Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-200 Exam - Topic 1 Question 88 Discussion

Actual exam question for Microsoft's SC-200 exam
Question #: 88
Topic #: 1
[All SC-200 Questions]

You have a Microsoft 365 subscription that uses Microsoft Defender XDR.

You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.

You need to search for malicious activities in your organization.

Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Alonzo
4 months ago
Agreed, Tactic1 and Tactic2 seem to be the main focus here.
upvoted 0 times
...
Sherell
4 months ago
Wait, can we really trust those logs for all tactics?
upvoted 0 times
...
Norah
4 months ago
Pretty sure it's just Tactic1 and Tactic2 only.
upvoted 0 times
...
Arlen
4 months ago
I think Tactic3 is also included, right?
upvoted 0 times
...
Shanda
5 months ago
You can analyze Tactic1 and Tactic2 with those logs.
upvoted 0 times
...
Nan
5 months ago
I’m leaning towards option D, but I wish I had reviewed the specifics of the tactics more thoroughly before the exam.
upvoted 0 times
...
Alberta
5 months ago
I feel like Tactic3 is definitely included, but I can't remember if it was just Tactic1 and Tactic2 or all three.
upvoted 0 times
...
Nada
5 months ago
I think we practiced a similar question, and I recall that it might be Tactic1 and Tactic2 only, but I could be wrong.
upvoted 0 times
...
Lou
5 months ago
I remember we discussed the MicrosoftGraphActivityLogs table in class, but I’m not sure which tactics it covers.
upvoted 0 times
...
Darrin
5 months ago
This seems straightforward enough. The question is asking which tactics can be analyzed using the MicrosoftGraphActivityLogs table, and the table shows three tactics. I'm pretty confident that the answer is D.
upvoted 0 times
...
Whitney
5 months ago
Okay, I think I've got a handle on this. Based on the information in the table, I believe the correct answer is D - Tactic1, Tactic2, and Tactic3. I'll double-check my work, but that's my initial strategy.
upvoted 0 times
...
Tyisha
5 months ago
Hmm, I'm a bit confused by the wording of the question. It's not entirely clear to me which tactics I should be focusing on. I'll need to re-read it a few times to make sure I understand.
upvoted 0 times
...
Wilburn
5 months ago
This looks like a tricky one. I'll need to carefully review the information provided in the table and think about which tactics can be analyzed using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
Cathrine
1 year ago
Ugh, another Microsoft 365 security question? I swear, these exams are trying to make us all cyber-detectives. But hey, at least we get to use cool things like the Graph API, right? Now, which tactics can we analyze? *scratches head* Time to put on my thinking cap and solve this mystery!
upvoted 0 times
...
Alonzo
1 year ago
Alright, time to put on my detective hat and track down those dastardly attackers. Let's see, the Microsoft Graph API, huh? Sounds like a job for a cybersecurity superhero. *cue dramatic music* But which tactics can I analyze? Hmm, let me think...
upvoted 0 times
Valentin
1 year ago
Exactly. Let's get to work and track down those attackers!
upvoted 0 times
...
Virgilio
1 year ago
So, we should focus on those to search for malicious activities.
upvoted 0 times
...
Carmen
1 year ago
Actually, we need to analyze Taclic1, Tactic2, and Tactic3.
upvoted 0 times
...
Rashida
1 year ago
That sounds right. Those are the tactics the attacker is known to use.
upvoted 0 times
...
Lina
1 year ago
No, we should analyze Tac1ic2 and Tactic3 only.
upvoted 0 times
...
Evette
1 year ago
I think we can analyze Tactic1 and Tactic2 using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
Keva
1 year ago
I think we can analyze Tactic1 and Tactic2 using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
...
Tomoko
1 year ago
Ah, the joys of Microsoft 365 security. Chasing down those crafty attackers is like a game of cat and mouse, but I'm up for the challenge. Now, which tactics can I dig into using that MicrosoftGraphActivityLogs table? I'm feeling lucky!
upvoted 0 times
Rosendo
1 year ago
C) Tac1ic2 and Tactic3 only
upvoted 0 times
...
Reita
1 year ago
B) Tactic1 and Tactic2 only
upvoted 0 times
...
Elizabeth
1 year ago
A) Tactic? only
upvoted 0 times
...
...
Altha
1 year ago
Whoa, this is some serious cybersecurity stuff! Gotta be careful with those pesky attackers and their Graph API tricks. Time to put my investigative skills to the test and find the right tactics to analyze. Let's do this!
upvoted 0 times
Ardella
1 year ago
Agreed, those are the tactics the attacker is known to use with the Microsoft Graph API.
upvoted 0 times
...
Annice
1 year ago
I think we should analyze Tactic1 and Tactic2 only.
upvoted 0 times
...
...
Elliot
1 year ago
I believe Tactic3 can also be analyzed using MicrosoftGraphActivityLogs table based on the attacker's behavior.
upvoted 0 times
...
Izetta
1 year ago
I'm not sure about Tactic3 though. Do you think it can also be analyzed?
upvoted 0 times
...
Crista
1 year ago
I agree with Elliot. Those tactics are most likely to be detected through that table.
upvoted 0 times
...
Elliot
1 year ago
I think we can analyze Tactic1 and Tactic2 using MicrosoftGraphActivityLogs table.
upvoted 0 times
...
Sabine
1 year ago
Hmm, let me think about this. I'm pretty sure the Microsoft Graph API can be used to track down those sneaky attackers. But which tactics can we analyze using the MicrosoftGraphActivityLogs table? Tricky question, but I'm ready to give it my best shot.
upvoted 0 times
Elli
1 year ago
That's correct! Let's start analyzing those tactics to find any malicious activities.
upvoted 0 times
...
Clay
1 year ago
So, the answer is B) Tactic1 and Tactic2 only.
upvoted 0 times
...
Celestina
1 year ago
I agree, those are the tactics we should focus on to track down the attacker.
upvoted 0 times
...
Leoma
1 year ago
I think we can analyze Tactic1 and Tactic2 using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
...

Save Cancel