Microsoft Azure
Endpoint Administrator
MD-102
Demonstrate your skills as an Endpoint Administrator with the MD-102 exam.
150 questions
0 views
Free
Questions 61–70 of 150
Which Azure service provides identity management and access control?
-
A
Azure Active Directory
-
B
Azure Blob Storage
-
C
Azure DevOps
-
D
Azure Traffic Manager
Explanation
Azure Active Directory handles identity and access; the others serve different roles.
A company needs to ensure all Azure VMs are monitored and automatically scaled during peak usage. Which service would help achieve this?
-
A
Azure Monitor
-
B
Azure Automation
-
C
Azure Advisor
-
D
Azure Logic Apps
Explanation
Azure Monitor provides insights and auto-scaling; the others don’t directly scale resources.
You are configuring an Azure security policy. What happens when a policy definition is not assigned to any scope?
-
A
It is applied globally.
-
B
It remains inactive.
-
C
It generates a warning.
-
D
It automatically assigns itself.
Explanation
A non-assigned policy remains inactive; the others imply incorrect behaviors.
Which service provides endpoint management for Azure devices?
-
A
Microsoft Intune
-
B
Azure DevOps
-
C
Azure Functions
-
D
Azure Blob Storage
Explanation
Microsoft Intune manages endpoints, while others focus on different functionalities.
A company needs to enforce specific security policies across all devices. Which solution offers this capability?
-
A
Azure Active Directory
-
B
Microsoft Defender for Endpoint
-
C
Microsoft Endpoint Configuration Manager
-
D
Windows Autopilot
Explanation
Microsoft Endpoint Configuration Manager enforces security policies effectively, unlike the others.
What happens when a device is marked as compliant in Intune?
-
A
Access is automatically blocked
-
B
User data is wiped
-
C
Azure AD will grant access
-
D
Device settings are reset
Explanation
Compliant devices receive access; blocking occurs for non-compliance.
Which service should you use to manage compliance with data policies in Azure?
-
A
Azure Policy
-
B
Azure Backup
-
C
Azure Monitor
-
D
Azure Active Directory
Explanation
Azure Policy helps enforce organizational standards; others serve different purposes.
A company needs to restrict access to Azure resources based on role requirements. What is the best approach?
-
A
Use Resource Groups
-
B
Implement Role-Based Access Control
-
C
Enable Azure Traffic Manager
-
D
Set Virtual Network Peering
Explanation
Role-Based Access Control (RBAC) allows granular access according to roles; others are not designed for access management.
What happens when you enable an Azure Conditional Access policy for an application?
-
A
All users can access the app
-
B
Access is controlled based on conditions
-
C
App becomes publicly accessible
-
D
Log-in is bypassed for efficiency
Explanation
Conditional Access enforces access based on specific conditions; others misinterpret the app's access behavior.
Which Azure service enables secure access to on-premises applications?
-
A
Azure Virtual Network
-
B
Azure VPN Gateway
-
C
Azure Application Gateway
-
D
Azure ExpressRoute
Explanation
Azure VPN Gateway secures remote connectivity; the others focus on different networking functions.