A company has multiple Azure subscriptions and wants centralized security management. Which feature should they use?
AAzure AD Hierarchy
BAzure Policy Management
CAzure Management Groups
DAzure Security Center
Explanation
Azure Management Groups allow management of subscriptions, while the others do not specifically centralize security management.
Q112
Which service automates the deployment of applications in Azure?
AAzure DevOps
BAzure Virtual Machines
CAzure Blob Storage
DAzure Active Directory
Explanation
Azure DevOps provides CI/CD for applications, while the others serve different functions.
Q113
A company needs to secure its Azure resources using role-based access control (RBAC). What is the first step?
AAssign roles to users
BCreate user accounts
CDefine resource groups
DChoose subscription types
Explanation
Defining resource groups is necessary before roles can be effectively assigned.
Q114
What happens when you enable Azure DDoS Protection Standard on a virtual network?
AIt blocks all traffic to resources
BIt provides only network monitoring
CIt automatically scales network resources
DIt offers DDoS attack mitigation
Explanation
Enabling DDoS Protection Standard provides dedicated DDoS attack mitigation, which the others do not.
Q115
Which Azure service offers an API for application security testing?
AAzure Security Center
BAzure API Management
CAzure DevOps
DAzure Functions
Explanation
Azure Security Center provides security recommendations including application assessments, while the others focus on APIs or DevOps workflows.
Q116
A company needs real-time threat detection for its Azure resources. Which service should they use?
AAzure Firewall
BAzure Sentinel
CAzure DDoS Protection
DAzure VPN Gateway
Explanation
Azure Sentinel provides intelligent security analytics and threat intelligence, unlike the other options which serve different purposes.
Q117
What happens when you enable Azure Defender for a resource group?
AOnly selected resource types are protected.
BAll resources in the group are automatically protected.
CDefender monitors network traffic only.
DProtection applies after 24 hours.
Explanation
Enabling Azure Defender for a resource group applies protection to all resources within it immediately, as opposed to limiting selection or delaying activation.
Q118
Which Azure service is used for threat detection in applications?
AAzure Security Center
BAzure Active Directory
CAzure Monitor
DAzure Application Insights
Explanation
Azure Application Insights provides performance monitoring and can detect threats, whereas the others focus on different security or monitoring aspects.
Q119
A company needs to implement a hold on messages for compliance reasons in Azure. Which feature allows this functionality?
ARetention Policies
BIn-Place Hold
CAzure Backup
DData Loss Prevention
Explanation
In-Place Hold effectively retains messages for compliance, unlike retention policies, which do not hold but may delete at a set time.
Q120
You are configuring an Azure Firewall policy. What happens when you set a rule to 'Deny' for a particular protocol?
ATraffic is allowed for that protocol
BAll traffic is logged
CTraffic is blocked based on the rule
DOnly some traffic is blocked
Explanation
A 'Deny' rule explicitly blocks traffic, while the other options suggest allowing or logging traffic incorrectly.