Explanation
Deleted branches are recoverable if the commits exist in another branch; other options present misconceptions about branch deletion.
Q22
Which Azure service allows for real-time data ingestion and processing?
AStream Analytics
BData Lake Storage
CLogic Apps
DAzure Functions
Explanation
Stream Analytics is specifically designed for real-time data analysis, while the others serve different functions like storage or automation.
Q23
A company needs to securely manage access to Azure resources. Which service should they implement?
AAzure Key Vault
BAzure Policy
CAzure Active Directory
DNetwork Security Groups
Explanation
Azure Active Directory provides identity and access management, unlike the other options which focus on different security or management aspects.
Q24
What happens when you assign a user the 'Reader' role in Azure?
AUser can delete resources.
BUser can only view resources.
CUser can modify resources.
DUser can create new resources.
Explanation
The 'Reader' role allows only viewing permissions, while the other options imply higher levels of access.
Q25
Which Azure service is used for orchestrating and managing workflows?
AAzure Logic Apps
BAzure Functions
CAzure App Service
DAzure Storage
Explanation
Azure Logic Apps automates workflows while other options serve different functions.
Q26
A company needs to secure its sensitive data in Azure. Which feature should they use?
AAzure Blob Storage
BAzure Key Vault
CAzure DevOps
DAzure CDN
Explanation
Azure Key Vault is specifically designed for storing sensitive data securely.
Q27
You are configuring role-based access in Azure. What happens if two roles provide conflicting permissions?
AThe most permissive role prevails
BThe least permissive role prevails
CAccess is denied entirely
DThe roles cancel each other out
Explanation
In Azure RBAC, the most permissive role defines effective permissions.
Q28
Which service allows for serverless computing in Azure?
AAzure Functions
BAzure Compute
CAzure VMs
DAzure Kubernetes
Explanation
Azure Functions is designed for serverless computing, while the others are for infrastructure management.
Q29
A company needs to securely store secrets for its Azure application. Which service should they use?
AAzure Blob Storage
BAzure Key Vault
CAzure SQL Database
DAzure Storage Accounts
Explanation
Azure Key Vault is specifically built for storing secrets securely, unlike the other storage options.
Q30
You are configuring Azure Active Directory (AD) for users to register devices. What must you enable?
ASelf-service password reset
BDevice registration
CMulti-factor authentication
DConditional access policies
Explanation
Device registration must be enabled for user device registration, while the others don't directly relate to this configuration.