You are configuring an Azure Virtual Network and need to allow on-premises devices to connect. What should you implement?
AVirtual Gateway
BExpressRoute
CVPN Gateway
DApplication Gateway
Explanation
A VPN Gateway is specifically designed to enable secure remote connections to Azure from on-premises; other options do not serve this purpose.
Q132
What happens when you delete a Recovery Services vault in Azure?
AData is immediately erased
BLinked resources automatically delete
CVault becomes inactive only
DVault remains but unusable
Explanation
Data backed up to the vault is erased upon deletion, as the vault's primary function is to store that data; the other options misrepresent the implications of deletion.
Q133
Which service allows you to manage devices within an organization?
AAzure Active Directory
BIntune
CAzure Automation
DMicrosoft Defender
Explanation
Intune specifically manages devices; the others do not focus on device management.
Q134
A company needs to restrict access to Azure resources based on user roles. What should they implement?
AAzure Backup
BRole-Based Access Control
CVirtual Network
DAzure Monitor
Explanation
Role-Based Access Control (RBAC) is designed for restricting access based on roles; the others do not provide this function.
Q135
What happens when you enable auto-upgrade for an Azure VM?
AVM will automatically be deleted.
BVM will be upgraded on schedule.
CVM configurations will be reset.
DVM updates will be declined.
Explanation
Enabling auto-upgrade allows the VM to receive scheduled updates automatically; the other options are incorrect.
Q136
Which Azure service manages role-based access control (RBAC)?
AAzure Active Directory
BAzure Key Vault
CAzure Storage Accounts
DAzure DevOps
Explanation
Azure Active Directory provides RBAC for resource access.
Q137
A company needs to ensure that sensitive data is encrypted at rest in Azure. What should they use?
AAzure Disk Encryption
BAzure Backup
CManaged Identities
DAzure Virtual Network
Explanation
Azure Disk Encryption specifically encrypts data at rest.
Q138
You are configuring Intune for a group of users. What happens when a user’s device is non-compliant?
ADevice will be approved automatically
BUser can bypass compliance check
CUser may lose access to resources
DDevice remains unaffected by policies
Explanation
Non-compliant devices may have limited access to corporate resources.
Q139
Which Azure service is primarily used for monitoring and analyzing security posture across multiple cloud services?
AAzure Security Center
BAzure Monitor
CAzure Sentinel
DAzure Log Analytics
Explanation
Azure Security Center provides security recommendations and analysis, while other options focus on monitoring or logging.
Q140
A company needs to ensure that all endpoints are automatically updated with the latest Windows features and security patches. What should they configure?
AWindows Update for Business
BAzure Site Recovery
CIntune Device Compliance
DAzure Virtual Desktop
Explanation
Windows Update for Business manages updates centrally, while other options do not control endpoint updates directly.