A company needs to restrict access to a Web App only to users authenticated via corporate Active Directory. What should they implement?
AAzure AD App Registration
BAzure Firewall
CAzure Front Door
DAzure DDoS Protection
Explanation
Azure AD App Registration will allow you to integrate corporate Active Directory for user authentication; the other options do not offer this functionality.
Q12
What happens when a virtual machine's network interface is removed, but the public IP remains?
AVM is still accessible
BPublic IP is deleted
CVM becomes inaccessible
DNetwork resources are allocated
Explanation
Removing the network interface disconnects the VM from the network, making it inaccessible; the public IP remains but is not connected to any interface.
Q13
Which Azure service provides advanced threat protection for workloads?
AAzure Defender
BAzure Monitor
CAzure Backup
DAzure Traffic Manager
Explanation
Azure Defender offers enhanced security against threats while other services focus on different functions.
Q14
You are configuring access control for an Azure Resource Group. What should you use to grant specific permissions to a user?
AAzure Policy
BRole-Based Access Control (RBAC)
CNetwork Security Groups
DAzure Blueprints
Explanation
RBAC assigns specific roles and permissions, while others serve different governance or security purposes.
Q15
What happens when you delete a resource group in Azure?
AResources are retained until restored
BAll resources within it are deleted
COnly tags associated are deleted
DUsage is automatically migrated
Explanation
Deleting a resource group removes it and all contained resources, unlike other options which do not fully apply.
Q16
Which Azure service can provide advanced threat protection for databases?
AAzure Defender for SQL
BAzure Monitor
CAzure Security Center
DAzure Key Vault
Explanation
Azure Defender for SQL offers advanced threat protection; others do not focus specifically on database security.
Q17
A company needs to enforce conditional access policies for their Azure environment. What should they use?
AAzure Firewall
BAzure Active Directory
CAzure VPN Gateway
DAzure NSG
Explanation
Azure Active Directory provides conditional access; the others do not manage user access policies directly.
Q18
You are configuring an NSG for an Azure virtual network. What will happen if there are conflicting rules?
ATop-down approach applied.
BBottom-up approach applied.
CDeny rules take precedence.
DAllow rules take precedence.
Explanation
NSG rules are evaluated in a top-down manner; application of deny or allow is based on that order.
Q19
Which Azure service provides network security groups?
AAzure Network Security
BAzure Virtual Network
CAzure Storage Accounts
DAzure Resource Manager
Explanation
Azure Network Security is responsible for network security groups; other options do not provide this functionality.
Q20
A company needs to securely manage secrets across applications. Which Azure service should they use?
AAzure Key Vault
BAzure Blob Storage
CAzure DevOps
DAzure Active Directory
Explanation
Azure Key Vault is designed for managing secrets; the other services focus on different functionalities.