DRAG DROP -
You open the Cloud App Security portal as shown in the following exhibit.
Your environment does NOT have Microsoft Defender for Endpoint enabled.
You need to remediate the risk for the Launchpad app.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/cloud-app-security/governance-discovery
HOTSPOT -
You have a Microsoft 365 E5 subscription.
You plan to perform cross-domain investigations by using Microsoft 365 Defender.
You need to create an advanced hunting query to identify devices affected by a malicious email attachment.
How should you complete the query? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:
Correct Answer:
Reference:
https://docs.microsoft.com/en-us/microsoft-365/security/mtp/advanced-hunting-query-emails-devices?view=o365-worldwide
You have the following advanced hunting query in Microsoft 365 Defender.
You need to receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Correct Answer: AE
To receive an alert when any process disables System Restore on a device managed by Microsoft Defender during the last 24 hours, you need to create a detection rule to specify the alerting conditions. Additionally, adding DeviceId and ReportId to the output of the query provides necessary information for identification and tracking purposes in the generated alert. These steps ensure that the alerts contain the essential details about the events and the devices involved.
You are investigating a potential attack that deploys a new ransomware strain.
You have three custom device groups. The groups contain devices that store highly sensitive information.
You plan to perform automated actions on all devices.
You need to be able to temporarily group the machines to perform actions on the devices.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Correct Answer: ACD
To temporarily group machines for performing actions on these devices, the appropriate steps involve using tags and device group prioritization. First, assigning a tag to the device group ensures that devices can be dynamically added or removed based on the tag criteria. Then, adding the same tag to the machines aligns them with the criteria set for the device group, facilitating their inclusion. Lastly, creating a new device group with the highest rank (rank 1) ensures that the tagged devices are given priority and any actions performed target these devices first. These steps allow for effective and temporary management of the devices, especially important in responding to potential ransomware attacks.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You are configuring Microsoft Defender for Identity integration with Active Directory.
From the Microsoft Defender for identity portal, you need to configure several accounts for attackers to exploit.
Solution: From Entity tags, you add the accounts as Honeytoken accounts.
Does this meet the goal?
Correct Answer: A
The goal is to configure several accounts for attackers to exploit within Microsoft Defender for Identity. Honeytoken accounts are specifically designed to be attractive targets for attackers. By adding the accounts as Honeytoken accounts from the Entity tags within the Defender for Identity portal, you fulfill the requirement to set up these targets for potential exploitation. Therefore, this solution meets the goal.