A company needs to restrict access to resources based on the role of a user. Which Azure feature should they implement?
ANetwork Security Groups
BRole-Based Access Control (RBAC)
CAzure AD Identity Protection
DAzure Firewall
Explanation
Role-Based Access Control (RBAC) specifically restricts access based on roles, while the others serve different security functionalities.
Q102
What happens when you enable Managed Identity for an Azure resource?
AResource gets a new IP address.
BProvides an identity to authenticate with Azure services.
CEncrypts the resource's data at rest.
DChanges the resource's location.
Explanation
Enabling Managed Identity gives your resource a unique identity for Azure service authentication, whereas the others do not apply.
Q103
Which service helps protect Azure resources from DDoS attacks?
AAzure DDoS Protection
BAzure Firewall
CAzure Security Center
DAzure Application Gateway
Explanation
Azure DDoS Protection specifically mitigates DDoS attacks, while others serve different security functions.
Q104
A company needs to prevent unauthorized access to sensitive data in Azure Blob Storage. What should they implement?
AAzure RBAC
BVNet Peering
CNetwork Security Groups
DAzure Load Balancer
Explanation
Azure RBAC granularity helps enforce access controls, while others do not directly manage permissions.
Q105
You are configuring Azure Sentinel. What happens when an alert is triggered with a high severity level?
AAlert is ignored
BInvestigation recommended
CAutomatic remediation occurs
DAlert closes automatically
Explanation
High severity alerts prompt a recommendation for further investigation, while others imply incorrect assumptions about automation or oversight.
Q106
Which service provides unified security tools for Azure?
AAzure Security Center
BAzure Active Directory
CAzure Monitor
DAzure DevOps
Explanation
Azure Security Center offers centralized security management, while others serve different purposes.
Q107
A company needs to restrict VPN access to certain Azure resources. Which feature should they use?
ANetwork Security Groups
BAzure Firewall
CRole-Based Access Control
DPrivileged Identity Management
Explanation
Network Security Groups allow traffic control, while others manage permissions or identities.
Q108
What happens when an Azure AD user tries to access a resource without appropriate MFA?
AAccess is granted immediately
BUser is prompted for MFA
CAccess is granted after delay
DUser is logged out
Explanation
Users must provide MFA to access resources when required, while the other options misrepresented the access flow.
Q109
Which Azure service provides global distribution of applications?
AAzure Front Door
BAzure Functions
CAzure VM Scale Sets
DAzure Data Lake Storage
Explanation
Azure Front Door offers global application distribution; the others do not specialize in this.
Q110
A company needs to ensure that only users in the HR department can access sensitive employee data stored in Azure Storage. What should you implement?
AShared Access Signatures
BAzure RBAC
CNetwork Security Groups
DAzure Key Vault
Explanation
Azure RBAC allows role-based access control for users; others do not manage access in the same way.