Microsoft Azure

Microsoft Cybersecurity Architect

SC-100
Popular Trending

Become a Microsoft Cybersecurity Architect by passing the SC-100 exam.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 91–100 of 147

Q91

Which service allows you to centrally manage Azure resources and policies?

  • A Azure Policy
  • B Azure App Service
  • C Azure Functions
  • D Azure SQL Database
Explanation Azure Policy is designed for management and governance, while the others provide specific functionalities.
Q92

A company needs to secure Azure VMs from external attacks. What should be configured?

  • A Azure Firewall
  • B VM encryption
  • C Dedicated Host
  • D Resource Locks
Explanation Azure Firewall controls traffic and secures Azure resources, while the others serve different purposes.
Q93

What happens when you assign an Azure role to a user at the resource group level?

  • A Access to all resources granted
  • B Access limited to that resource group
  • C No access changes occur
  • D Role applies to child resources only
Explanation The role grants access only to the specified resource group, not beyond it.
Q94

Which service provides automated security assessments for Azure resources?

  • A Azure Security Center
  • B Azure Monitor
  • C Azure Firewall
  • D Azure Sentinel
Explanation Azure Security Center conducts automated security assessments, while others do not specialize in security assessments.
Q95

A company needs to restrict access to its Azure Storage Account to only specific virtual networks. What should you use?

  • A Shared Access Signatures
  • B Network Security Groups
  • C Private Endpoints
  • D Storage Account Keys
Explanation Private Endpoints create secure connections, while others do not provide network-level access restriction.
Q96

What happens when you enable Azure Policy on a subscription?

  • A Existing resources are automatically compliant
  • B Non-compliant resources are deleted immediately
  • C Since policies are enforced at scale
  • D Compliance status is reported over time
Explanation Enabling Azure Policy reports compliance over time, rather than immediate actions on resources.
Q97

Which Azure service is best for centralized logging?

  • A Azure Monitor
  • B Azure SQL Database
  • C Azure Functions
  • D Azure Blob Storage
Explanation Azure Monitor provides centralized logging, while the others serve different purposes.
Q98

A company needs to implement role-based access control for its Azure resources. What is the first step?

  • A Assign user roles
  • B Define resource groups
  • C Create permissions
  • D Define roles and scopes
Explanation Defining roles and scopes is essential before assigning them.
Q99

You are configuring Azure Key Vault and encounter an Access Policy configuration. What happens if a policy grants 'Get' permissions to a secret?

  • A Cannot retrieve the secret.
  • B Can retrieve the secret only.
  • C Can modify the secret.
  • D Can delete the secret.
Explanation 'Get' permission allows retrieving secrets, not modifying or deleting them.
Q100

Which service provides real-time threat detection in Azure?

  • A Azure Security Center
  • B Azure Monitor
  • C Azure Logic Apps
  • D Azure DevOps
Explanation Azure Security Center specializes in threat detection, while others serve different functionalities.