New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam SC-200 Topic 1 Question 88 Discussion

Actual exam question for Microsoft's SC-200 exam
Question #: 88
Topic #: 1
[All SC-200 Questions]

You have a Microsoft 365 subscription that uses Microsoft Defender XDR.

You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.

You need to search for malicious activities in your organization.

Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Tomoko
5 days ago
Ah, the joys of Microsoft 365 security. Chasing down those crafty attackers is like a game of cat and mouse, but I'm up for the challenge. Now, which tactics can I dig into using that MicrosoftGraphActivityLogs table? I'm feeling lucky!
upvoted 0 times
...
Altha
19 days ago
Whoa, this is some serious cybersecurity stuff! Gotta be careful with those pesky attackers and their Graph API tricks. Time to put my investigative skills to the test and find the right tactics to analyze. Let's do this!
upvoted 0 times
Annice
11 days ago
I think we should analyze Tactic1 and Tactic2 only.
upvoted 0 times
...
...
Elliot
22 days ago
I believe Tactic3 can also be analyzed using MicrosoftGraphActivityLogs table based on the attacker's behavior.
upvoted 0 times
...
Izetta
28 days ago
I'm not sure about Tactic3 though. Do you think it can also be analyzed?
upvoted 0 times
...
Crista
29 days ago
I agree with Elliot. Those tactics are most likely to be detected through that table.
upvoted 0 times
...
Elliot
1 months ago
I think we can analyze Tactic1 and Tactic2 using MicrosoftGraphActivityLogs table.
upvoted 0 times
...
Sabine
1 months ago
Hmm, let me think about this. I'm pretty sure the Microsoft Graph API can be used to track down those sneaky attackers. But which tactics can we analyze using the MicrosoftGraphActivityLogs table? Tricky question, but I'm ready to give it my best shot.
upvoted 0 times
Clay
2 days ago
So, the answer is B) Tactic1 and Tactic2 only.
upvoted 0 times
...
Celestina
8 days ago
I agree, those are the tactics we should focus on to track down the attacker.
upvoted 0 times
...
Leoma
26 days ago
I think we can analyze Tactic1 and Tactic2 using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
...

Save Cancel