A company needs to restrict access to a storage account to only specific IP ranges. What should they configure?
AFirewall rules
BUser roles
CNetwork Security Groups
DService endpoints
Explanation
Firewall rules allow specific IP range restrictions, while other options do not primarily serve this purpose.
Q72
What happens when you enable Microsoft Defender for Cloud on a resource group?
AAll existing alerts are deleted
BSecurity recommendations are provided
CCosts increase immediately
DAccess to all users is revoked
Explanation
Enabling Microsoft Defender for Cloud provides security recommendations; the other options wrongly suggest adverse effects.
Q73
Which Azure service provides an integrated development environment for building applications?
AAzure DevOps
BAzure Functions
CAzure App Service
DAzure Blob Storage
Explanation
Azure DevOps provides tools for collaboration and application development, unlike the other options which serve different purposes.
Q74
A company needs to ensure sensitive data is encrypted both in transit and at rest in Azure. What should they implement?
ANetwork Security Groups
BAzure Disk Encryption
CAzure Key Vault
DAzure Firewall
Explanation
Azure Disk Encryption directly encrypts data at rest, while the other options focus on protection and access control.
Q75
What happens when an Azure Security Center security policy is set to 'Audit'?
ANon-compliance resources are blocked.
BResources will be automatically remediated.
CAlerts are generated for non-compliance.
DPolicies have no effect.
Explanation
The 'Audit' setting allows monitoring by generating alerts, whereas blocking or auto-remediation occurs under stricter policies.
Q76
Which service provides a central point for access management?
AAzure Active Directory
BAzure Blob Storage
CAzure Functions
DAzure Virtual Machines
Explanation
Azure Active Directory is designed for identity and access management, while the others are service offerings with different functionalities.
Q77
A company needs to ensure continuous compliance with data protection regulations. What should they implement?
AAzure Policy
BAzure Backup
CAzure Monitor
DAzure Archive Storage
Explanation
Azure Policy allows enforcement of compliance rules, while the others support data recovery or monitoring functions but not compliance management.
Q78
What happens when a user is added to an Azure role that grants access to resources?
AAccess is granted immediately
BAccess is scheduled
CAccess requires verification
DAccess is logged only
Explanation
Access is granted immediately when the role assignment is applied, while the others incorrectly suggest delays or conditions.
Q79
Which Azure service provides unified monitoring and management for resources?
AAzure Monitor
BAzure Functions
CAzure Blob Storage
DAzure SQL Database
Explanation
Azure Monitor provides comprehensive resource monitoring, whereas the others serve different functions.
Q80
A company needs to simulate a cyber-attack for training. Which Azure service should they use?
AAzure Sentinel
BAzure Security Center
CAzure DDoS Protection
DMicrosoft Defender for Cloud
Explanation
Azure Security Center offers secure assessments and simulations, unlike the others which have different focuses.