A company needs to enforce compliance on device configurations. What should the administrator use?
AAzure Security Center
BIntune Compliance Policies
CAzure Sentinel
DAzure Policy
Explanation
Intune Compliance Policies are specifically designed for device configurations, unlike the others.
Q12
You are configuring role-based access control in Azure. What happens when you assign a user the 'Reader' role?
AUser can modify resources.
BUser can only view resources.
CUser can delete resources.
DUser can add new resources.
Explanation
The 'Reader' role allows viewing only, restricting alterations or deletions.
Q13
Which Azure service offers insights into security vulnerabilities?
AAzure Security Center
BAzure Storage
CAzure Active Directory
DAzure Monitor
Explanation
Azure Security Center provides tools for security management, while the others focus on storage, identity, or performance monitoring.
Q14
You are configuring Azure Endpoint Security. What happens when you enable attack surface reduction?
ABlocks all Windows Firewall rules
BReduces risk of malware execution
CIncreases CPU usage significantly
DDisables antivirus software
Explanation
Enabling attack surface reduction helps mitigate threat risks, unlike the other options which incorrectly suggest detrimental effects.
Q15
A company needs a solution for managing device compliance. Which Azure feature should they use?
AIntune Compliance Policies
BAzure Resource Manager
CVirtual Network Peering
DAzure Monitor Alerts
Explanation
Intune Compliance Policies specifically manage device compliance, while the others serve different purposes.
Q16
Which service in Azure allows secure file sharing via SMB?
AAzure Files
BBlob Storage
CAzure Disks
DData Lake Storage
Explanation
Azure Files provides SMB share functionality, while others do not support this directly.
Q17
A company needs to deploy a new Windows 10 application to all devices in its Azure AD tenant. What is the most efficient way to ensure all users can access it?
AUse Microsoft Intune
BDeploy via direct download
CHost on Azure Web Apps
DUse Remote Desktop
Explanation
Microsoft Intune provides streamlined deployment for applications to managed devices.
Q18
What happens when you configure Azure AD Conditional Access to require MFA for certain users?
AAll users must use MFA
BOnly specific users must use MFA
CNo users can access without MFA
DMFA is enforced only for admins
Explanation
Conditional Access allows targeted MFA enforcement based on user configurations, not all users.
Q19
Which Azure service is best for managing user identities?
AAzure Active Directory
BAzure Firewall
CAzure Storage
DAzure Virtual Machines
Explanation
Azure Active Directory manages user identities, while the others serve different purposes.
Q20
A company needs to implement multi-factor authentication (MFA) for its users. Which method can be used for MFA in Azure?
APassword only
BPhone call or text
CToken generation only
DBiometrics alone
Explanation
Phone calls or texts are methods supported by Azure MFA, whereas the others do not provide complete MFA solutions.