Microsoft

SC-200 — Microsoft Security Operations Analyst Study Guide

366 practice questions Updated 2026-02-27 $19 (70% off) HTML + PDF formats

SC-200 Exam Overview

Prepare for the Microsoft SC-200 certification exam with our comprehensive study guide. This study material contains 366 practice questions sourced from real exams and expert-verified for accuracy. Each question includes the correct answer and a detailed explanation to help you understand the material thoroughly.

The SC-200 exam — Microsoft Security Operations Analyst — is offered by Microsoft. Passing this exam earns you the Microsoft Certified: Security Operations Analyst Associate credential, an industry-recognized certification that validates your expertise. Our study materials were last updated on 2026-02-27 to reflect the most recent exam objectives and content.

What You Get

366 Practice Questions

Complete question bank covering all exam domains and objectives.

HTML + PDF Formats

Interactive HTML file (recommended) for screen study and a print-ready PDF.

Instant Download

Access your study materials immediately after purchase.

Email with Permanent Download Links

You will receive a confirmation email with permanent download links in case you want to download the files again in the future.

Why Choose CheapestExamDumps?

Lowest Price Available

Only $19 per exam — competitors charge $50-$300 for similar content.

Updated Monthly

Study materials refreshed within 30 days of any exam content changes.

Free Preview

Try 15 real practice questions before you buy — no signup required.

Instant Access

Download HTML + PDF immediately after payment. No waiting, no account needed.

About the Microsoft Certified: Security Operations Analyst Associate

The Microsoft Certified: Security Operations Analyst Associate is awarded by Microsoft to professionals who demonstrate competence in the skills measured by the SC-200 exam. According to the official Microsoft certification page, this certification validates your ability to work with the technologies covered in the exam objectives.

According to the Global Knowledge IT Skills and Salary Report, certified IT professionals earn 15-25% more than their non-certified peers. Certifications from Microsoft are among the most recognized credentials in the IT industry, with strong demand across enterprise organizations worldwide.

$63 $19

One-time payment · HTML + PDF · Instant download · 366 questions

Free Sample — 15 Practice Questions

Preview 15 of 366 questions from the SC-200 exam. Try before you buy — purchase the full study guide for all 366 questions with answers and explanations.

Question 365

HOTSPOT - You have a Microsoft 365 E5 subscription that uses Microsoft Defender and an Azure subscription that uses Azure Sentinel. You need to identify all the devices that contain files in emails sent by a known malicious email sender. The query will be based on the match of the SHA256 hash. How should you complete the query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area:

Illustration for SC-200 question 365
Show Answer
Correct Answer: SHA256 SHA256
Explanation:
Filter attachments to those with a known file hash, then join email attachment data with device file events using the same SHA256 hash to identify devices containing those files.

Question 327

HOTSPOT - You need to implement Azure Sentinel queries for Contoso and Fabrikam to meet the technical requirements. What should you include in the solution? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area:

Illustration for SC-200 question 327
Show Answer
Correct Answer: 1 workspace
Explanation:
Azure Sentinel requires at least one Log Analytics workspace per subscription. To correlate data across tenants or workspaces in KQL, the workspace() expression is used (often combined with union) to query multiple workspaces.

Question 235

You have a Microsoft 365 subscription that uses Microsoft 365 Defender. A remediation action for an automated investigation quarantines a file across multiple devices. You need to mark the file as safe and remove the file from quarantine on the devices. What should you use in the Microsoft 365 Defender portal?

A. From the History tab in the Action center, revert the actions.
B. From the investigation page, review the AIR processes.
C. From Quarantine from the Review page, modify the rules.
D. From Threat tracker, review the queries.
Show Answer
Correct Answer: A
Explanation:
When an automated investigation (AIR) quarantines a file across multiple devices, reversing that remediation is done from the Action center. By going to the History tab in the Action center, you can select the completed remediation action and choose to revert it, which marks the file as safe and removes it from quarantine on all affected devices. Other options do not provide a way to undo completed AIR remediation actions at scale.

Question 220

HOTSPOT - Case study - This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might conta`in exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study - To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question. Overview - Fabrikam, Inc. is a financial services company. The company has branch offices in New York, London, and Singapore. Fabrikam has remote users located across the globe. The remote users access company resources, including cloud resources, by using a VPN connection to a branch office. Existing Environment - Identity Environment - The network contains an Active Directory Domain Services (AD DS) forest named fabrikam.com that syncs with an Azure AD tenant named fabrikam.com. To sync the forest, Fabrikam uses Azure AD Connect with pass-through authentication enabled and password hash synchronization disabled. The fabrikam.com forest contains two global groups named Group1 and Group2. Microsoft 365 Environment - All the users at Fabrikam are assigned a Microsoft 365 E5 license and an Azure Active Directory Premium Plan 2 license. Fabrikam implements Microsoft Defender for Identity and Microsoft Defender for Cloud Apps and enables log collectors. Azure Environment - Fabrikam has an Azure subscription that contains the resources shown in the following table. Amazon Web Services (AWS) Environment Fabrikam has an Amazon Web Services (AWS) account named Account1. Account1 contains 100 Amazon Elastic Compute Cloud (EC2) instances that run a custom Windows Server 2022. The image includes Microsoft SQL Server 2019 and does NOT have any agents installed. Current Issues - When the users use the VPN connections, Microsoft 365 Defender raises a high volume of impossible travel alerts that are false positives. Defender for Identity raises a high volume of Suspected DCSync attack alerts that are false positives. Requirements - Planned changes - Fabrikam plans to implement the following services: • Microsoft Defender for Cloud • Microsoft Sentinel Business Requirements - Fabrikam identifies the following business requirements: • Use the principle of least privilege, whenever possible. • Minimize administrative effort. Microsoft Defender for Cloud Apps Requirements Fabrikam identifies the following Microsoft Defender for Cloud Apps requirements: • Ensure that impossible travel alert policies are based on the previous activities of each user. • Reduce the amount of impossible travel alerts that are false positives. Microsoft Defender for Identity Requirements Minimize the administrative effort required to investigate the false positive alerts. Microsoft Defender for Cloud Requirements Fabrikam identifies the following Microsoft Defender for Cloud requirements: • Ensure that the members of Group2 can modify security policies. • Ensure that the members of Group1 can assign regulatory compliance policy initiatives at the Azure subscription level. • Automate the deployment of the Azure Connected Machine agent for Azure Arc-enabled servers to the existing and future resources of Account1. • Minimize the administrative effort required to investigate the false positive alerts. Microsoft Sentinel Requirements Fabrikam identifies the following Microsoft Sentinel requirements: • Query for NXDOMAIN DNS requests from the last seven days by using built-in Advanced Security Information Model (ASIM) unifying parsers. • From AWS EC2 instances, collect Windows Security event log entries that include local group membership changes. • Identify anomalous activities of Azure AD users by using User and Entity Behavior Analytics (UEBA). • Evaluate the potential impact of compromised Azure AD user credentials by using UEBA. • Ensure that App1 is available for use in Microsoft Sentinel automation rules. • Identify the mean time to triage for incidents generated during the last 30 days. • Identify the mean time to close incidents generated during the last 30 days. • Ensure that the members of Group1 can create and run playbooks. • Ensure that the members of Group1 can manage analytics rules. • Run hunting queries on Pool1 by using Jupyter notebooks. • Ensure that the members of Group2 can manage incidents. • Maximize the performance of data queries. • Minimize the amount of collected data. You need to meet the Microsoft Defender for Cloud Apps requirements. What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Illustration for SC-200 question 220 Illustration for SC-200 question 220
Show Answer
Correct Answer: Low Add IP address ranges.
Explanation:
Setting the impossible travel policy to Low applies broader suppressions based on system, tenant, and user history, which reduces VPN-related false positives. Adding trusted IP address ranges excludes known VPN egress locations, further reducing false alerts while keeping user-based behavior analysis.

Question 266

You have an Azure subscription that uses Microsoft Sentinel. You detect a new threat by using a hunting query. You need to ensure that Microsoft Sentinel automatically detects the threat. The solution must minimize administrative effort. What should you do?

A. Create an analytics rule.
B. Add the query to a workbook.
C. Create a watchlist.
D. Create a playbook.
Show Answer
Correct Answer: A
Explanation:
To have Microsoft Sentinel automatically detect a threat identified through a hunting query, you should convert the hunting query into an analytics rule. Analytics rules run on a schedule, continuously evaluate incoming data, and generate alerts/incidents with minimal ongoing administrative effort. Workbooks are for visualization, watchlists are data references, and playbooks handle automated response—not detection.

Question 192

HOTSPOT - You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Endpoint. You need to create a detection rule that meets the following requirements: • Is triggered when a device that has critical software vulnerabilities was active during the last hour • Limits the number of duplicate results How should you complete the KQL query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Illustration for SC-200 question 192
Show Answer
Correct Answer: | distinct DeviceId | project Timestamp, DeviceId, ReportId
Explanation:
`distinct DeviceId` limits duplicate results to one entry per device with critical vulnerabilities and allows a valid join on DeviceId. `project Timestamp, DeviceId, ReportId` returns the required columns for a Defender custom detection rule while keeping only devices active in the last hour.

Question 360

DRAG DROP - You are investigating an incident by using Microsoft 365 Defender. You need to create an advanced hunting query to count failed sign-in authentications on three devices named CFOLaptop, CEOLaptop, and COOLaptop. How should you complete the query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Select and Place:

Illustration for SC-200 question 360
Show Answer
Correct Answer: DeviceLogonEvents | where DeviceName in ("CFOLaptop", "CEOLaptop", "COOLaptop") and ActionType == "LogonFailed" | summarize LogonFailures = count() by DeviceName, LogonType
Explanation:
Use the DeviceLogonEvents table, filter to the three specified devices, and keep only failed sign-in events (ActionType == "LogonFailed"). Then summarize to count failures per device and logon type.

Question 369

Your company stores the data of every project in a different Azure subscription. All the subscriptions use the same Azure Active Directory (Azure AD) tenant. Every project consists of multiple Azure virtual machines that run Windows Server. The Windows events of the virtual machines are stored in a Log Analytics workspace in each machine's respective subscription. You deploy Azure Sentinel to a new Azure subscription. You need to perform hunting queries in Azure Sentinel to search across all the Log Analytics workspaces of all the subscriptions. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

A. Add the Security Events connector to the Azure Sentinel workspace.
B. Create a query that uses the workspace expression and the union operator.
C. Use the alias statement.
D. Create a query that uses the resource expression and the alias operator.
E. Add the Azure Sentinel solution to each workspace.
Show Answer
Correct Answer: B, E
Explanation:
To hunt across multiple Log Analytics workspaces in different subscriptions, Azure Sentinel relies on cross-workspace KQL queries. You must use the workspace() expression together with the union operator to query and combine data from multiple workspaces. In addition, Microsoft Sentinel must be deployed on every Log Analytics workspace referenced by cross-workspace hunting queries, which requires adding the Azure Sentinel solution to each workspace.

Question 48

You have a Microsoft 365 E5 subscription. You need to ensure that an alert is generated in Microsoft Defender XDR when attackers attempt to connect to a specific device. The solution must minimize administrative effort. What should you do in the Microsoft Defender portal?

A. Create a deception rule that includes a decoy.
B. Tag an existing device as a honeytoken entity.
C. Create a deception rule that includes a lure.
D. Tag an existing device as a sensitive entity.
Show Answer
Correct Answer: B
Explanation:
Tagging an existing device as a honeytoken entity in Microsoft Defender XDR causes any attempted connection or interaction with that device to immediately generate alerts. This requires minimal configuration compared to creating deception rules with lures or decoys and is specifically designed to detect attacker activity against a targeted device.

Question 58

HOTSPOT - Your on-premises network contains a Hyper-V cluster. The cluster contains the virtual machines shown in the following table. You have a Microsoft Sentinel workspace named SW1. You have a data collection rule (DCR) that has the following configurations: • Name: DCR1 • Destination: SW1 • Platform type: All • Data collection endpoint: None • Data source: Windows event logs, Linux syslog For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.

Illustration for SC-200 question 58 Illustration for SC-200 question 58
Show Answer
Correct Answer: No Yes No
Explanation:
On‑prem machines must be Azure Arc–enabled to be added as resources to a DCR. The Azure Monitor Agent (AMA) is required for data collection and is installed automatically when a DCR is associated with an Arc‑enabled machine. Server1: No Azure Arc → cannot be added to DCR, legacy agent is insufficient. Server2: Azure Arc installed → can be added; AMA can be installed via DCR to collect specific Windows events. Server3: No Azure Arc → AMA alone cannot send syslog via DCR.

Question 225

Case study - This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study - To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question. Overview - Fabrikam, Inc. is a financial services company. The company has branch offices in New York, London, and Singapore. Fabrikam has remote users located across the globe. The remote users access company resources, including cloud resources, by using a VPN connection to a branch office. Existing Environment - Identity Environment - The network contains an Active Directory Domain Services (AD DS) forest named fabrikam.com that syncs with an Azure AD tenant named fabrikam.com. To sync the forest, Fabrikam uses Azure AD Connect with pass-through authentication enabled and password hash synchronization disabled. The fabrikam.com forest contains two global groups named Group1 and Group2. Microsoft 365 Environment - All the users at Fabrikam are assigned a Microsoft 365 E5 license and an Azure Active Directory Premium Plan 2 license. Fabrikam implements Microsoft Defender for Identity and Microsoft Defender for Cloud Apps and enables log collectors. Azure Environment - Fabrikam has an Azure subscription that contains the resources shown in the following table. Amazon Web Services (AWS) Environment Fabrikam has an Amazon Web Services (AWS) account named Account1. Account1 contains 100 Amazon Elastic Compute Cloud (EC2) instances that run a custom Windows Server 2022. The image includes Microsoft SQL Server 2019 and does NOT have any agents installed. Current Issues - When the users use the VPN connections, Microsoft 365 Defender raises a high volume of impossible travel alerts that are false positives. Defender for Identity raises a high volume of Suspected DCSync attack alerts that are false positives. Requirements - Planned changes - Fabrikam plans to implement the following services: • Microsoft Defender for Cloud • Microsoft Sentinel Business Requirements - Fabrikam identifies the following business requirements: • Use the principle of least privilege, whenever possible. • Minimize administrative effort. Microsoft Defender for Cloud Apps Requirements Fabrikam identifies the following Microsoft Defender for Cloud Apps requirements: • Ensure that impossible travel alert policies are based on the previous activities of each user. • Reduce the amount of impossible travel alerts that are false positives. Microsoft Defender for Identity Requirements Minimize the administrative effort required to investigate the false positive alerts. Microsoft Defender for Cloud Requirements Fabrikam identifies the following Microsoft Defender for Cloud requirements: • Ensure that the members of Group2 can modify security policies. • Ensure that the members of Group1 can assign regulatory compliance policy initiatives at the Azure subscription level. • Automate the deployment of the Azure Connected Machine agent for Azure Arc-enabled servers to the existing and future resources of Account1. • Minimize the administrative effort required to investigate the false positive alerts. Microsoft Sentinel Requirements - Fabrikam identifies the following Microsoft Sentinel requirements: • Query for NXDOMAIN DNS requests from the last seven days by using built-in Advanced Security Information Model (ASIM) unifying parsers. • From AWS EC2 instances, collect Windows Security event log entries that include local group membership changes. • Identify anomalous activities of Azure AD users by using User and Entity Behavior Analytics (UEBA). • Evaluate the potential impact of compromised Azure AD user credentials by using UEBA. • Ensure that App1 is available for use in Microsoft Sentinel automation rules. • Identify the mean time to triage for incidents generated during the last 30 days. • Identify the mean time to close incidents generated during the last 30 days. • Ensure that the members of Group1 can create and run playbooks. • Ensure that the members of Group1 can manage analytics rules. • Run hunting queries on Pool1 by using Jupyter notebooks. • Ensure that the members of Group2 can manage incidents. • Maximize the performance of data queries. • Minimize the amount of collected data. You need to ensure that you can run hunting queries to meet the Microsoft Sentinel requirements. Which type of workspace should you create?

A. Azure Synapse Analytics
B. Azure Machine Learning
C. Log Analytics
D. Azure Databricks
Show Answer
Correct Answer: B
Explanation:
Microsoft Sentinel hunting queries can be executed through Jupyter notebooks, which are hosted in an Azure Machine Learning workspace. Sentinel integrates with Azure ML notebooks for advanced hunting, while Log Analytics only stores and queries data via KQL and does not provide Jupyter notebook capability. Therefore, to run hunting queries using Jupyter notebooks, an Azure Machine Learning workspace is required.

Question 379

You plan to create a custom Azure Sentinel query that will provide a visual representation of the security alerts generated by Azure Security Center. You need to create a query that will be used to display a bar graph. What should you include in the query?

A. extend
B. bin
C. count
D. workspace
Show Answer
Correct Answer: C
Explanation:
To display a bar graph in Azure Sentinel (KQL), the query must aggregate events into numeric values that can be plotted as bars. This is done using count() (typically via summarize count()), which produces the frequency of security alerts per category. The bin() function is mainly used for time-series bucketing, while extend and workspace do not create the required aggregation.

Question 299

DRAG DROP - You have an Azure Functions app that generates thousands of alerts in Azure Security Center each day for normal activity. You need to hide the alerts automatically in Security Center. Which three actions should you perform in sequence in Security Center? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point. Select and Place:

Illustration for SC-200 question 299
Show Answer
Correct Answer: Select Security alerts. Select Suppression rules, and then select Create new suppression rule. Select Azure Resource as the entity type and specify the Resource ID.
Explanation:
To automatically hide repetitive alerts from an Azure Functions app, you create a suppression rule in Microsoft Defender for Cloud (formerly Security Center). Suppression rules are accessed from the Security alerts page and can target a specific Azure resource, such as the Function App, by using its Resource ID.

Question 128

HOTSPOT - You have an Azure subscription that contains a Log Analytics workspace named Workspace1. You configure Azure activity logs and Microsoft Entra ID logs to be forwarded to Workspace1. You need to identify which Azure resources have been queried or modified by risky users. How should you complete the KQL query? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Illustration for SC-200 question 128
Show Answer
Correct Answer: MicrosoftGraphActivityLogs parse_url(RequestUri).Path
Explanation:
The KQL joins on UserId with AADRiskyUsers.Id and uses fields like RequestUri, RequestMethod, RequestId, and ResponseStatusCode, which are present in MicrosoftGraphActivityLogs. AzureActivity does not expose these columns. To extract the accessed or modified resource from Microsoft Graph requests, the resource path must be derived from the request URL, which is done using parse_url(RequestUri).Path.

Question 151

You have a Microsoft 365 subscription that uses Microsoft Defender for Endpoint Plan 2 and contains a macOS device named Device1. You need to investigate a Defender for Endpoint agent alert on Device1. The solution must meet the following requirements: • Identify all the active network connections on Device1. • Identify all the running processes on Device1. • Retrieve the login history of Device1. • Minimize administrative effort. What should you do first from the Microsoft Defender portal?

A. From Devices, click Collect investigation package for Device1.
B. From Advanced features in Endpoints, enable Live Response unsigned script execution.
C. From Devices, initiate a live response session on Device1.
D. From Advanced features in Endpoints, disable Authenticated telemetry.
Show Answer
Correct Answer: A
Explanation:
Collecting an investigation package from the device gathers a comprehensive snapshot that includes active network connections, running processes, and user/login-related artifacts. This is a single-click action from the Defender portal and requires less administrative effort than initiating a live response session and manually running multiple commands, especially on macOS where live response capabilities are more limited.

$63 $19

Get all 366 questions with detailed answers and explanations

SC-200 — Frequently Asked Questions

What is the Microsoft SC-200 exam?

The Microsoft SC-200 exam — Microsoft Security Operations Analyst — is a professional IT certification exam offered by Microsoft. Passing this exam earns you the Microsoft Certified: Security Operations Analyst Associate certification, a widely recognized credential in the IT industry.

How many practice questions are included?

This study guide contains 366 practice questions, each with an expert-verified correct answer and a detailed explanation. Questions cover all exam domains and objectives.

Is there a free sample available?

Yes! We provide a free sample of 15 practice questions from the SC-200 exam right on this page. Scroll up to preview them and evaluate the quality of our materials before purchasing.

When was this SC-200 study guide last updated?

This study guide was last updated on 2026-02-27. We regularly refresh our materials to reflect the latest exam content and objectives so you're always studying current material.

What file formats do I receive?

After purchase you receive two files: an interactive HTML file with show/hide answer toggles (ideal for studying on screen) and a PDF file (ideal for printing or offline study). Both work on any device — desktop, tablet, or phone.

How much does the SC-200 study guide cost?

The Microsoft SC-200 study guide costs $19 (discounted from $63). This is a one-time payment with no subscriptions or hidden fees.

How do I get my files after payment?

After successful payment via Stripe, you are immediately redirected to a download page with links to your HTML and PDF files. We also send the download links to your email address as a backup, so you'll always have access.

Why choose CheapestExamDumps over other providers?

CheapestExamDumps offers the lowest price at $19 per exam — competitors charge $50-$300 for similar content. All study materials are expert-verified, updated monthly, and include a free 15-question preview with no signup required. You get instant access to both HTML and PDF formats after payment.