Topic 3: Misc. Questions
Your company stores the data for every project in a different Azure subscription. All the
subscriptions use the same Azure Active Directory (Azure AD) tenant.
Every project consists of multiple Azure virtual machines that run Windows Server. The
Windows events of the virtual machines are stored in a Log Analytics workspace in each
machine’s respective subscription.
You deploy Azure Sentinel to a new Azure subscription.
You need to perform hunting queries in Azure Sentinel to search across all the Log
Analytics workspaces of all the subscriptions.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Add the Security Events connector to the Azure Sentinel workspace.
B. Create a query that uses the workspace expression and the union operator.
C. Use the alias statement.
D. Create a query that uses the resource expression and the alias operator.
E. Add the Azure Sentinel solution to each workspace.
Explanation:
To hunt across data stored in multiple Log Analytics workspaces from a single Azure Sentinel instance, you need to enable cross-workspace querying and structure your queries correctly. This is a common architecture for centralized security operations across multiple subscriptions or projects.
Correct Options:
B. Create a query that uses the workspace expression and the union operator.
This is the correct technical implementation. The workspace() expression in Kusto Query Language (KQL) allows you to reference a different Log Analytics workspace within the same query. You combine (or union) data from multiple workspace() expressions to search across them simultaneously from your central Sentinel workspace.
E. Add the Azure Sentinel solution to each workspace.
This is a crucial prerequisite action. To enable centralized management and cross-workspace queries from your primary Sentinel instance, each Log Analytics workspace containing data you want to query must be onboarded to Azure Sentinel. Adding the Azure Sentinel solution (now referred to as enabling Sentinel on the workspace) links it to your Sentinel resource and is essential for this cross-workspace querying architecture.
Incorrect Options:
A. Add the Security Events connector to the Azure Sentinel workspace.
This only ingests security event data from the resources within the same subscription as the Sentinel workspace. It does not, by itself, enable querying of data in workspaces located in other, separate subscriptions.
C. Use the alias statement.
The alias statement in KQL is used to rename a column or table within a query for readability. It is not a function or operator used to connect to or query data from external workspaces.
D. Create a query that uses the resource expression and the alias operator.
This is a distractor. The resource() expression in KQL is used for querying across Application Insights resources, not Log Analytics workspaces. There is no "alias operator" for this purpose. The correct expression for Log Analytics workspaces is workspace().
Reference:
Microsoft documentation for cross-workspace queries in Log Analytics and Sentinel specifies using the workspace() expression. Furthermore, to manage and query workspaces centrally with Sentinel, you must enable Azure Sentinel on each workspace (effectively adding the solution), which links them to your central Sentinel instance.
You have a Microsoft 365 subscription that uses Microsoft 365 Defender A remediation action for an automated investigation quarantines a file across multiple devices. You need to mark the file as safe and remove the file from quarantine on the devices. What should you use m the Microsoft 365 Defender portal?
A. From Threat tracker, review the queries.
B. From the History tab in the Action center, revert the actions
C. From the investigation page, review the AIR processes.
D. From Quarantine from the Review page, modify the rules.
Explanation:
When an automated investigation in Microsoft 365 Defender performs a remediation action (like quarantining a file) that you later determine was a false positive, you need to reverse that specific action across all affected devices. The portal provides a centralized location to review and undo actions taken by the system.
Correct Option:
B. From the History tab in the Action center, revert the actions.
The Action center is the central hub for all remediation actions (pending and completed) in Microsoft 365 Defender. Its History tab lists all completed investigations and the actions taken. Here, you can select the specific "Quarantine file" action that occurred across multiple devices and choose "Revert". This safely restores the file and removes it from quarantine on all impacted endpoints.
Incorrect Options:
A. From Threat tracker, review the queries.
Threat tracker is a tool for exploring emerging threats and campaigns in the threat intelligence database. It is used for proactive research and understanding the threat landscape, not for managing or reverting remediation actions on your own devices.
C. From the investigation page, review the AIR processes.
The investigation page shows the details and results of an Automated Investigation and Response (AIR) process. While you can review the actions taken, you cannot directly revert them from this page. The Action center is the designated, centralized interface for managing all actions.
D. From Quarantine from the Review page, modify the rules.
This option refers to email and collaboration content quarantined by Exchange Online Protection or Microsoft Defender for Office 365. It is not used for files quarantined on endpoints (devices) by automated investigations, which is the scenario described. Endpoint quarantine actions are managed in the Action center.
Reference:
Microsoft's documentation on reviewing and approving remediation actions in the Action center states that to undo an action, you go to the Action center > History tab, find the relevant action, and select Revert. This is the standard procedure for correcting false positives from automated investigations.
You have an Azure Sentinel workspace.
You need to test a playbook manually in the Azure portal. From where can you run the test in Azure Sentinel?
A. Playbooks
B. Analytics
C. Threat intelligence
D. Incidents
Explanation:
Testing a playbook manually in Azure Sentinel requires a specific, real-world trigger or a simulation of that trigger. Playbooks are automated response workflows (built on Logic Apps) designed to run in response to incidents or alerts. Therefore, you need an item that a playbook is configured to act upon to initiate a test run.
Correct Option:
D. Incidents
To manually test a playbook, you navigate to Incidents in Azure Sentinel. Select an existing incident for which the playbook is configured (or create a test incident). From the incident details pane, you can click on View playbooks and then use the Run or Run playbook option to trigger the playbook manually on that specific incident, testing its logic and connectivity.
Incorrect Options:
A. Playbooks
The Playbooks blade in Azure Sentinel is for authoring, managing, and viewing the list of all playbooks. While you can edit and view the underlying Logic App from here, you cannot manually trigger a contextual test run on an incident from this high-level management pane. Testing requires the context of an incident.
B. Analytics
The Analytics blade is for creating and managing alert rules. You can configure a playbook to be triggered automatically when an analytics rule generates an alert. However, you cannot manually run or test a playbook from this section; it's for rule configuration, not playbook execution.
C. Threat intelligence
The Threat intelligence blade is for importing, viewing, and managing threat indicators (like IP addresses, hashes). While you can create analytics rules or playbooks that use these indicators, this section is not used for testing the execution of playbook workflows.
Reference:
Microsoft's "Tutorial: Set up automated threat responses in Azure Sentinel" demonstrates testing a playbook by going to Incidents, selecting an incident, and choosing View playbooks to run it manually. This is the standard method for validating playbook functionality.
You have an Azure subscription that has Azure Defender enabled for all supported
resource types.
You need to configure the continuous export of high-severity alerts to enable their retrieval from a third-party security information and event management (SIEM) solution.
To which service should you export the alerts?
A. Azure Cosmos DB
B. Azure Event Grid
C. Azure Event Hubs
D. Azure Data Lake
Explanation:
Azure Defender (now part of Microsoft Defender for Cloud) provides a continuous export feature to stream alerts and recommendations to an external destination. To integrate with a third-party SIEM, you need a service that can act as a real-time message streaming pipeline, allowing the SIEM to pull or receive the exported security data.
Correct Option:
C. Azure Event Hubs
Azure Event Hubs is a big data streaming platform and event ingestion service. It is the only supported target for the continuous export feature when streaming to an external SIEM. The SIEM connector can be configured to consume the alert data from the Event Hub's stream, enabling real-time or near-real-time ingestion of high-severity alerts into the third-party system.
Incorrect Options:
A. Azure Cosmos DB
Cosmos DB is a globally distributed, multi-model database. Continuous export cannot stream data directly to it. While you could theoretically write data to Cosmos DB from another service (like Event Hubs), it is not a direct, SIEM-compatible streaming endpoint and is not a supported target in the export configuration blade.
B. Azure Event Grid
Event Grid is an event routing service designed for reactive, event-driven architectures. It is not used for the continuous, high-volume streaming of security alerts. Defender for Cloud's export is built to stream to Event Hubs, not Event Grid, for SIEM integration.
D. Azure Data Lake
Azure Data Lake Storage is a scalable data lake for analytics and batch processing. Continuous export does not support it as a direct destination. Exporting to a data lake is typically for archival or analytical purposes using batch jobs, not for real-time SIEM ingestion.
Reference:
Microsoft documentation on continuous export for Defender for Cloud explicitly states: "Stream your alerts to Azure Event Hubs" and "You can stream your alerts to... an Event Hub for consumption by a third-party SIEM." Event Hubs is the designated service for external integration.
You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint.
You need to add threat indicators for all the IP addresses in a range of 171.23.3432-
171.2334.63. The solution must minimize administrative effort.
What should you do in the Microsoft 365 Defender portal?
A. Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.
B. Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.
C. Select Add indicator and set the IP address to 171.23.34.32/27
D. Create an import file that contains the individual IP addresses in the range. Select Import and import the file.
Explanation:
In Microsoft Defender for Endpoint, threat indicators (now called "Indicators of Compromise" or IoCs) allow you to block or allow specific entities like IP addresses. To efficiently add a contiguous range of IPs, you should use CIDR notation, which defines the range in a single, compact entry, avoiding the need to list each IP individually or define a custom hyphenated range.
Correct Option:
C. Select Add indicator and set the IP address to 171.23.34.32/27
The range 171.23.34.32 - 171.23.34.63 corresponds exactly to a /27 subnet (which contains 32 IP addresses, from .32 to .63). Using CIDR notation (IP/prefix) is the standard and supported method for defining an IP range in the portal. It's a single entry that minimizes effort and is correctly interpreted by the system. *(Note: The question's IPs "171.23.3432" and "171.2334.63" contain typos but the intent is a standard /27 range.)*
Incorrect Options:
A. Create an import file that contains the IP address of 171.23.34.32/27. Select Import and import the file.
While using a /27 CIDR is correct, creating and importing a file for a single indicator is unnecessary administrative overhead. You can directly add this single indicator via the portal's Add indicator UI more efficiently.
B. Select Add indicator and set the IP address to 171.2334.32-171.23.34.63.
The portal's Add indicator interface does not support defining a range using a hyphen (-) format for IP addresses. This format would be invalid. The supported methods are a single IP, CIDR notation, or importing a file.
D. Create an import file that contains the individual IP addresses in the range. Select Import and import the file.
This would work but does not minimize administrative effort. Manually listing all 32 individual IP addresses in a file is time-consuming, error-prone, and inefficient compared to using a single CIDR notation entry.
Reference:
Microsoft documentation on managing indicators states that for IP addresses, you can specify "a single IP address, IP address range, or CIDR notation." For a contiguous block, CIDR is the recommended and most efficient method.
You use Azure Sentinel.
You need to receive an immediate alert whenever Azure Storage account keys are
enumerated. Which two actions should you perform? Each correct answer presents part of
the solution.
NOTE: Each correct selection is worth one point.
A. Create a livestream
B. Add a data connector
C. Create an analytics rule
D. Create a hunting query
E. Create a bookmark.
Explanation:
To receive an immediate alert for a specific event in Azure Sentinel, you need two foundational components: 1) the relevant log data must be ingested into Sentinel, and 2) a detection rule must be created to analyze that data and generate an alert when the specific event occurs. Alerting is not a passive feature; it requires active configuration.
Correct Options:
B. Add a data connector
This is the first prerequisite. To detect Azure Storage account key enumeration, you need the corresponding audit logs. The Azure Activity Log data connector must be added to your Sentinel workspace to ingest management plane activity logs, which include events like List Storage Account Keys. Without this data, Sentinel has nothing to analyze.
C. Create an analytics rule
This is the core detection mechanism. After the logs are ingested, you must create a scheduled analytics rule with a KQL query that specifically looks for the List Storage Account Keys operation. The rule is configured to run periodically (e.g., every 5 minutes) and will generate an incident/alert immediately when the query returns results, meeting the requirement for an immediate alert.
Incorrect Options:
A. Create a livestream
Livestream is a feature for interactively testing hunting queries in real-time during an investigation. It is not a method for creating persistent, automated alerts. It is a manual, investigative tool.
D. Create a hunting query
A hunting query is used for proactive, manual searching through historical data to find threats. It does not generate automated, immediate alerts. While you could create a query to find key enumeration events, it would not alert you; you would have to run it manually.
E. Create a bookmark.
Bookmarks are used to save interesting results from hunting queries for later reference or to create incidents from them. They are a post-detection, organizational tool and do not play a role in the initial configuration for automated alerting.
Reference:
The standard workflow for alerting in Azure Sentinel involves 1) Connecting data sources (Data Connectors), and 2) Creating analytics rules to detect threats. Microsoft's documentation on creating custom analytics rules demonstrates this process to detect specific activities from connected log sources.
Your company uses Azure Sentinel.
A new security analyst reports that she cannot assign and dismiss incidents in Azure
Sentinel. You need to resolve the issue for the analyst. The solution must use the principle
of least privilege. Which role should you assign to the analyst?
A.
Azure Sentinel Responder
B.
Logic App Contributor
C.
Azure Sentinel Contributor
D.
Azure Sentinel Reader
Azure Sentinel Responder
A security administrator receives email alerts from Azure Defender for activities such as
potential malware uploaded to a storage account and potential successful brute force
attacks.
The security administrator does NOT receive email alerts for activities such as antimalware
action failed and suspicious network activity. The alerts appear in Azure Security Center.
You need to ensure that the security administrator receives email alerts for all the activities.
What should you configure in the Security Center settings?
A.
the severity level of email notifications
B.
a cloud connector
C.
the Azure Defender plans
D.
the integration settings for Threat detection
the severity level of email notifications
You have five on-premises Linux servers.
You have an Azure subscription that uses Microsoft Defender for Cloud.
You need to use Defender for Cloud to protect the Linux servers.
What should you install on the servers first?
A.
the Dependency agent
B.
the Log Analytics agent
C.
the Azure Connected Machine agent
D.
the Guest Configuration extension
the Log Analytics agent
Explanation:
Defender for Cloud depends on the Log Analytics agent.
Use the Log Analytics agent if you need to:
* Collect logs and performance data from Azure virtual machines or hybrid machines
hosted outside of Azure
* Etc.
Reference:
https://docs.microsoft.com/en-us/azure/defender-for-cloud/os-coverage
https://docs.microsoft.com/en-us/azure/azure-monitor/agents/agents-overview#loganalytics-
agent
Your company uses Azure Sentinel to manage alerts from more than 10,000 IoT devices.
A security manager at the company reports that tracking security threats is increasingly
difficult due to the large number of incidents.
You need to recommend a solution to provide a custom visualization to simplify the
investigation of threats and to infer threats by using machine learning.
What should you include in the recommendation?
A.
built-in queries
B.
livestream
C.
notebooks
D.
bookmarks
notebooks
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains a unique solution that might meet the stated goals. Some
question sets might have more than one correct solution, while others might not have a
correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result,
these questions will not appear in the review screen.
You use Azure Security Center.
You receive a security alert in Security Center.
You need to view recommendations to resolve the alert in Security Center.
Solution: From Regulatory compliance, you download the report.
Does this meet the goal?
A.
Yes
B.
No
No
You receive an alert from Azure Defender for Key Vault.
You discover that the alert is generated from multiple suspicious IP addresses.
You need to reduce the potential of Key Vault secrets being leaked while you investigate
the issue. The solution must be implemented as soon as possible and must minimize the
impact on legitimate users.
What should you do first?
A.
Modify the access control settings for the key vault
B.
Enable the Key Vault firewall
C.
Create an application security group.
D.
Modify the access policy for the key vault
Enable the Key Vault firewall
| Page 3 out of 13 Pages |
| Previous |