configured to enable blocking of this domain? A. Turn on audit mode for all network protection policies. B. Enable advanced threat protection for DNS-level monitoring. C. Configure Custom Network Indicators and enforce IP reputation updates. D. Upload a CSV file with associated domain information to the Threat Intelligence platform.
C By configuring Custom Network Indicators, you can specifically identify and block traffic from the known malicious domain. This allows for a tailored approach to security, enabling your team to create rules that directly address the threat. - **IP Reputation Updates:** Enforcing IP reputation updates ensures that your security systems are continuously informed about the latest threat intelligence. This means that if the malicious domain is associated with specific IP addresses, your system can automatically update its blocking rules based on the latest reputation data.
37
A SOC manager wants to configure notifications for high-priority alerts in a multi-tenant environment. How can you ensure that notifications are scoped to a specific tenant and device group? A. Assign Global Administrator permissions to recipients in the target tenant. B. Configure notification rules scoped to the tenant and device group using RBAC. C. Enable cross-tenant alert sharing for enhanced visibility. D. Use the default notification rule for all tenants and filter by severity.
B By scoping the notification rules to the tenant and device group, you ensure that only the relevant parties receive alerts. NOT C While this option may enhance visibility across tenants, it goes against the principle of isolating tenant data and alerts. Cross-tenant sharing could lead to confusion and information overload, as alerts meant for one tenant could be visible to others, undermining the security and privacy of each tenant's data.
38
Your team needs to execute a customized unsigned script during a live response session. What additional configuration is necessary to enable this functionality? A. Assign the Global Reader role to the script executor. B. Enable “Execution of unverified scripts” in the Tamper Protection settings. C. Configure “Live Response unsigned script execution” in the portal’s Advanced Features. D. Deploy a signed certificate to the script before execution.
C
39
Your SOC team is investigating unusual DNS queries related to potential command-and-control activity. Which advanced hunting query provides the most precise insights into these activities? A. Use DeviceNetworkEvents filtered by ActionType and DomainName. B. Query AlertInfo joined with DeviceProcessEvents on DeviceId. C. Analyze DeviceFileEvents with filters for FolderPath and Hash. D. Apply IdentityLogonEvents filters for source IP and LogonResult.
A This event type captures network-related activities on devices, including DNS queries. It provides insights into what domains are being queried, the action taken (e.g., DNS query initiated, DNS response received), and other relevant network behaviors.
40
A security architect needs to block domains identified as high-risk by third-party threat intelligence feeds. What configuration ensures that these domains are effectively blocked across all endpoints? A. Deploy web content filtering policies based on domain categories. B. Enable Custom Network Indicators and set domain blocking policies. C. Integrate third-party indicators via the Threat Explorer dashboard. D. Configure CIDR-based rules to restrict traffic to risky domains.
B
41
Your organization is onboarding macOS devices to Microsoft Defender for Endpoint. What additional configuration ensures that these devices receive seamless updates for antivirus and EDR capabilities? A. Deploy Microsoft Endpoint Manager policies specific to macOS. B. Use Microsoft AutoUpdate to manage Defender for Endpoint updates. C. Configure system update settings to prioritize Microsoft packages. D. Enable advanced hunting rules for macOS endpoints.
B Microsoft AutoUpdate is specifically designed to handle updates for Microsoft applications on macOS, including Microsoft Defender for Endpoint. By using AutoUpdate, organizations can ensure that the Defender application receives security updates, feature enhancements, and bug fixes automatically without requiring user intervention.
42
Your organization needs to block a URL flagged as malicious across all endpoints. What prerequisite ensures that this action can be enforced effectively? A. Configure advanced threat hunting policies for malicious URL detection. B. Enable Network Protection in block mode in Microsoft Defender. C. Integrate third-party threat intelligence feeds for URL validation. D. Deploy conditional DNS filtering rules to all endpoint devices.
B By enabling it in block mode, any attempt to access the flagged malicious URL will be immediately blocked at the network level, preventing users from inadvertently accessing harmful content.
43
During device discovery in Microsoft Defender for Endpoint, additional non-managed devices appear in the inventory. Which discovery mode likely enabled this visibility? A. Extended mode with external network probes. B. Standard mode configured for unmanaged device detection. C. Enhanced mode using third-party integrations. D. Basic mode with manual inventory uploads.
B **Extended mode** typically allows for a more extensive discovery process that can include external network probes. However, this mode is generally used to discover devices outside the organization's immediate network. **Standard mode** is designed to identify devices within an organization’s network. When configured for unmanaged device detection, this mode actively scans the network for devices that are not enrolled or managed by the organization’s security policies. **Enhanced mode** typically involves integrations with third-party solutions to improve visibility and detection capabilities. **Basic mode** involves a manual process for inventory management, which is not conducive to automatic discovery of devices.
44
Your team needs to enforce compliance for endpoints running macOS by automating configuration updates. What method ensures devices stay aligned with company policies? A. Deploy policies through Microsoft Endpoint Manager with compliance baselines. B. Enable Live Response for macOS devices to monitor configuration changes. C. Use Microsoft AutoUpdate to enforce real-time compliance settings. D. Configure KQL queries to track non-compliant endpoints manually.
A Microsoft AutoUpdate is primarily focused on keeping applications updated rather than enforcing compliance with organizational policies. It does not provide the comprehensive management capabilities that MEM offers. Microsoft Endpoint Manager (MEM) is a unified management platform that combines services like Intune and Configuration Manager. It allows organizations to manage devices across different operating systems, including macOS. - MEM provides the ability to deploy configuration profiles, compliance policies, and security baselines, which are essential for maintaining compliance across devices.
45
How are incidents named by default
Auto assigned based on Alert Attribute, endpoints, users, sources and categories affected.
46
What is Identity Security Posture
Number generated by Microsoft rating your attack surface.
47
A suspicious .exe file has been identified on multiple endpoints. What prerequisite is required to add this file as an indicator in Microsoft Defender for Endpoint? A. The file must be verified by an external threat intelligence feed. B. Cloud-based protection must be enabled in Windows Defender settings. C. The .exe file must be digitally signed by a trusted certificate authority. D. The hash of the file must be pre-approved by your organization’s security policy.
D
48
A security analyst needs to analyze scripts flagged during an investigation in Microsoft Defender XDR. Which approach ensures accurate threat assessment? A. Execute the flagged scripts in an external sandbox for detailed behavioral analysis. B. Use the built-in script analysis feature in the timeline to assess flagged scripts. C. Query DeviceProcessEvents for all processes associated with the flagged script. D. Apply advanced hunting rules to track all script executions by command-line parameters.
B
49
Your organization relies on Microsoft Secure Score for tracking security improvements. How does marking improvement actions as "Risk Accepted" affect your Secure Score? A. Accepted risks are subtracted from the Secure Score calculation. B. Risk acceptance does not contribute to or detract from the Secure Score. C. Accepted risks are documented but automatically flagged for reassessment after 90 days. D. Risk acceptance increases the Secure Score if the risk has mitigations in place.
B
50
What type of data in Advanced Hunting is refreshed every 10 minutes and is crucial for real-time threat detection and response? A) Process data B) Network data C. User behavior data D) File activity data
B
51
How many days does Microsoft Defender for cloud apps spend learning your enviorment?
Seven Days It looks at the IP addresses, devices, and locations your users access, identifies which apps and services they use, and calculates the risk score of all of these activities.