Free — No Signup RequiredMicrosoft· Updated 2026

SC-200 Flashcards — Free Microsoft Security Operations Analyst SC-200 Study Cards

Reinforce SC-200 concepts with active-recall study cards covering all 3 blueprint domains. Each card shows the question on the front and the correct answer with a full explanation on the back.

300+ study cards3 domains coveredActive recall methodFull explanations included

How to use SC-200 flashcards effectively

Flashcards work through active recall — the process of retrieving information from memory rather than passively re-reading it. Research consistently shows that active recall produces stronger, longer-lasting memory than re-reading study guides. For SC-200 preparation, this means flashcards are one of the highest-return study tools available.

Attempt recall first

Read the SC-200 question on each card, pause, and attempt to formulate the answer in your own words before revealing. This retrieval attempt — even if wrong — dramatically strengthens memory compared to immediately reading the answer.

Review wrong cards again

When you get a card wrong, note it and add it back to your review pile. Spaced repetition — seeing difficult cards more frequently — is the mechanism that makes flashcard study far more efficient than linear reading.

Study by domain

Group your SC-200 flashcard sessions by domain for the first 3–4 weeks. Master one domain before moving to the next. In the final week, shuffle all cards together to test cross-domain recall — which is what the real SC-200 exam requires.

Short sessions beat marathon reviews

20–30 flashcard cards per session, done daily, produces better retention than a single 200-card marathon session. Five short daily sessions per week over 4 weeks gives you over 400 total card reviews — enough to reliably pass SC-200.

SC-200 flashcard preview

Sample cards from the SC-200 flashcard bank. Read the question, think of the answer, then read the explanation below.

1

A user reports receiving a suspicious email that bypassed the spam filter. An analyst opens the Microsoft 365 Defender portal to investigate. Which component provides a detailed entity view of the email including delivery actions, phish simulation details, and campaign information?

Mitigate threats using Microsoft Defender XDR

Microsoft Defender for Office 365 (Threat Explorer)

Threat Explorer in Microsoft Defender for Office 365 (Microsoft 365 Defender portal) allows security analysts to investigate emails, see delivery actions, identify phishing campaigns, and view simulation data. Other options are for different workloads: Defender for Endpoint focuses on endpoints, Defender for Identity on user identities, and Defender for Cloud Apps on cloud application activities.

2

A security operations analyst is reviewing recommendations in Microsoft Defender for Cloud. For a virtual machine that is missing critical security updates, which recommendation category will highlight this issue?

Mitigate threats using Microsoft Defender for Cloud

Secure score

Secure score recommendations in Defender for Cloud include findings for missing system updates, misconfigurations, and other vulnerabilities that affect your security posture. Workload protections focus on threat detection, not missing updates. Regulatory compliance shows compliance standards, and Inventory lists resources.

3

A security operations analyst is creating a scheduled analytics rule in Microsoft Sentinel to detect brute force attempts on Microsoft Entra ID authentication. Which data source is most appropriate for this rule?

Mitigate threats using Microsoft Sentinel

SigninLogs

SigninLogs from Microsoft Entra ID contain authentication details including failed attempts, timestamps, and user information, which are essential for detecting brute force patterns. Azure Activity Logs are for management plane operations, Office Activity Logs are for Office 365 workloads, and SecurityEvent is for Windows security logs.

4

A phishing email was delivered to several users. The analyst wants to find all messages in the campaign, see delivery actions, and perform remediation from the Microsoft 365 Defender portal. Which tool should they use?

Threat Explorer.

Threat Explorer in Defender for Office 365 supports campaign investigation, message details, delivery actions, and remediation workflows for email threats.

5

A security analyst in Microsoft Defender for Cloud receives an alert that an Azure VM has a vulnerability with a high severity. The analyst wants to see the detailed finding, including the steps to remediate. Which blade or page should the analyst open?

Vulnerability Assessment findings

Vulnerability assessment findings provide detailed information about discovered vulnerabilities, including severity, CVSS score, and remediation steps. Secure Score is a higher-level aggregation. Regulatory compliance shows compliance status. Workload protections alerts cover security alerts (e.g., suspicious processes), not vulnerability scan results.

6

A company uses Microsoft Defender for Cloud to protect an Azure Kubernetes Service (AKS) cluster. The security team wants to receive security alerts about suspicious activities within the cluster, such as a container running with root privileges or attempts to read sensitive host paths. Which Defender for Cloud plan must be enabled to generate these alerts?

Defender for Containers

The Defender for Containers plan in Microsoft Defender for Cloud provides threat detection for AKS clusters, including runtime threat protection, vulnerability assessment, and security alerts for suspicious activities like privileged containers, host path mounts, and crypto-mining. The Defender for Servers plan (Option A) covers virtual machines and servers, not containers. Defender for Cloud Apps (Option C) is for SaaS applications. Defender for SQL (Option D) covers database servers. Therefore, enabling the Defender for Containers plan is required.

7

A security analyst is configuring Microsoft Sentinel scheduled analytics rules to detect brute-force attacks on Microsoft Entra ID. Arrange the steps in the correct order from first to last.

Create a query using KQL to count failed sign-ins. → Set the rule schedule (run every 5 minutes). → Set the alert threshold (e.g., >5 failed sign-ins from same IP in 5 minutes). → Define incident properties (title, severity, tactics). → Configure grouping settings to group alerts into incidents.

The correct order for creating a scheduled analytics rule in Microsoft Sentinel is: first create the KQL query that filters and aggregates events; then configure the schedule (how often the query runs); then set the alert threshold (e.g., >5 failed sign-ins); then define incident properties (title, severity, tactics); and finally configure grouping settings to group alerts into incidents. This ensures the rule is built logically.

8

An organization uses Microsoft 365 Defender. A security analyst is investigating a malware incident on a user's device. The automated investigation and response (AIR) has already isolated the device from the network. The analyst now needs to collect a copy of a specific suspicious file from the device for further analysis. Which action should the analyst initiate from the device's entity page?

Collect investigation package

The 'Collect investigation package' action gathers forensic data from the device, including suspicious files, processes, and registry keys. This package can be downloaded for analysis. 'Run antivirus scan' (Option B) will initiate a scan but not collect specific files. 'Restrict app execution' (Option C) limits running applications. 'Initiate a live response session' (Option D) allows interactive investigation and file collection, but the question asks for a specific action to collect a copy of a file. The 'Collect investigation package' is a specific action that automatically collects relevant files and artifacts. However, if the analyst needs a specific file, they might use live response. But the more direct built-in action for collecting suspicious files is 'Collect investigation package'. Given the scenario, the best answer is 'Collect investigation package' because it is a single-click action that gathers evidence including the suspicious file.

9

An organization uses Microsoft 365 Defender. An automated investigation on a device has determined that a file is malicious and has been blocked. The analyst wants to verify that the file was blocked and see the action taken (e.g., block, allow). Which entity page provides this information?

File entity page

The file entity page in Microsoft 365 Defender shows the file's reputation, detection details, and the actions taken by automated investigations (e.g., block, allow, quarantine). The device page shows device-level actions. The user page shows user-related incidents. The email page is for email entities.

10

A security analyst receives an alert in Microsoft Defender for Cloud about a suspicious process on an Azure VM. The alert indicates a potential credential dumping tool. The analyst needs to see the full command line and parent process of the suspicious process. Which Defender for Cloud feature should the analyst use?

Live Response

Live Response allows analysts to remotely connect to a machine and run commands to gather forensic data, including process details like command line and parent process. Fileless attack detection is a detection capability, not an investigation tool. Just-In-Time VM access manages network access. Adaptive application controls define allowed applications but do not provide process visibility.

11

A company has multiple Azure subscriptions managed by Microsoft Defender for Cloud with enhanced security features enabled. The security team wants to ensure that all Azure SQL Servers have Advanced Data Security (ADS) enabled, including Vulnerability Assessment. They decide to use Azure Policy to enforce this at scale. Which built-in policy initiative should they assign to achieve this?

Azure Security Benchmark

The 'Azure Security Benchmark' (formerly Azure Security Benchmark) initiative includes policies covering many security controls, including the requirement to enable Advanced Data Security on SQL servers. However, the specific built-in initiative that groups SQL security configurations is the 'Azure Security Benchmark' (initiative ID: 1f3afdf9-d0c9-4c3d-847f-89da540e8a24). The 'Microsoft cloud security benchmark' is the newer name. Option A, 'Enable Azure Monitor for VMs', is not correct because it focuses on virtual machines, not SQL. Option C, 'Deploy Diagnostics Settings for SQL Databases', is a single policy, not a full initiative. Option D, 'Enable Advanced Threat Protection for SQL servers', is also a single policy effect, but the question asks for an initiative. The Azure Security Benchmark initiative includes the policy 'Advanced data security should be enabled on your SQL servers' and 'Vulnerability assessment should be enabled on your SQL servers'.

12

A company has multiple Azure subscriptions under a management group. They want to ensure that all VMs across all subscriptions have Microsoft Defender for Cloud's vulnerability assessment solution (using the Microsoft Defender Vulnerability Management engine) enabled. They also want to automatically remediate any non-compliant VMs by enabling the VA solution when a VM is missing it. Which combination of policy initiatives and automation should they use?

Assign the 'Configure machines to receive a vulnerability assessment provider' policy with 'DeployIfNotExists' effect and set it to auto-remediate at the management group-level scope.

The built-in Azure policy 'Configure machines to receive a vulnerability assessment provider' with DeployIfNotExists effect automatically installs the VA agent on VMs that do not have it. Assigning this at the management group level covers all current and future subscriptions. The Azure Security Benchmark initiative only includes an audit policy for VA, not automatic remediation. Custom runbooks or automation accounts are not necessary when the DeployIfNotExists policy can handle it natively.

13

A company has Azure virtual machines running Windows Server. The security team wants to use Microsoft Defender for Cloud's vulnerability assessment solution to identify missing security updates. Which of the following is required to enable built-in vulnerability assessment for VMs?

Enable Defender for Servers plan

The built-in vulnerability assessment in Defender for Cloud is part of the Defender for Servers plan. When enabled, Defender for Cloud automatically deploys the Qualys vulnerability assessment agent to supported VMs without manual intervention. Installing the Log Analytics agent is not required for this feature; it uses a dedicated extension. The vulnerability assessment solution from Marketplace is a third-party alternative, not the built-in one. Regulatory compliance dashboard is a separate feature.

14

A company uses Microsoft Defender for Cloud and wants to automatically remediate non-compliant Azure resources by deploying missing configurations (e.g., enabling diagnostics when not enabled). Which feature should they enable?

Azure Policy's DeployIfNotExists effect

Azure Policy's 'DeployIfNotExists' effect can automatically deploy a configuration if the resource is missing it. Defender for Cloud leverages this effect within its built-in initiatives to automatically fix non-compliant resources.

15

A company uses Microsoft Defender for Cloud and wants to automatically ensure that all Azure virtual machines have a specific security configuration baseline applied (e.g., default password policies). Which Defender for Cloud feature should they leverage to audit and enforce these configurations inside the VMs?

Azure Policy Guest Configuration

Azure Policy Guest Configuration (now called Guest Configuration) can audit settings inside VMs and, using the 'DeployIfNotExists' effect, automatically deploy a baseline configuration. Defender for Cloud integrates with this to provide recommendations for VM compliance.

16

A company runs SQL Server on Azure Virtual Machines (IaaS). They want to enable Advanced Threat Protection (ATP) for these instances to detect SQL injection attempts. What must they do first?

Enable Azure Defender for SQL on the server

For SQL IaaS, ATP is enabled via Azure Defender for SQL, which requires the Azure SQL IaaS Agent extension and the SQL servers to be registered with the SQL IaaS resource provider. Enabling Defender for Servers provides host-level security but not SQL-specific ATP. Manual auditing does not provide the built-in detection. Therefore, enabling Azure Defender for SQL at the server level is the prerequisite action.

17

A company wants to continuously assess the compliance of their Azure resources against the CIS (Center for Internet Security) benchmark. Which Microsoft Defender for Cloud feature should they use?

Regulatory compliance dashboard

The regulatory compliance dashboard in Defender for Cloud provides continuous assessment against various compliance standards, including CIS benchmarks. You can add the CIS benchmark as a policy initiative to track compliance. The security score measures your overall security posture but not specific benchmarks. Azure Policy is the underlying engine used by the dashboard, but the dashboard itself is the feature. Workload protections are for threat detection.

18

A Defender for Cloud alert repeatedly fires for a known test VM used by the security team. The alert type is valid, but it should not create noise for that VM. What should the analyst configure?

Create an alert suppression rule scoped to the test VM and alert type.

Alert suppression rules can automatically dismiss alerts that match specific criteria such as resource/entity and alert type.

19

A company wants to enable vulnerability scanning for Azure virtual machines using the integrated Microsoft Defender Vulnerability Management solution. What is the first step?

Enable the 'Servers' plan in Defender for Cloud.

The integrated vulnerability assessment is enabled by turning on the 'Servers' plan in Microsoft Defender for Cloud's environment settings. This automatically deploys the Defender Vulnerability Management solution to supported VMs.

20

A company uses Microsoft Defender for Cloud to protect Azure virtual machines. The security team receives an alert indicating that a VM is communicating with a known malicious IP address. Which Defender for Cloud feature can be used to automatically block outbound traffic to that IP address by adjusting the network security group (NSG)?

Adaptive network hardening

Adaptive network hardening in Microsoft Defender for Cloud uses machine learning to analyze traffic patterns and recommends tightening NSG rules. When enabled, it can automatically apply rules to block malicious outbound traffic. Adaptive application controls allowlist applications, Just-In-Time VM access controls inbound RDP/SSH, and File Integrity Monitoring tracks changes to critical files.

21

A cloud security administrator needs to ensure that all Azure virtual machines have the Microsoft Defender for Cloud agent (Log Analytics agent) installed automatically when they are provisioned. Which configuration should be set in Microsoft Defender for Cloud?

Enable auto-provisioning in the Defender for Cloud environment settings.

In Microsoft Defender for Cloud, auto-provisioning is a setting that enables automatic installation of the Log Analytics agent on new and existing VMs. It is configured in the 'Environment settings' under the specific subscription. When enabled, Defender for Cloud will deploy the agent to any supported Azure VM. Azure Policy can also enforce agent installation, but auto-provisioning is the native mechanism within Defender for Cloud. Azure Automation runbooks can be used but require custom scripting. Update Management is unrelated to agent deployment.

SC-200 flashcards by domain

The SC-200 flashcard bank covers all 3 official blueprint domains published by Microsoft. Cards are distributed proportionally, so domains with higher exam weight have more cards.

Domain Coverage

Mitigate threats using Microsoft Defender XDR

~1 cards%

Mitigate threats using Microsoft Defender for Cloud

~1 cards%

Mitigate threats using Microsoft Sentinel

~1 cards%

Flashcards vs practice tests: which is better for SC-200?

Both flashcards and practice questions are evidence-based study tools. The difference is in what they train:

Flashcards — concept retention

Best for memorising definitions, acronyms, protocol behaviours, command syntax, and conceptual distinctions. Use flashcards to build the foundational vocabulary that SC-200 questions assume you know.

Best in: weeks 1–3

Practice tests — application

Best for applying concepts to realistic scenarios, eliminating distractors, and building exam stamina.SC-200 questions test scenario reasoning — not just recall — so practice tests are essential.

Best in: weeks 3–6

The most effective SC-200 study plan combines both: use flashcards for the first 2–3 weeks to build conceptual foundations, then shift to practice tests and mock exams in the final 2–3 weeks to apply and benchmark that knowledge. Most candidates who pass on their first attempt use both tools.

SC-200 flashcards — frequently asked questions

Are the SC-200 flashcards free?

Yes — all SC-200 flashcards on Courseiva are completely free, no account required. Every card includes the question, correct answer, and a full explanation. Create a free account to track which cards you have studied and get spaced repetition recommendations.

How many SC-200 flashcards are on Courseiva?

Courseiva has 300+ original SC-200 flashcards across all 3 exam blueprint domains. New cards are added regularly as the question bank grows. All cards are written by certified engineers against the official Microsoft exam objectives.

How are Courseiva flashcards different from Anki or Quizlet?

Courseiva flashcards are purpose-built for IT certification exams. Unlike generic flashcard platforms where content quality varies, every Courseiva card is mapped to the official SC-200 exam blueprint, written by engineers who hold the certification, and includes a full explanation of the correct answer and why the distractors are wrong. This explanation quality is what separates genuine learning from rote memorisation.

Can I use SC-200 flashcards offline?

Courseiva is a web platform — an internet connection is required. For offline study, we recommend creating free Courseiva account, using the platform in your browser, and using your device's offline capabilities if your browser supports offline web apps.

Free forever · No credit card required

Track your SC-200 flashcard progress

Save your results, see which domains need more work, and get spaced repetition recommendations — all free.

Sign Up Free

Free forever · Every certification included