Question 81

You are configuring Azure Sentinel.
You need to send a Microsoft Teams message to a channel whenever a sign-in from a suspicious IP address is detected.
Which two actions should you perform in Azure Sentinel? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
  • Question 82

    You need to create the test rule to meet the Azure Sentinel requirements.
    What should you do when you create the rule?
  • Question 83

    You are informed of a new common vulnerabilities and exposures (CVE) vulnerability that affects your environment.
    You need to use Microsoft Defender Security Center to request remediation from the team responsible for the affected systems if there is a documented active exploit available.
    Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Question 84

    You have an Azure subscription that contains a Log Analytics workspace.
    You need to enable just-in-time (JIT) VM access and network detections for Azure resources.
    Where should you enable Azure Defender?
  • Question 85

    You have a Microsoft 365 E5 subscription that uses Microsoft Defender and an Azure subscription that uses Azure Sentinel.
    You need to identify all the devices that contain files in emails sent by a known malicious email sender. The query will be based on the match of the SHA256 hash.
    How should you complete the query? To answer, select the appropriate options in the answer area.
    NOTE: Each correct selection is worth one point.