Microsoft Azure

GitHub Administration

GH-100

Learn GitHub administration skills with the GH-100 exam.

141 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 21–30 of 141

Q21

What happens when you delete a GitHub branch?

  • A All commits are lost
  • B The branch is recoverable
  • C Only unmerged commits are lost
  • D It violates repository integrity
Explanation Deleted branches are recoverable if the commits exist in another branch; other options present misconceptions about branch deletion.
Q22

Which Azure service allows for real-time data ingestion and processing?

  • A Stream Analytics
  • B Data Lake Storage
  • C Logic Apps
  • D Azure Functions
Explanation Stream Analytics is specifically designed for real-time data analysis, while the others serve different functions like storage or automation.
Q23

A company needs to securely manage access to Azure resources. Which service should they implement?

  • A Azure Key Vault
  • B Azure Policy
  • C Azure Active Directory
  • D Network Security Groups
Explanation Azure Active Directory provides identity and access management, unlike the other options which focus on different security or management aspects.
Q24

What happens when you assign a user the 'Reader' role in Azure?

  • A User can delete resources.
  • B User can only view resources.
  • C User can modify resources.
  • D User can create new resources.
Explanation The 'Reader' role allows only viewing permissions, while the other options imply higher levels of access.
Q25

Which Azure service is used for orchestrating and managing workflows?

  • A Azure Logic Apps
  • B Azure Functions
  • C Azure App Service
  • D Azure Storage
Explanation Azure Logic Apps automates workflows while other options serve different functions.
Q26

A company needs to secure its sensitive data in Azure. Which feature should they use?

  • A Azure Blob Storage
  • B Azure Key Vault
  • C Azure DevOps
  • D Azure CDN
Explanation Azure Key Vault is specifically designed for storing sensitive data securely.
Q27

You are configuring role-based access in Azure. What happens if two roles provide conflicting permissions?

  • A The most permissive role prevails
  • B The least permissive role prevails
  • C Access is denied entirely
  • D The roles cancel each other out
Explanation In Azure RBAC, the most permissive role defines effective permissions.
Q28

Which service allows for serverless computing in Azure?

  • A Azure Functions
  • B Azure Compute
  • C Azure VMs
  • D Azure Kubernetes
Explanation Azure Functions is designed for serverless computing, while the others are for infrastructure management.
Q29

A company needs to securely store secrets for its Azure application. Which service should they use?

  • A Azure Blob Storage
  • B Azure Key Vault
  • C Azure SQL Database
  • D Azure Storage Accounts
Explanation Azure Key Vault is specifically built for storing secrets securely, unlike the other storage options.
Q30

You are configuring Azure Active Directory (AD) for users to register devices. What must you enable?

  • A Self-service password reset
  • B Device registration
  • C Multi-factor authentication
  • D Conditional access policies
Explanation Device registration must be enabled for user device registration, while the others don't directly relate to this configuration.