Which service allows you to manage device policies in Azure?
AMicrosoft Intune
BAzure Backup
CAzure Monitor
DAzure Active Directory
Explanation
Microsoft Intune is directly designed for managing device policies, while the others are for different purposes.
Q122
A company needs to enforce MFA for all admin accounts. Which Azure feature should they implement?
AConditional Access
BAzure Security Center
CLog Analytics
DAzure Information Protection
Explanation
Conditional Access policies enable enforcement of MFA, whereas the others serve different security functions.
Q123
What happens when a user is removed from a Dynamic Group in Azure AD?
AUser remains in group
BUser is deleted from Azure AD
CUser loses access to resources
DUser is manually notified
Explanation
Removing a user will revoke their access to resources tied to that group, while the others are incorrect consequences.
Q124
Which service provides a secure way to manage application secrets in Azure?
AAzure Key Vault
BAzure Storage
CAzure Functions
DAzure Traffic Manager
Explanation
Azure Key Vault securely stores and manages keys, secrets, and certificates; other options serve different purposes.
Q125
A company needs to configure a baseline policy for device compliance in Intune; which compliance policy should they leverage?
ADevice Configuration Policy
BDevice Compliance Policy
CApp Protection Policy
DEndpoint Protection Policy
Explanation
Device Compliance Policies specifically enforce compliance conditions, while others focus on different areas.
Q126
What happens when you assign a user a role in Azure AD?
AThey gain elevated permissions immediately
BThey can log in without MFA
CThey receive an email confirmation
DAccess to resources based on role
Explanation
Assigning a role grants permissions to resources based on that role; other options misrepresent results of role assignment.
Q127
A company needs to deploy a Windows application across multiple devices. Which tool should they use for automation?
AMicrosoft Endpoint Manager
BAzure Blob Storage
CAzure Resource Manager
DAzure Virtual Machines
Explanation
Microsoft Endpoint Manager facilitates application deployment across devices, while the other options serve different purposes.
Q128
What happens when a user device fails to meet compliance policies in Azure AD?
ADevice is retained with monitoring
BDevice is auto-enrolled into remediation
CAccess to company resources is blocked
DDevice will be wiped remotely
Explanation
Access will be blocked until compliance is achieved, while the other options do not align with Azure AD policy enforcement.
Q129
You are configuring a virtual machine in Azure. What is the default network security group rule for outbound traffic?
ADeny all outbound traffic
BAllow all outbound traffic
CAllow only HTTP traffic
DAllow only ICMP traffic
Explanation
By default, outbound traffic is allowed, while the other options incorrectly represent Azure's security rules.
Q130
A company needs to restrict access to resources based on user location. Which Azure service should they use?
AConditional Access
BAzure Sentinel
CAzure Firewall
DAzure Blob Storage
Explanation
Conditional Access allows access restrictions based on user conditions, making it ideal for geo-restrictions; the other services do not provide this functionality.