Microsoft Sentinel
Microsoft Sentinel, also known as Azure Sentinel, is a cloud-native security information and event management (SIEM), and security orchestration, automation, and response (SOAR) solution offered by Microsoft. It is designed to help organizations detect, investigate, and respond to security threats and incidents across their entire IT infrastructure.
Azure Sentinel integrates with various data sources, including cloud services, on-premises systems, network devices, and security solutions, allowing it to collect and analyze vast amounts of security event data in real-time. It leverages machine learning algorithms and advanced analytics to detect anomalies, identify potential threats, and generate actionable insights.
Take this assessment to know how good you are with Microsoft Sentinel.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
NYXPoints are used to generate the Leaderboard (coming soon). They are awarded for achieving a certain score.
- 200 nyxpoints for a passing score of 80% or more
- 300 nyxpoints for a perfect score of 100%
- Didn’t pass? You still get 30 nyxpoints for attempting the assesment
IMPORTANT instructions for taking the Assessment
- The timer starts when you click Start Assessment
- DO NOT refresh/reload the page or use the back button to navigate away from the page.
- Navigating away from the assessment page DOES NOT stop/pause the timer and the will restart the assessment when you come back to it. The answers are NOT saved.
General
- There are NO pre-requisites to take this assessment. Take this assessment even if you are completely new to Linux.
- The assessment is completely FREE.
- Preferably take it in a closed book mode.
- DO NOT copy/paste, share or upload questions elsewhere.
Eligible Rewards

300 NyxCoins*
* NyxCoins vary on score
Assessment Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
		Earned Point(s): 0 of 0, (0)		
		0 Essay(s) Pending (Possible Point(s): 0)		
		
| Average score |  | 
| Your score |  | 
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
- 
				Question 1 of 301. QuestionWhat are the four stages of Microsoft Sentinel? CorrectIncorrect
- 
				Question 2 of 302. QuestionIn Microsoft Sentinel, how many days of data retention are provided free of cost? CorrectIncorrect
- 
				Question 3 of 303. QuestionWhich language is used in Microsoft Sentinel to query data? CorrectIncorrect
- 
				Question 4 of 304. QuestionWhich Microsoft Sentinel component is used to generate alerts? CorrectIncorrect
- 
				Question 5 of 305. QuestionHow do you control permissions in Microsoft Sentinel? CorrectIncorrect
- 
				Question 6 of 306. QuestionWhich of the following are the core capabilities of Microsoft Sentinel? CorrectIncorrect
- 
				Question 7 of 307. QuestionWhat is the use of playbooks in Microsoft Sentinel? CorrectIncorrect
- 
				Question 8 of 308. QuestionFrom the choices below, what is the best description of Microsoft Sentinel S.O.A.R? CorrectIncorrect
- 
				Question 9 of 309. QuestionWhat is alert fatigue in terms of SOAR environment? CorrectIncorrect
- 
				Question 10 of 3010. QuestionWhat does the acronym SOAR stand for? CorrectIncorrect
- 
				Question 11 of 3011. QuestionIdentify a benefit of Microsoft Sentinel as a security tool? CorrectIncorrect
- 
				Question 12 of 3012. QuestionHow does Microsoft Sentinel help evolve the way security monitoring works? CorrectIncorrect
- 
				Question 13 of 3013. QuestionBusinesses, hospitals, and other organizations must comply with which of the below regulatory standards and acts? (Multiple Choice) CorrectIncorrect
- 
				Question 14 of 3014. QuestionWhich of the three tasks must be performed by technology to satisfy network security compliance requirements in security monitoring platforms like Microsoft Sentinel? (Multiple Choice) CorrectIncorrect
- 
				Question 15 of 3015. QuestionWhat is the purpose of the incident management process in SOAR environment? CorrectIncorrect
- 
				Question 16 of 3016. QuestionWhat is meant by the normalization of logs in SOC monitoring tools like Microsoft Sentinel? CorrectIncorrect
- 
				Question 17 of 3017. QuestionWhat is meant by IoC in the Microsoft Sentinel environment? CorrectIncorrect
- 
				Question 18 of 3018. QuestionIn security monitoring deployments, what is meant by the term “correlation”? CorrectIncorrect
- 
				Question 19 of 3019. QuestionMicrosoft Sentinel is a cloud-native SOAR solution. CorrectIncorrect
- 
				Question 20 of 3020. QuestionYou have a suppression rule in Azure Security Center for 15 virtual machines that are used for testing purpose. The virtual machines are running Windows Server OS. You are troubleshooting an issue on the virtual machines. In Security Center, you need to view the alerts generated by the virtual machines during the last six days. What should you do? CorrectIncorrect
- 
				Question 21 of 3021. QuestionWhen performing threat hunting in Microsoft Sentinel, you come across results you want to use later, what would you use to save them for later? CorrectIncorrect
- 
				Question 22 of 3022. QuestionYou receive a security news about a potential attack that uses an image file. You are required to create an indicator of compromise (IoC) in Microsoft Defender for Endpoint to circumvent the attack. Which indicator type should you use? CorrectIncorrect
- 
				Question 23 of 3023. QuestionWhat does Microsoft Sentinel provide? CorrectIncorrect
- 
				Question 24 of 3024. QuestionWhich Azure service stores the log data that is ingested into Microsoft Sentinel? CorrectIncorrect
- 
				Question 25 of 3025. QuestionWhich Microsoft Sentinel security role can create workbooks? CorrectIncorrect
- 
				Question 26 of 3026. QuestionWhy is it important to set the region when creating the Log Analytics workspace? CorrectIncorrect
- 
				Question 27 of 3027. QuestionWhich table stores Defender for Endpoint logon events? CorrectIncorrect
- 
				Question 28 of 3028. QuestionWhich table contains logs from Windows hosts collected directly to Microsoft Sentinel? CorrectIncorrect
- 
				Question 29 of 3029. QuestionWhich of the following operations is a typical scenario for using a Microsoft Sentinel watchlist? CorrectIncorrect
- 
				Question 30 of 3030. QuestionHow do you access a new watchlist named OurList in KQL? CorrectIncorrect
