New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-200 Exam - Topic 4 Question 10 Discussion

Actual exam question for Microsoft's SC-200 exam
Question #: 10
Topic #: 4
[All SC-200 Questions]

You are investigating a potential attack that deploys a new ransomware strain.

You plan to perform automated actions on a group of highly valuable machines that contain sensitive information.

You have three custom device groups.

You need to be able to temporarily group the machines to perform actions on the devices. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Alpha
4 months ago
Creating a new admin role? Seems unnecessary to me.
upvoted 0 times
...
Louvenia
5 months ago
Surprised that tagging is so important in this scenario!
upvoted 0 times
...
Reita
5 months ago
Adding users to the admin role seems risky, not sure about that.
upvoted 0 times
...
Edwin
5 months ago
I think creating a new device group is a solid move too!
upvoted 0 times
...
Ranee
5 months ago
Definitely need to add a tag to the machines.
upvoted 0 times
...
Merlyn
5 months ago
Adding a tag to the device group sounds familiar, but I also feel like creating a new admin role might be overkill for just temporary actions.
upvoted 0 times
...
Doyle
5 months ago
I remember a practice question where we had to create a new device group, but I can't recall if the rank matters in this scenario.
upvoted 0 times
...
Yolande
5 months ago
I think adding a tag to the machines could be important for identifying them quickly, but I'm not sure if it's the best option for grouping.
upvoted 0 times
...
Cyndy
5 months ago
I’m leaning towards creating a new device group with a rank of 1, but I’m uncertain if that’s necessary when we already have custom groups.
upvoted 0 times
...
Abel
5 months ago
I'm a little confused by this question. I know mongodump and mongorestore are MongoDB tools, but I'm not sure which specific use case they're for. I'll have to review my notes on MongoDB administration to be sure.
upvoted 0 times
...
Zita
5 months ago
I'm pretty confident on this one. The answer is B - agile addresses the risk by avoiding too much detail at the start. The whole point is to be able to respond to change and not get bogged down in extensive planning when the requirements may shift.
upvoted 0 times
...
Dana
5 months ago
Hmm, this seems straightforward. The option name that controls which users can log in is probably something like "AllowUsers" or "PermittedUsers". I'll scan the sshd config file for an option like that.
upvoted 0 times
...

Save Cancel