Exam SC-200 All QuestionsBrowse all questions from this exam
Question 256

You have an Azure subscription that contains a user named User1 and a Microsoft Sentinel workspace named WS1. WS1 uses Microsoft Defender for Cloud.

You have the Microsoft security analytics rules shown in the following table.

User1 performs an action that matches Rule1, Rule2, Rule3, and Rule4.

How many incidents will be created in WS1?

    Correct Answer: A

    When an action matches multiple security analytics rules in Microsoft Sentinel, the rules are evaluated based on the incident creation settings within Sentinel. To avoid duplication and unnecessary noise, Microsoft Sentinel typically consolidates these matches into a single incident whenever the severity, service, and action are the same across multiple rules. Since all the rules in this case specify the same service (Defender for Cloud), severity (High), and action (Create incident), only one incident will be created.

Discussion
RedZtopicsOption: D

D for me

Peachy7Option: D

Answer: D https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications

jacobtriestechOption: D

https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications

Studytime2023

I'm not sure if this question has anything to do with email alerts? It only asked how many incidents will be created. Maybe this link will provide some insight. https://learn.microsoft.com/en-us/azure/sentinel/create-analytics-rules?tabs=azure-portal#configure-the-incident-creation-settings