A company needs to secure their API endpoints. What must they configure?
AApplication Gateway HTTPS settings
BWeb Application Firewall rules
CAzure Blob permissions
DVirtual Network Integration
Explanation
Web Application Firewall rules are essential for securing API endpoints against threats.
Q102
What happens when you exceed your Azure subscription limit for resources?
AThe resources get deleted automatically
BYou cannot create new resources
CYou are charged extra fees
DYour account is suspended
Explanation
Exceeding the subscription limit prevents you from creating additional resources until limits are resolved.
Q103
Which service allows you to automate CI/CD pipelines?
AAzure DevOps
BAzure Functions
CAzure Logic Apps
DAzure Blob Storage
Explanation
Azure DevOps provides comprehensive CI/CD capabilities, while the other options serve different purposes.
Q104
A company needs to ensure sensitive data in GitHub is accessible only to certain team members. What should they configure?
AProtected branches
BCollaborator access
CRepository visibility
DWebhook integration
Explanation
Protected branches prevent unauthorized changes to key branches, thereby enhancing data security more effectively than the other options.
Q105
What happens when you enable branch protection rules on a repository?
AMerges are always allowed
BPushes are always blocked
CSpecific policies are enforced
DOpen pull requests are deleted
Explanation
Branch protection rules enforce specific policies like required reviews, unlike the other options that are incorrect.
Q106
Which Azure service is used for deploying Docker containers?
AAzure Kubernetes Service
BAzure Blob Storage
CAzure Redis Cache
DAzure Functions
Explanation
Azure Kubernetes Service (AKS) facilitates container orchestration, whereas the others serve different purposes.
Q107
A company needs to automate the testing of their application before deployment. Which Azure service should they use?
AAzure DevOps Pipelines
BAzure Monitor
CAzure Functions
DAzure Storage
Explanation
Azure DevOps Pipelines enables CI/CD processes, automating tests; the others do not focus on automation.
Q108
What happens when an Azure Virtual Network is deleted?
AAll subnet configurations are deleted
BAssigned public IPs remain intact
CVMs continue to operate normally
DNetwork security groups stay active
Explanation
Deleting a Virtual Network removes all related subnets; the other options remain unaffected.
Q109
Which service allows you to store and manage secrets securely in Azure?
AAzure Key Vault
BAzure Blob Storage
CAzure SQL Database
DAzure Data Lake
Explanation
Azure Key Vault is specifically designed to manage secrets, while the other options are used for data storage.
Q110
A company needs to ensure its web application can scale automatically based on traffic load. Which Azure service would best meet this requirement?
AAzure Functions
BAzure App Service
CAzure Virtual Machines
DAzure Kubernetes Service
Explanation
Azure App Service provides built-in auto-scaling features suitable for web applications, whereas the other services require more manual configuration or are not primarily for web apps.