Topic 3: Misc. Questions
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are configuring Microsoft Defender for Identity integration with Active Directory. From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit. Solution: From Entity tags, you add the accounts as Honeytoken accounts. Does this meet the goal?
A. Yes
B. No
Explanation:
The question asks you to configure several accounts for attackers to exploit using Microsoft Defender for Identity.
The correct way to do this is to designate them as Honeytoken accounts from the Entity tags section of the Defender for Identity portal.
What Are Honeytoken Accounts?
A honeytoken account is a decoy Active Directory account that should never be used for legitimate activity.
If an attacker attempts to authenticate or access resources using a honeytoken account, Defender for Identity immediately raises an alert, because such activity indicates compromise or reconnaissance.
This technique helps detect attackers early in the lateral movement or privilege escalation phase.
⚙️ How to Configure in Defender for Identity:
Go to Microsoft 365 Defender portal → Microsoft Defender for Identity → Entity tags.
Select + Add tag → Choose Honeytoken account.
Add the desired AD accounts (decoys) to the list.
🚫 Why This Meets the Goal (and Others Don’t):
Adding as Sensitive accounts
→ Protects high-value accounts, doesn’t lure attackers.
Adding as Honeytoken accounts
→ Creates fake accounts specifically meant for attack detection.
📘 Reference:
Microsoft Learn: Configure honeytoken accounts in Microsoft Defender for Identity
You have a Microsoft 365 subscription that uses Microsoft Defender for Office 365. You have Microsoft SharePoint Online sites that contain sensitive documents. The documents contain customer account numbers that each consists of 32 alphanumeric characters. You need to create a data loss prevention (DLP) policy to protect the sensitive documents. What should you use to detect which documents are sensitive?
A. SharePoint search
B. a hunting query in Microsoft 365 Defender
C. Azure Information Protection
D. RegEx pattern matching
Explanation:
A 32-character alphanumeric pattern is a well-defined, structured piece of sensitive information. Regular Expression (RegEx) pattern matching is the core mechanism within Microsoft Purview DLP policies designed specifically for this purpose.
You would create a custom sensitive information type that uses a RegEx pattern (e.g., [a-zA-Z0-9]{32}) to accurately identify the customer account numbers within the documents stored in SharePoint Online. This method provides the precise, automated detection required for a DLP policy to either block sharing, require justification, or encrypt the documents.
Why the Other Options Are Not Correct
A. SharePoint search:
This is a manual, end-user tool for finding documents by name or content. It is not an enforceable, automated mechanism that can be integrated into a DLP policy to perform real-time protection actions like blocking or encrypting.
B. a hunting query in Microsoft 365 Defender:
Hunting queries are for proactive threat searching across logs and events after they have occurred. They are a reactive investigative tool, not a preventive control for enforcing data protection policies on documents at rest in SharePoint.
C. Azure Information Protection (AIP):
While AIP can classify and protect sensitive documents, its unified labeling client is being integrated into the Microsoft Purview suite. The modern, recommended approach is to use the sensitive information types and DLP policies within the Microsoft Purview compliance portal, which inherently use RegEx and other patterns for detection. Recommending "AIP" is less precise than specifying the core detection mechanism (RegEx) used by the DLP service.
Reference:
Microsoft Learn: Create a custom sensitive information type using PowerShell
This documentation details how to define a custom sensitive information type, which is built around a primary XML element containing the Regular Expression (RegEx) pattern.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have Linux virtual machines on Amazon Web Services (AWS). You deploy Azure Defender and enable auto-provisioning. You need to monitor the virtual machines by using Azure Defender. Solution: You enable Azure Arc and onboard the virtual machines to Azure Arc. Does this meet the goal?
A. Yes
B. No
Explanation:
While the solution moves in the right direction, it is incomplete and therefore does not fully meet the goal. Here's why:
Azure Arc is a Prerequisite, Not the Final Step:
Enabling Azure Arc and onboarding the VMs is the correct first step. Azure Arc allows your AWS Linux VMs to be recognized and managed as "connected machines" within your Azure resource inventory. This is a mandatory requirement for using Azure Defender on non-Azure machines.
The Critical Missing Step:
The solution stops after onboarding to Azure Arc. To actually monitor the VMs using Azure Defender, you must take the additional step of enabling the Azure Defender for servers plan on the subscription that contains these Arc-connected servers. Simply connecting them via Arc does not automatically activate the threat detection, vulnerability assessment, and security monitoring provided by Azure Defender.
In short:
Azure Arc provides the connectivity, but you must still explicitly enable the security service (Azure Defender) to protect them.
Reference
Microsoft Learn: Protect non-Azure machines with Defender for Cloud
This documentation clearly outlines the two-part process: 1) Connect the machine with Azure Arc, and 2) Enable Defender for servers.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are configuring Azure Sentinel. You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected. Solution: You create a livestream from a query. Does this meet the goal?
A. Yes
B. No
Explanation:
A livestream in Microsoft Sentinel is used for real-time monitoring of data — it allows analysts to observe ongoing events that match a specific KQL query.
However, a livestream does not generate incidents or alerts automatically.
It is a threat hunting tool, not an alerting or automation mechanism.
To create incidents when specific conditions (like sign-ins from malicious IPs) are detected, you need to use an Analytics rule, not a livestream.
✅ Correct Approach:
To meet the goal, you should:
Create a Scheduled Analytics Rule in Azure Sentinel.
Use a Kusto Query Language (KQL) query that detects sign-ins from known malicious IPs.
Configure the rule to create an incident when the query conditions are met.
This allows Sentinel to continuously monitor logs (like SigninLogs or SecurityEvent) and trigger alerts/incidents automatically.
🚫 Why the Solution Does NOT Meet the Goal:
Livestreams allow real-time observation of data streams.
They do not trigger alerts or create incidents in Sentinel.
Only analytics rules can generate incidents.
📘 Reference:
Microsoft Learn: Create custom analytics rules in Microsoft Sentinel
Microsoft Learn: Use livestream to hunt in real time in Microsoft Sentinel
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You are configuring Azure Sentinel. You need to create an incident in Azure Sentinel when a sign-in to an Azure virtual machine from a malicious IP address is detected. Solution: You create a hunting bookmark. Does this meet the goal?
A. Yes
B. No
Explanation:
A hunting bookmark in Microsoft Sentinel is used to save specific findings from threat-hunting queries — it helps analysts track and investigate interesting events manually.
However, bookmarks do not automatically generate alerts or incidents.
They are designed for manual investigation and evidence collection, not for automated detection and response.
✅ Correct Way to Meet the Goal:
To automatically create incidents when a sign-in to an Azure VM from a malicious IP is detected, you should:
Create a Scheduled Analytics Rule in Sentinel.
Write a KQL query (for example, using SigninLogs or SecurityEvent tables) that detects sign-ins from malicious IPs (using Microsoft Threat Intelligence or watchlists).
Configure the rule to trigger an alert and create an incident automatically.
🚫 Why This Solution Does NOT Meet the Goal:
Hunting bookmarks = manual, for investigation purposes.
Analytics rules = automated, for detection and incident creation.
Therefore, a bookmark does not meet the goal of creating incidents automatically.
📘 Reference:
Microsoft Learn: Use bookmarks to save and investigate hunting findings
Microsoft Learn: Create custom analytics rules in Microsoft Sentinel
You have an Azure Sentinel deployment in the East US Azure region. You create a Log Analytics workspace named LogsWest in the West US Azure region. You need to ensure that you can use scheduled analytics rules in the existing Azure Sentinel deployment to generate alerts based on queries to LogsWest. What should you do first?
A. Deploy Azure Data Catalog to the West US Azure region.
B. Modify the workspace settings of the existing Azure Sentinel deployment
C. Add Microsoft Sentinel to a workspace.
D. Create a data connector in Azure Sentinel.
Explanation:
Microsoft Sentinel operates at the Log Analytics workspace level — each workspace can host its own Sentinel instance.
Your existing Sentinel deployment is in the East US region, connected to a specific Log Analytics workspace. If you create another workspace (LogsWest) in the West US region, that workspace is not automatically connected to your existing Sentinel instance.
To run scheduled analytics rules and generate alerts based on data in LogsWest, you must first enable Microsoft Sentinel on the LogsWest workspace.
Once Sentinel is added to that workspace, you can:
Create analytics rules based on queries in that workspace.
Generate alerts and incidents.
Use connectors, workbooks, and automation rules independently.
⚙️ Steps to Do This:
In the Azure portal, go to Microsoft Sentinel.
Select + Add.
Choose the LogsWest workspace.
Click Add Microsoft Sentinel.
After that, you can create analytics rules within the LogsWest Sentinel instance.
🚫 Why Other Options Are Incorrect:
A. Deploy Azure Data Catalog:
Not related to Sentinel or Log Analytics — used for data discovery and cataloging.
B. Modify workspace settings of the existing Sentinel deployment:
You cannot change or merge the workspace for an existing Sentinel instance; Sentinel is bound to its original workspace.
D. Create a data connector in Azure Sentinel:
Data connectors bring data into a workspace, but you cannot use a connector to make Sentinel in one workspace query another workspace.
📘 Reference:
Microsoft Learn: Regions supported by Microsoft Sentinel
Microsoft Learn: Add Microsoft Sentinel to a workspace
Microsoft Learn: Workspaces in Microsoft Sentinel
You have an Azure subscription that uses Microsoft Sentinel. You need to minimize the administrative effort required to respond to the incidents and remediate the security threats detected by Microsoft Sentinel. Which two features should you use? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Microsoft Sentinel bookmarks
B. Azure Automation runbooks
C. Microsoft Sentinel automation rules
D. Microsoft Sentinel playbooks
E. Azure Functions apps
Explanation:
To minimize administrative effort for incident response and remediation, you need to automate the workflow. This is achieved by combining Automation Rules and Playbooks in Microsoft Sentinel.
C. Microsoft Sentinel automation rules:
These are the orchestrators. They automatically trigger when an incident is created or updated. You use them to define:
What happens: Assign incidents to an analyst, change status/severity, add tags, and most importantly—trigger a playbook.
Automation rules handle the repetitive, tactical decisions about incident handling, reducing manual effort significantly.
D. Microsoft Sentinel playbooks:
These are the action-takers. A playbook is a collection of automated remediation and response steps, built on Azure Logic Apps. When triggered by an automation rule, a playbook can perform actions like:
Isolating a compromised VM in Azure.
Disabling a user account in Active Directory.
Sending a detailed notification to a Slack channel or ITSM tool.
Blocking a malicious IP address in a firewall.
Together, they form the complete automation solution: An Automation Rule automatically detects a new incident and triggers a Playbook to execute the complex remediation tasks.
Why the Other Options Are Incorrect
A. Microsoft Sentinel bookmarks:
These are for investigation, not automation. They help an analyst save interesting query results during a hunting session but do not perform any automated response.
B. Azure Automation runbooks:
While powerful for executing scripts, they are not the primary tool for this specific task. Playbooks (Logic Apps) are the native, integrated way to build automated responses in Sentinel, offering a visual designer and hundreds of connectors. A playbook can call a runbook, but runbooks alone are not the direct answer.
E. Azure Functions apps:
Similar to runbooks, this is a general-purpose compute service. It is not the dedicated, low-code automation and integration tool built for security orchestration in Sentinel. Playbooks are the standard method.
Reference
Microsoft Learn: Automate threat response with playbooks in Microsoft Sentinel
This documentation explains how automation rules and playbooks work together to automate incident response.
You are configuring Azure Sentinel.
You need to send a Microsoft Teams message to a channel whenever an incident
representing a sign-in risk event is activated in Azure Sentinel.
Which two actions should you perform in Azure Sentinel? Each correct answer presents
part of the solution.
NOTE: Each correct selection is worth one point.
A. Enable Entity behavior analytics.
B. Associate a playbook to the analytics rule that triggered the incident
C. Enable the Fusion rule
D. Add a playbook
E. Create a workbook
Explanation:
To send a Microsoft Teams message automatically when a sign-in risk incident is triggered in Microsoft Sentinel, you must use automation via playbooks.
1. Add a playbook (D)
A playbook in Microsoft Sentinel is built using Azure Logic Apps.
It allows you to automate actions such as:
Sending Teams messages
Sending emails
Disabling user accounts
You can create a playbook with the Microsoft Teams connector that posts a message to a specific Teams channel when triggered.
💡 Example:
When a “Sign-in from risky IP” incident is created → Logic App sends a Teams alert message.
2. Associate the playbook with the analytics rule (B)
Once the playbook is created, you must link (associate) it with the analytics rule that generates the incident.
This ensures the playbook runs automatically when that specific rule triggers.
💡 This linkage enables automated incident response — no manual triggering required.
🚫 Incorrect Options:
A. Enable Entity behavior analytics
Used to analyze user and entity behavior — doesn’t send alerts or messages.
C. Enable the Fusion rule
Fusion detects multi-stage attacks automatically but doesn’t handle notifications or Teams messages.
E. Create a workbook
Used for visual reporting and dashboards, not automation or alerts.
📘 Reference:
Microsoft Learn: Automate threat response with playbooks in Microsoft Sentinel
Microsoft Learn: Associate playbooks with analytics rules
You have a custom analytics rule to detect threats in Azure Sentinel.
You discover that the analytics rule stopped running. The rule was disabled, and the rule
name has a prefix of AUTO DISABLED.
What is a possible cause of the issue?
A.
There are connectivity issues between the data sources and Log Analytics.
B.
The number of alerts exceeded 10,000 within two minutes.
C.
The rule query takes too long to run and times out.
D.
Permissions to one of the data sources of the rule query were modified
Permissions to one of the data sources of the rule query were modified
You have an Azure subscription that uses Microsoft Defender for Cloud and contains a
storage account named storage1. You receive an alert that there was an unusually high
volume of delete operations on the blobs in storage1.
You need to identify which blobs were deleted.
What should you review?
A.
the Azure Storage Analytics logs
B.
the activity logs of storage1
C.
the alert details
D.
the related entities of the alert
the activity logs of storage1
You have an Azure subscription that uses Microsoft Sentinel.
You need to create a custom report that will visualise sign-in information over time.
What should you create first?
A.
a workbook
B.
a hunting query
C.
a notebook
D.
a playbook
a workbook
Explanation:
A workbook is a data-driven interactive report in Microsoft Sentinel. You can use
workbooks to create custom reports based on data from your Azure subscription.
Reference: https://docs.microsoft.com/en-us/azure/sentinel/workbooks-overview
You recently deployed Azure Sentinel.
You discover that the default Fusion rule does not generate any alerts. You verify that the
rule is enabled.
You need to ensure that the Fusion rule can generate alerts.
What should you do?
A.
Disable, and then enable the rule.
B.
Add data connectors
C.
Create a new machine learning analytics rule
D.
Add a hunting bookmark.
Add data connectors
| Page 2 out of 13 Pages |
| Previous |