New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-200 Exam - Topic 4 Question 75 Discussion

Actual exam question for Microsoft's SC-200 exam
Question #: 75
Topic #: 4
[All SC-200 Questions]

You have a Microsoft Sentinel workspace named SW1.

In SW1, you investigate an incident that is associated with the following entities:

* Host

* IP address

* User account

* Malware name

Which entity can be labeled as an indicator of compromise (loC) directly from the incident s page?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Jesus
3 months ago
Host could be an indicator as well, right?
upvoted 0 times
...
Arlene
3 months ago
Wait, can we really label just one? Seems odd.
upvoted 0 times
...
Stefany
3 months ago
Agreed, malware name is the clear choice.
upvoted 0 times
...
Wilson
4 months ago
I thought it could be the IP address too.
upvoted 0 times
...
Annelle
4 months ago
Definitely the malware name!
upvoted 0 times
...
Francine
4 months ago
I feel like the host could also be an IoC, but I’m not confident about it being directly labeled from the incident page.
upvoted 0 times
...
Billye
4 months ago
I practiced a similar question where the IP address was considered an IoC, so I’m leaning towards that option.
upvoted 0 times
...
Noemi
4 months ago
I'm not entirely sure, but I remember something about user accounts being flagged in incidents too.
upvoted 0 times
...
Linn
5 months ago
I think the malware name is definitely an indicator of compromise since it directly relates to the threat.
upvoted 0 times
...
Van
5 months ago
I think the host or IP address would be the most likely indicators of compromise here, but I'll double-check the information provided to make sure I'm not missing anything.
upvoted 0 times
...
Rasheeda
5 months ago
The question is asking which entity can be labeled as an IOC, so I'm going to carefully consider each option and try to determine which one best fits that criteria.
upvoted 0 times
...
Domingo
5 months ago
Hmm, I'm not sure about this one. I'll need to think through the different entities and what qualifies as an indicator of compromise.
upvoted 0 times
...
Lucia
5 months ago
This seems straightforward - the malware name is likely the indicator of compromise that can be labeled directly from the incident page.
upvoted 0 times
...
Bettyann
5 months ago
I think the answer is C. "qshape" sounds like it would display the queue content and help identify remote sites causing excessive mail traffic.
upvoted 0 times
...
Lai
5 months ago
Hmm, I'm a bit confused about the custom libraries part. Do we need to handle that in the automation, or is the focus just on triggering the tests? I'll need to think through the different options carefully.
upvoted 0 times
...
Chaya
2 years ago
Wait, I thought the incident was associated with a toaster. Isn't that an indicator of compromise these days? No? Okay, fine, I'll go with the malware name then.
upvoted 0 times
...
Paris
2 years ago
I'm just gonna go with the most obvious choice here - the malware name. It's like the criminal's calling card, right? Can't miss that one!
upvoted 0 times
Lovetta
2 years ago
Host could also be a potential indicator of compromise, depending on the situation.
upvoted 0 times
...
Nydia
2 years ago
B) host
upvoted 0 times
...
Laurene
2 years ago
Yeah, that's a good choice. Malware name is a common indicator of compromise.
upvoted 0 times
...
Hubert
2 years ago
A) malware name
upvoted 0 times
...
...
Tesha
2 years ago
This is a tough one, but I'm gonna have to go with option D. IP addresses don't lie, you know? They're like the digital fingerprints of the incident.
upvoted 0 times
Brinda
1 year ago
I agree with User2, I'll also choose option D. IP address is crucial in identifying the source of the incident.
upvoted 0 times
...
Edna
2 years ago
I agree with User2, I'll also choose option D. IP address is crucial in identifying the source of the incident.
upvoted 0 times
...
Dalene
2 years ago
I'm leaning towards option D. IP address can definitely provide valuable information in this case.
upvoted 0 times
...
Rodney
2 years ago
I'm leaning towards option D. IP address can definitely provide valuable information in this situation.
upvoted 0 times
...
Tamra
2 years ago
I think I'll go with option A. Malware name seems like a clear indicator of compromise.
upvoted 0 times
...
Peggie
2 years ago
I think I'll go with option A. Malware name seems like a clear indicator of compromise.
upvoted 0 times
...
...
Valda
2 years ago
Oh, come on! The user account is the real IoC. Gotta catch that sneaky insider, am I right?
upvoted 0 times
Jina
2 years ago
Troy: I agree, insiders can be the biggest threat.
upvoted 0 times
...
Glory
2 years ago
Nan: Definitely, the user account is the key indicator here.
upvoted 0 times
...
Wilson
2 years ago
D) IP address
upvoted 0 times
...
Troy
2 years ago
C) user account
upvoted 0 times
...
Nan
2 years ago
B) host
upvoted 0 times
...
Cathrine
2 years ago
A) malware name
upvoted 0 times
...
...
Emily
2 years ago
I think the IP address is the most likely indicator of compromise in this scenario.
upvoted 0 times
...
Roxane
2 years ago
But the host could also be a potential indicator, don't you think?
upvoted 0 times
...
Raymon
2 years ago
Hmm, I'm going to go with the host. It's the first thing you notice when something's not right, right?
upvoted 0 times
...
Myra
2 years ago
I think the IP address could be an IoC as well. You know, the hacker's calling card and all that.
upvoted 0 times
...
Adolph
2 years ago
The malware name is definitely the indicator of compromise. It's like the smoking gun of the incident!
upvoted 0 times
Stevie
2 years ago
B) host
upvoted 0 times
...
Delbert
2 years ago
Yes, the malware name is a clear indicator of compromise.
upvoted 0 times
...
Pearline
2 years ago
B) host
upvoted 0 times
...
Yesenia
2 years ago
Yes, the malware name is a clear indicator of compromise.
upvoted 0 times
...
Lou
2 years ago
A) malware name
upvoted 0 times
...
Carma
2 years ago
A) malware name
upvoted 0 times
...
...
Carmela
2 years ago
I disagree, I believe the user account is the indicator of compromise.
upvoted 0 times
...
Roxane
2 years ago
I think the indicator of compromise could be the malware name.
upvoted 0 times
...

Save Cancel