Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam SC-200 Topic 1 Question 88 Discussion

Actual exam question for Microsoft's SC-200 exam
Question #: 88
Topic #: 1
[All SC-200 Questions]

You have a Microsoft 365 subscription that uses Microsoft Defender XDR.

You are investigating an attacker that is known to use the Microsoft Graph API as an attack vector. The attacker performs the tactics shown the following table.

You need to search for malicious activities in your organization.

Which tactics can you analyze by using the MicrosoftGraphActivityLogs table?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Cathrine
3 months ago
Ugh, another Microsoft 365 security question? I swear, these exams are trying to make us all cyber-detectives. But hey, at least we get to use cool things like the Graph API, right? Now, which tactics can we analyze? *scratches head* Time to put on my thinking cap and solve this mystery!
upvoted 0 times
...
Alonzo
3 months ago
Alright, time to put on my detective hat and track down those dastardly attackers. Let's see, the Microsoft Graph API, huh? Sounds like a job for a cybersecurity superhero. *cue dramatic music* But which tactics can I analyze? Hmm, let me think...
upvoted 0 times
Valentin
2 months ago
Exactly. Let's get to work and track down those attackers!
upvoted 0 times
...
Virgilio
2 months ago
So, we should focus on those to search for malicious activities.
upvoted 0 times
...
Carmen
2 months ago
Actually, we need to analyze Taclic1, Tactic2, and Tactic3.
upvoted 0 times
...
Rashida
2 months ago
That sounds right. Those are the tactics the attacker is known to use.
upvoted 0 times
...
Lina
2 months ago
No, we should analyze Tac1ic2 and Tactic3 only.
upvoted 0 times
...
Evette
2 months ago
I think we can analyze Tactic1 and Tactic2 using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
Keva
2 months ago
I think we can analyze Tactic1 and Tactic2 using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
...
Tomoko
3 months ago
Ah, the joys of Microsoft 365 security. Chasing down those crafty attackers is like a game of cat and mouse, but I'm up for the challenge. Now, which tactics can I dig into using that MicrosoftGraphActivityLogs table? I'm feeling lucky!
upvoted 0 times
Rosendo
3 months ago
C) Tac1ic2 and Tactic3 only
upvoted 0 times
...
Reita
3 months ago
B) Tactic1 and Tactic2 only
upvoted 0 times
...
Elizabeth
3 months ago
A) Tactic? only
upvoted 0 times
...
...
Altha
4 months ago
Whoa, this is some serious cybersecurity stuff! Gotta be careful with those pesky attackers and their Graph API tricks. Time to put my investigative skills to the test and find the right tactics to analyze. Let's do this!
upvoted 0 times
Ardella
3 months ago
Agreed, those are the tactics the attacker is known to use with the Microsoft Graph API.
upvoted 0 times
...
Annice
3 months ago
I think we should analyze Tactic1 and Tactic2 only.
upvoted 0 times
...
...
Elliot
4 months ago
I believe Tactic3 can also be analyzed using MicrosoftGraphActivityLogs table based on the attacker's behavior.
upvoted 0 times
...
Izetta
4 months ago
I'm not sure about Tactic3 though. Do you think it can also be analyzed?
upvoted 0 times
...
Crista
4 months ago
I agree with Elliot. Those tactics are most likely to be detected through that table.
upvoted 0 times
...
Elliot
4 months ago
I think we can analyze Tactic1 and Tactic2 using MicrosoftGraphActivityLogs table.
upvoted 0 times
...
Sabine
4 months ago
Hmm, let me think about this. I'm pretty sure the Microsoft Graph API can be used to track down those sneaky attackers. But which tactics can we analyze using the MicrosoftGraphActivityLogs table? Tricky question, but I'm ready to give it my best shot.
upvoted 0 times
Elli
3 months ago
That's correct! Let's start analyzing those tactics to find any malicious activities.
upvoted 0 times
...
Clay
3 months ago
So, the answer is B) Tactic1 and Tactic2 only.
upvoted 0 times
...
Celestina
3 months ago
I agree, those are the tactics we should focus on to track down the attacker.
upvoted 0 times
...
Leoma
4 months ago
I think we can analyze Tactic1 and Tactic2 using the MicrosoftGraphActivityLogs table.
upvoted 0 times
...
...

Save Cancel