Microsoft Azure
Microsoft Cybersecurity Architect
SC-100
Popular Trending
Become a Microsoft Cybersecurity Architect by passing the SC-100 exam.
147 questions
0 views
Free
Questions 91–100 of 147
Which service allows you to centrally manage Azure resources and policies?
-
A
Azure Policy
-
B
Azure App Service
-
C
Azure Functions
-
D
Azure SQL Database
Explanation
Azure Policy is designed for management and governance, while the others provide specific functionalities.
A company needs to secure Azure VMs from external attacks. What should be configured?
-
A
Azure Firewall
-
B
VM encryption
-
C
Dedicated Host
-
D
Resource Locks
Explanation
Azure Firewall controls traffic and secures Azure resources, while the others serve different purposes.
What happens when you assign an Azure role to a user at the resource group level?
-
A
Access to all resources granted
-
B
Access limited to that resource group
-
C
No access changes occur
-
D
Role applies to child resources only
Explanation
The role grants access only to the specified resource group, not beyond it.
Which service provides automated security assessments for Azure resources?
-
A
Azure Security Center
-
B
Azure Monitor
-
C
Azure Firewall
-
D
Azure Sentinel
Explanation
Azure Security Center conducts automated security assessments, while others do not specialize in security assessments.
A company needs to restrict access to its Azure Storage Account to only specific virtual networks. What should you use?
-
A
Shared Access Signatures
-
B
Network Security Groups
-
C
Private Endpoints
-
D
Storage Account Keys
Explanation
Private Endpoints create secure connections, while others do not provide network-level access restriction.
What happens when you enable Azure Policy on a subscription?
-
A
Existing resources are automatically compliant
-
B
Non-compliant resources are deleted immediately
-
C
Since policies are enforced at scale
-
D
Compliance status is reported over time
Explanation
Enabling Azure Policy reports compliance over time, rather than immediate actions on resources.
Which Azure service is best for centralized logging?
-
A
Azure Monitor
-
B
Azure SQL Database
-
C
Azure Functions
-
D
Azure Blob Storage
Explanation
Azure Monitor provides centralized logging, while the others serve different purposes.
A company needs to implement role-based access control for its Azure resources. What is the first step?
-
A
Assign user roles
-
B
Define resource groups
-
C
Create permissions
-
D
Define roles and scopes
Explanation
Defining roles and scopes is essential before assigning them.
You are configuring Azure Key Vault and encounter an Access Policy configuration. What happens if a policy grants 'Get' permissions to a secret?
-
A
Cannot retrieve the secret.
-
B
Can retrieve the secret only.
-
C
Can modify the secret.
-
D
Can delete the secret.
Explanation
'Get' permission allows retrieving secrets, not modifying or deleting them.
Which service provides real-time threat detection in Azure?
-
A
Azure Security Center
-
B
Azure Monitor
-
C
Azure Logic Apps
-
D
Azure DevOps
Explanation
Azure Security Center specializes in threat detection, while others serve different functionalities.