What happens when an Azure Key Vault is deleted but recovery enabled?
AIt is permanently deleted immediately.
BAll secrets become unrecoverable.
CIt enters a soft-delete state.
DRecovery cannot be performed afterward.
Explanation
Deleting the Key Vault enters a soft-delete state, allowing recovery, whereas the other options are incorrect scenarios.
Q82
Which Azure service is designed for secure file storage?
AAzure Blob Storage
BAzure Functions
CAzure SQL Database
DAzure Cosmos DB
Explanation
Azure Blob Storage specifically addresses unstructured data storage and security. The other options serve different primary functions.
Q83
A company needs to limit access to secrets in Azure Key Vault. What should you implement?
AManaged Identities
BNetwork Security Groups
CAzure Policy
DAzure Monitor
Explanation
Managed Identities help control access securely to the Key Vault. The other options are related to network access and monitoring.
Q84
What happens when a user enables Azure Disk Encryption but the VM's managed disks are not supported?
AEncryption fails and reports an error
BEncryption proceeds with reduced performance
CVM automatically switches to unmanaged disks
DEncryption completes without issues
Explanation
If the disks are unsupported, the encryption process fails, and an error is generated. The other options imply incorrect behaviors that do not occur.
Q85
Which service is used for centralized key management in Azure?
AAzure Key Vault
BAzure Firewall
CAzure Monitor
DAzure Blob Storage
Explanation
Azure Key Vault centralizes key management; others are unrelated.
Q86
A company needs to restrict application access based on user roles. Which Azure feature should they use?
AAzure Active Directory
BNetwork Security Groups
CAzure Logic Apps
DAzure Functions
Explanation
Azure Active Directory manages user roles and access; others do not provide role-based access.
Q87
What happens when a user accesses an Azure resource without valid permissions?
AAccess granted, permission logged
BAccess denied, error message shown
CPermission request sent automatically
DResource accessed without restriction
Explanation
Access is denied when permissions are invalid; other options suggest incorrect behavior.
Q88
Which Azure service provides advanced threat protection for VMs?
AAzure Security Center
BAzure Monitor
CAzure Advisor
DAzure Network Watcher
Explanation
Azure Security Center offers comprehensive security management, while others provide different functionalities.
Q89
A company needs to limit user access to Azure resources based on geographic location. What should they implement?
AAzure Role-Based Access Control
BAzure Policy
CConditional Access
DNetwork Security Groups
Explanation
Conditional Access can enforce restrictions based on user location; others do not provide that capability directly.
Q90
You are configuring a virtual network in Azure. What happens when you associate a network security group (NSG) with the subnet?
AAll internal traffic is blocked
BInbound and outbound rules apply
CNSG applies to VMs only
DOnly inbound rules take effect
Explanation
NSG rules apply to both inbound and outbound traffic at the subnet level; the other options misrepresent NSG behavior.