A company needs to ensure users can only access Azure resources based on need-to-know. What should they implement?
ARBAC
BVNet Peering
CAzure Policies
DNSGs
Explanation
Role-Based Access Control (RBAC) restricts access effectively for this need.
Q102
You are configuring Azure Sentinel for security incident management. What happens when a new integration is added?
AIt automatically resolves all alerts
BData ingestion might increase
CNo change occurs
DAll existing alerts are archived
Explanation
New integrations typically lead to increased data flow into Sentinel.
Q103
Which Azure service provides distributed denial-of-service (DDoS) protection?
AAzure DDoS Protection
BAzure CDN
CAzure Firewall
DAzure VPN Gateway
Explanation
Azure DDoS Protection is specifically designed to mitigate DDoS attacks, while the others serve different purposes.
Q104
A company needs to audit changes made in Azure subscriptions. Which feature should they implement?
AAzure Policy
BAzure Monitor
CAzure Activity Log
DAzure Security Center
Explanation
Azure Activity Log provides a record of subscription activity, while the others focus on compliance or security assessments.
Q105
You are configuring role-based access control (RBAC) for a storage account and want to limit access to only reading data. Which role should you assign?
AStorage Account Contributor
BStorage Blob Data Reader
CStorage Blob Data Owner
DStorage Blob Data Contributor
Explanation
The Storage Blob Data Reader role allows read access only, while the others grant broader permissions or write access.
Q106
Which Azure service provides real-time threat detection and response?
AMicrosoft Sentinel
BAzure Monitor
CMicrosoft Intune
DAzure Load Balancer
Explanation
Microsoft Sentinel is designed for threat detection, while the others serve different purposes.
Q107
A company needs to securely share Azure data with external partners. Which feature should they use?
APublic IP address
BManaged Identity
CAzure Shared Access Signatures
DVNet Peering
Explanation
Azure Shared Access Signatures allow secure data sharing, unlike the others which do not focus on sharing data securely.
Q108
You are configuring Azure AD Identity Protection. What happens when a risky sign-in is detected?
AUser is immediately locked out
BUser must provide additional verification
CUser's password is changed
DNo action is taken
Explanation
When a risky sign-in is detected, additional verification is required, unlike the other options which do not align with Azure AD's functionality.
Q109
Which Azure service can help monitor and analyze security alerts?
AAzure Sentinel
BAzure Functions
CAzure Logic Apps
DAzure DevOps
Explanation
Azure Sentinel provides security management and analytics, while the other services serve different purposes.
Q110
You are configuring Azure Firewall rules for a company. What should you ensure regarding rule precedence?
AAllow all rules first
BHigher numbered rules take priority
CLower numbered rules take priority
DRule order is not relevant
Explanation
Azure Firewall processes rules from lowest to highest numbered that matches traffic, contrary to A, B, and D.