Microsoft Sentinel
Microsoft Sentinel, also known as Azure Sentinel, is a cloud-native security information and event management (SIEM), and security orchestration, automation, and response (SOAR) solution offered by Microsoft. It is designed to help organizations detect, investigate, and respond to security threats and incidents across their entire IT infrastructure.
Azure Sentinel integrates with various data sources, including cloud services, on-premises systems, network devices, and security solutions, allowing it to collect and analyze vast amounts of security event data in real-time. It leverages machine learning algorithms and advanced analytics to detect anomalies, identify potential threats, and generate actionable insights.
Take this assessment to know how good you are with Microsoft Sentinel.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
NYXPoints are used to generate the Leaderboard (coming soon). They are awarded for achieving a certain score.
- 200 nyxpoints for a passing score of 80% or more
- 300 nyxpoints for a perfect score of 100%
- Didn’t pass? You still get 30 nyxpoints for attempting the assesment
IMPORTANT instructions for taking the Assessment
- The timer starts when you click Start Assessment
- DO NOT refresh/reload the page or use the back button to navigate away from the page.
- Navigating away from the assessment page DOES NOT stop/pause the timer and the will restart the assessment when you come back to it. The answers are NOT saved.
General
- There are NO pre-requisites to take this assessment. Take this assessment even if you are completely new to Linux.
- The assessment is completely FREE.
- Preferably take it in a closed book mode.
- DO NOT copy/paste, share or upload questions elsewhere.
Eligible Rewards
300 NyxCoins*
* NyxCoins vary on score
Assessment Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
What are the four stages of Microsoft Sentinel?
CorrectIncorrect -
Question 2 of 30
2. Question
In Microsoft Sentinel, how many days of data retention are provided free of cost?
CorrectIncorrect -
Question 3 of 30
3. Question
Which language is used in Microsoft Sentinel to query data?
CorrectIncorrect -
Question 4 of 30
4. Question
Which Microsoft Sentinel component is used to generate alerts?
CorrectIncorrect -
Question 5 of 30
5. Question
How do you control permissions in Microsoft Sentinel?
CorrectIncorrect -
Question 6 of 30
6. Question
Which of the following are the core capabilities of Microsoft Sentinel?
CorrectIncorrect -
Question 7 of 30
7. Question
What is the use of playbooks in Microsoft Sentinel?
CorrectIncorrect -
Question 8 of 30
8. Question
From the choices below, what is the best description of Microsoft Sentinel S.O.A.R?
CorrectIncorrect -
Question 9 of 30
9. Question
What is alert fatigue in terms of SOAR environment?
CorrectIncorrect -
Question 10 of 30
10. Question
What does the acronym SOAR stand for?
CorrectIncorrect -
Question 11 of 30
11. Question
Identify a benefit of Microsoft Sentinel as a security tool?
CorrectIncorrect -
Question 12 of 30
12. Question
How does Microsoft Sentinel help evolve the way security monitoring works?
CorrectIncorrect -
Question 13 of 30
13. Question
Businesses, hospitals, and other organizations must comply with which of the below regulatory standards and acts? (Multiple Choice)
CorrectIncorrect -
Question 14 of 30
14. Question
Which of the three tasks must be performed by technology to satisfy network security compliance requirements in security monitoring platforms like Microsoft Sentinel? (Multiple Choice)
CorrectIncorrect -
Question 15 of 30
15. Question
What is the purpose of the incident management process in SOAR environment?
CorrectIncorrect -
Question 16 of 30
16. Question
What is meant by the normalization of logs in SOC monitoring tools like Microsoft Sentinel?
CorrectIncorrect -
Question 17 of 30
17. Question
What is meant by IoC in the Microsoft Sentinel environment?
CorrectIncorrect -
Question 18 of 30
18. Question
In security monitoring deployments, what is meant by the term “correlation”?
CorrectIncorrect -
Question 19 of 30
19. Question
Microsoft Sentinel is a cloud-native SOAR solution.
CorrectIncorrect -
Question 20 of 30
20. Question
You have a suppression rule in Azure Security Center for 15 virtual machines that are used for testing purpose. The virtual machines are running Windows Server OS. You are troubleshooting an issue on the virtual machines. In Security Center, you need to view the alerts generated by the virtual machines during the last six days. What should you do?
CorrectIncorrect -
Question 21 of 30
21. Question
When performing threat hunting in Microsoft Sentinel, you come across results you want to use later, what would you use to save them for later?
CorrectIncorrect -
Question 22 of 30
22. Question
You receive a security news about a potential attack that uses an image file. You are required to create an indicator of compromise (IoC) in Microsoft Defender for Endpoint to circumvent the attack. Which indicator type should you use?
CorrectIncorrect -
Question 23 of 30
23. Question
What does Microsoft Sentinel provide?
CorrectIncorrect -
Question 24 of 30
24. Question
Which Azure service stores the log data that is ingested into Microsoft Sentinel?
CorrectIncorrect -
Question 25 of 30
25. Question
Which Microsoft Sentinel security role can create workbooks?
CorrectIncorrect -
Question 26 of 30
26. Question
Why is it important to set the region when creating the Log Analytics workspace?
CorrectIncorrect -
Question 27 of 30
27. Question
Which table stores Defender for Endpoint logon events?
CorrectIncorrect -
Question 28 of 30
28. Question
Which table contains logs from Windows hosts collected directly to Microsoft Sentinel?
CorrectIncorrect -
Question 29 of 30
29. Question
Which of the following operations is a typical scenario for using a Microsoft Sentinel watchlist?
CorrectIncorrect -
Question 30 of 30
30. Question
How do you access a new watchlist named OurList in KQL?
CorrectIncorrect