Question 151

You have an existing Azure logic app that is used to block Azure Active Directory (Azure AD) users. The logic app is triggered manually.
You deploy Azure Sentinel.
You need to use the existing logic app as a playbook in Azure Sentinel.
What should you do first?
  • Question 152

    You have a Microsoft Sentinel workspace.
    You need to create a KQL query that will identify successful sign-ins from multiple countries during the last three hours.
    How should you complete the query? To answer, select the appropriate options in the answer area.
    NOTE: Each correct selection is worth one point

    Question 153

    You have a Microsoft subscription that has Microsoft Defender for Cloud enabled You configure the Azure logic apps shown in the following table.

    You need to configure an automatic action that will run if a Suspicious process executed alert is triggered. The solution must minimize administrative effort.
    Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

    Question 154

    You create an Azure subscription named sub1.
    In sub1, you create a Log Analytics workspace named workspace1.
    You enable Azure Security Center and configure Security Center to use workspace1.
    You need to collect security event logs from the Azure virtual machines that report to workspace1.
    What should you do?
  • Question 155

    You create a new Azure subscription and start collecting logs for Azure Monitor.
    You need to configure Azure Security Center to detect possible threats related to sign-ins from suspicious IP addresses to Azure virtual machines. The solution must validate the configuration.
    Which three actions should you perform in a sequence? To answer, move the appropriate actions from the list of action to the answer area and arrange them in the correct order.