Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-200 Exam - Topic 2 Question 7 Discussion

Actual exam question for Microsoft's SC-200 exam
Question #: 7
Topic #: 2
[All SC-200 Questions]

You create an Azure subscription named sub1.

In sub1, you create a Log Analytics workspace named workspace1.

You enable Azure Security Center and configure Security Center to use workspace1.

You need to ensure that Security Center processes events from the Azure virtual machines that report to workspace1.

What should you do?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Valentin
5 months ago
Creating a workbook won't help with event processing, just saying.
upvoted 0 times
...
Dana
5 months ago
Wait, can you really just install a solution? Sounds too easy!
upvoted 0 times
...
German
5 months ago
I think registering a provider might be necessary too.
upvoted 0 times
...
Reuben
5 months ago
Totally agree, that's the way to go!
upvoted 0 times
...
Kris
5 months ago
You need to install a solution in workspace1.
upvoted 0 times
...
Yun
5 months ago
I feel like I read somewhere that we need to enable something in Security Center itself, maybe related to workflow automation? But I can't quite remember the details.
upvoted 0 times
...
Dottie
5 months ago
Creating a workbook sounds familiar, but I don't think that's what we need for processing events. It seems more like a reporting tool.
upvoted 0 times
...
Tatum
5 months ago
I think we might need to install a solution in workspace1 to get Security Center to process those events, but I'm not entirely sure.
upvoted 0 times
...
Cecily
6 months ago
I remember a practice question about registering providers, but I can't recall if that's relevant here. It feels like it might be a different scenario.
upvoted 0 times
...
Xuan
6 months ago
Hmm, I'm a little unsure about this one. I think it might be to allow editing of image fields, but I'm not 100% confident. I'll have to think it through a bit more.
upvoted 0 times
...
Kayleigh
6 months ago
I think the correct answer is D. Operate the governance framework, since that seems to be the main objective of Phase G.
upvoted 0 times
...
Wei
6 months ago
This is a tricky one. I'm a bit confused about the difference between the Orphan List and the Inactivate feature. I'll need to review those concepts again before answering.
upvoted 0 times
...
Carey
6 months ago
Okay, let's see. If the I/O Request Limit is exceeded, that's going to impact the performance of the system. I'm thinking the host will see rising response times and the writes might back up in the cache. I'll double-check my answer before submitting.
upvoted 0 times
...

Save Cancel