0.8 Check My Knowledge

45 minutes · Module 0 · Free

Check My Knowledge

Module 0 — Check My Knowledge (15 questions)

1. You are setting up your lab environment. You sign into the Defender XDR portal at security.microsoft.com but see "You don't have permission." You created your M365 E5 tenant 10 minutes ago. What is the most likely cause?

License propagation delay. E5 license features take 30-60 minutes to activate across all services after tenant creation. Wait and retry.
Your account does not have Global Administrator role
The Defender XDR portal is only available in certain regions
You need a separate Defender license

2. The SC-200 exam has four domains. Which domain accounts for the largest percentage of exam questions?

Manage a Security Operations Environment (20-25%)
Configure Protections and Detections (15-20%)
Manage Incident Response (25-30%) — nearly a third of the exam focuses on investigation and response. This is why the course dedicates 5 unique modules (11-15) to real-world investigation skills.
Manage Security Threats (15-20%)

3. You created your Azure subscription with a different Microsoft account than your M365 tenant. What problem will this cause?

Sentinel will not be able to connect to your M365 data. The Defender XDR and Entra ID data connectors require the Azure subscription and M365 tenant to share the same Entra ID directory. Using different accounts creates separate directories that cannot see each other's data.
Azure will cost more
No problem — they connect automatically
You cannot create a Log Analytics workspace

4. You run a KQL query in Sentinel and get zero results, but you connected data connectors 45 minutes ago. What should you check first?

The KQL syntax is wrong
Verify the data connector is actually connected and the specific event tables are selected. Navigate to Data connectors, open the connector page, and confirm the status shows "Connected" with the correct tables enabled. The most common issue is connecting the Defender XDR connector but not selecting the individual event tables.
Sentinel is not provisioned correctly
The free tier does not support queries

5. Which M365 licensing tier provides full Defender for Endpoint P2 (device timeline, live response, advanced hunting)?

M365 Business Basic
M365 Business Premium (provides P1 only)
M365 E5 — includes Defender for Endpoint P2 with full EDR, device timeline, live response, advanced hunting, and automated investigation.
M365 E3

6. The course recommends building KQL queries incrementally rather than copy-pasting complete queries. Why?

Incremental building forces you to understand each line's purpose and see how the output changes as you add operators. Copy-pasting a complete query gives you the result but not the understanding. When you face a scenario not covered in the course, you need to construct queries from scratch — and that requires understanding each component.
Copy-pasting causes syntax errors
Incremental queries run faster
The course exercises require it

7. You want to simulate a suspicious sign-in for practice. What should you do in your lab environment?

Sign in as a test user from a different browser, VPN, or mobile device to create a sign-in from a different IP address and location. This generates the anomalous sign-in patterns (unfamiliar IP, unfamiliar location) that you will learn to detect in Module 1 and investigate in Module 11.
Use a brute-force tool against your tenant
Modify the SigninLogs table directly
Wait for real attacks to occur

8. What is the purpose of the Content Hub solutions you installed (M365, Entra ID, Defender XDR, UEBA)?

They provide pre-built analytics rules, workbooks, and playbooks for your workspace. They do not generate data — they provide the detection logic and visualization templates that you will explore and modify in Modules 7 and 9. Think of them as starter packs that give you working examples to learn from.
They generate sample data for testing
They connect additional data sources
They are required for Sentinel to function

9. The course says "Do not study the SC-200 exam domain by domain." Why?

The domains overlap significantly. An exam question about "responding to an Office 365 alert" (Domain 3) requires understanding Office 365 configuration (Domain 2) and KQL investigation (Domain 1). Studying domains in isolation creates knowledge silos. The course modules build skills progressively across domains.
The domains are not important for the exam
The exam questions are randomized
Each domain is covered by exactly one module

10. Your lab query returns 5 results where the course Expected Output shows 500. Is your lab broken?

No. A 6-user lab generates far less data than the 500-user organization in the course's Expected Output examples. The learning is in the query construction and analysis methodology, not in data volume. Your 5 results contain the same fields and patterns as the 500 — analyze them the same way.
Yes — reinstall the data connectors
You need a production tenant for the exercises
The Expected Output is fictional

11. You chose M365 Business Premium instead of E5 due to budget. At which module will you first encounter a limitation?

Module 1 — the Defender XDR portal is not available
Module 6 — KQL requires E5
Module 4 (Defender for Endpoint) — Business Premium includes P1 only. The device timeline, live response, and advanced hunting exercises in Module 4 require P2, which is only in E5 or as a standalone add-on.
Module 15 — detection engineering is E5 only

12. The course recommends a study pace of 1-2 hours per day for part-time learners. At that pace, approximately how long will the full course take?

1-2 months
10-14 months at 3-4 weeks per module across 16 modules. This is a comprehensive course equivalent to a technical textbook — not a weekend crash course. Consistent daily study produces better retention than intensive weekend sessions.
2-3 years
It depends on previous experience only

13. What is the primary risk of using the M365 E5 30-day trial for your lab?

The trial automatically converts to a paid subscription on day 31. If you forget to cancel or convert, you are charged $57/month. Set a calendar reminder for day 25 to decide: cancel, start a new trial with a different email, or accept the paid subscription.
Limited features during trial
Data is deleted after 30 days
Trial accounts cannot use Sentinel

14. You connected the Defender XDR data connector but forgot to select the individual event tables. What happens?

Incidents and alerts flow to Sentinel (the "Connect incidents and alerts" checkbox handles that), but the underlying event tables (DeviceProcessEvents, EmailEvents, etc.) remain empty. You can see incidents in the Sentinel incident queue but cannot run advanced hunting queries against the raw data. Go back to the connector page and select the event tables.
No data flows at all
All data flows automatically
The connector shows an error

15. Why does the course include 5 unique modules (11-15) that are not part of the SC-200 exam objectives?

The SC-200 exam tests whether you can use the tools. It does not test whether you can investigate a real incident from start to finish, write a CISO report, preserve evidence for legal proceedings, or build detection rules that prevent recurrence. These are the skills that separate a certified analyst from a competent one — and they are what employers actually hire for.
They are bonus content for subscribers
Microsoft requires them for a partner certification
They will be added to the SC-200 exam next year