What type of data is updated every 10 minutes in Advanced Hunting?
A) Event data
B) Entity data
C) Alert data
D) Log data
A
Event Data: This refers to the records of activities that occur within the system, such as user logins, file access, network connections, and other actions that can indicate potential security incidents.
Which autodiscovery method is NOT supported by Microsoft Defender for Endpoint for proxy detection?
Correct answer
A) Transparent proxy
B) WPAD
C) Static proxy
D) DNS-based discovery
A
A transparent proxy is a type of proxy server that intercepts the communication between the client and the server without modifying requests or responses.
transparent proxies, which operate without requiring client-side configuration, making them difficult for endpoint security solutions to detect and manage effectively.
How does Microsoft Defender categorize timestamp information in Advanced Hunting queries?
A) UTC, with time zone offsets
B) GMT with daylight saving time
C) Local device time
Correct answer
D) UTC without any offset
D
What is the required condition for a custom query to be used in a detection rule?
A) The query must include an IP address filter
B) The query must return specific device identification fields
C) The query must be part of a predefined template
D) The query must be limited to a single log type
B
option B is the most suitable proposition because returning specific device identification fields is crucial for the effectiveness of detection rules.
What does the ‘Vulnerable assets’ report in Microsoft Defender show?
A) Devices with active malware detections
B) Devices that are non-compliant with security policies
C) Devices with vulnerabilities, including their severity
D) Devices experiencing network connectivity issues
C
The ‘Vulnerable assets’ report in Microsoft Defender is specifically designed to identify and list devices within an organization that have known vulnerabilities. These vulnerabilities can stem from outdated software, unpatched systems, or misconfigurations that could be exploited by attackers
What action can be undone in the History tab of the Action Center?
A) User-submitted security incidents
B) Automated and manual response actions
C) Data retention policies
D) Network connectivity settings
B
This option refers to the actions taken by the system (automated) or by users (manual) in response to security incidents or alerts. These actions can include quarantining files, blocking IP addresses, or applying patches. The History tab allows users to review these actions and, in many cases, to revert or undo them if they were taken in error or if the situation has changed
Which report helps monitor inbound and outbound connection attempts blocked by the firewall?
A) Email & Collaboration report
B) Attack Surface Reduction report
C) Firewall Configuration report
D) Firewall report
D
C) Firewall Configuration report**: This report usually details the settings and rules configured within the firewall. It provides information about how the firewall is set up but does not monitor or log the actual connection attempts that are being blocked. - D) Firewall report: This report is specifically designed to monitor and log activities related to the firewall. It includes information about both inbound and outbound traffic, detailing which connection attempts were made and which were blocked based on the firewall rules
What is the purpose of notifying a user when a reported email message is marked within the portal?
A) To inform them of the message’s removal from the mailbox
B) To notify them of the message’s classification as phishing or safe
C) To delete the message from the user’s mailbox
D) To trigger an investigation into the sender’s address
B
Which feature in Threat Analytics provides insight into organizational resilience to specific threats?
A) Real-Time Device Monitoring
B) Exposure & Mitigation section
C) Secure Score Dashboard
D) Incident Review section
B
What is the first step in configuring email notifications for new threat analytics reports?
A) Set up recipients in the Device Inventory tab
B) Create a new notification rule under Email notifications in the Settings
C) Define the categories of threats to be notified about
D) Set up the frequency of email alerts in the Advanced Settings
B
By creating a notification rule, you are establishing the parameters for what triggers the email alerts
What action is taken when the ‘Isolate device’ function is applied via a custom detection rule?
A) The device is blocked from the network completely
B) The device’s firewall is disabled
C) The device is disconnected from all network applications except Defender for Endpoint
D) The device is immediately reset to factory settings
C
When a device is isolated, it remains operational but is restricted in its ability to communicate with other devices and network resources.
Which method is required to configure proxy settings in Microsoft Defender for Endpoint without needing special configurations?
A) Static IP configuration
B) Transparent proxy and WPAD
C) DNS-based autodiscovery
D) Manual proxy configuration
B
A transparent proxy is a server that intercepts the communication between a client and the internet without requiring any special configuration on the client side.
WPAD is a protocol that allows clients to automatically discover the appropriate proxy settings without manual configuration. It uses DHCP or DNS to provide the necessary configuration to the client, enabling it to connect to the proxy server seamlessly.
How can you access the settings to configure email notifications for alerts in Microsoft Defender XDR?
A) Through the Device Inventory section
B) By selecting ‘Email Configuration’ under Settings
C) By navigating to Settings > Microsoft Defender XDR > Email notifications
D) Through the Reports tab
C
Which table in the Advanced Hunting schema should you query to investigate sign-in activities including the evaluation of conditional access policies?
A) DeviceTvmSoftwareInventory
B) AlertInfo
C) AADSignInEventsBeta
D) DeviceFileEvents
C
This table is specifically designed to log Azure Active Directory (AAD) sign-in events. It includes detailed information about user sign-ins, such as timestamps, user identities, IP addresses, and the results of conditional access policies applied during the sign-in process
Which feature in the schema reference provides quick access to information about a table in Microsoft Defender?
A) Query preview
B) View reference
C) Schema editor
D) Entity column
B
The view reference feature is tailored for users who need to quickly understand the structure and attributes of a table. It typically includes descriptions of each column, data types, constraints, and any relationships with other tables, making it a one-stop resource for understanding how to interact with that data.
What function does WinHTTP serve in Microsoft Defender for Endpoint?
A) To configure network security policies
B) To enable communication between the endpoint sensor and the Defender cloud service
C) To store user activity logs locally
D) To manage device-specific antivirus settings
B
WinHTTP (Windows HTTP Services) is a Microsoft API that facilitates HTTP communication for applications. It is designed to provide a way for applications to send and receive HTTP requests and responses over the internet or intranet. WinHTTP is often used in scenarios where applications need to communicate with web services or cloud-based solutions.
Which setting in Microsoft Defender for Endpoint cannot be modified once configured?
A) Data retention period
B) Notification email recipients
C) Data storage location
D) Device management settings
C
When reviewing admin submissions in Microsoft Defender, which of the following can you find in relation to a flagged URL?
A) The network packet details associated with the URL
B) The web traffic source IP address
C) Sender authentication failures and policy hits
D) Delivery times and load metrics for the URL
B
How do the alert categories in Microsoft Defender map to the MITRE ATT&CK framework?
A) They correspond exactly to the MITRE tactics without any additional categories
B) They are loosely connected to the ATT&CK framework with unique organizational categories
C) They are mapped but exclude defensive evasion and impact techniques
D) They are mapped strictly to the lateral movement and initial access techniques
B
What happens when there are no pending actions in the Action Center of Microsoft Defender?
A) The Pending tab remains visible, indicating no actions to approve
B) The Pending tab is hidden from view
C) The Action Center automatically escalates unresolved alerts
D) The History tab is removed from the Action Center
B
How can you link a new alert to an existing incident in Microsoft Defender?
A) By creating a new incident for the alert manually
B) By assigning the alert to a different analyst for review
C) By linking the alert directly to the existing ongoing incident
D) By suppressing the alert from the active incident list
C
What information does the “Result” column in admin submissions provide for each flagged email?
A) A detailed summary of the email content and metadata
B) The outcome of the analysis performed by Microsoft Defender (e.g., malicious or clean)
C) The email delivery time and timestamps
D) A list of actions performed on the email during submission
B
If you are investigating an email flagged as a false positive in Microsoft Defender, what might you expect to see in the submission detail?
A) The detailed message delivery timeline for the flagged email
B) The policy hits that influenced the email’s verdict
C) The list of all recipients of the flagged email
D) The antivirus scanning results that bypassed detection
B
Policy hits refer to specific rules or criteria set within Microsoft Defender that trigger a flag on an email.
By reviewing the policy hits, you can pinpoint the exact reasons the email was flagged.
What does the “Action source” column in the Microsoft Defender Action Center indicate?
A) The severity of the incident associated with the action
B) The device group associated with each action
C) The origin of the remediation action (manual, automated, or advanced hunting)
D) Whether the action is part of a larger incident or standalone
C