A company needs to restrict access to sensitive data in Azure Storage. Which feature should they configure?
AEncryption at rest
BRole-Based Access Control (RBAC)
CMulti-Factor Authentication (MFA)
DPrivate Link
Explanation
RBAC allows precise access control over resources; the other options address different aspects of security.
Q132
What happens when an Azure Security Center recommendation is marked as 'resolved'?
AIt automatically deletes the resource
BIt stops monitoring the resource
CIt acknowledges the issue is fixed
DIt disables the resource temporarily
Explanation
Marking it 'resolved' acknowledges that the security recommendation has been addressed; the other options imply unwanted actions.
Q133
Which Azure service provides a unified security management system?
AMicrosoft Defender for Cloud
BAzure Log Analytics
CAzure Advisor
DAzure Security Center
Explanation
Microsoft Defender for Cloud is the unified security management system, while the others serve different purposes in security and monitoring.
Q134
A company needs to implement identity protection. Which feature should they use?
AAzure Active Directory Identity Protection
BAzure Key Vault Access Policies
CAzure Information Protection Labels
DAzure Policy Assignments
Explanation
Azure Active Directory Identity Protection specifically addresses identity security, while the other options focus on access control or information classification.
Q135
You are configuring Azure Security Center recommendations. What happens if you select "Ignore" on a specific recommendation?
AThe recommendation will be removed.
BYou will not get alerts on it.
CIt will be documented for future audits.
DNo further recommendations related will appear.
Explanation
Ignoring a recommendation suppresses alerts about it, while the other options incorrectly suggest permanent removal or documentation actions.
Q136
Which Azure service provides advanced threat protection for virtual networks?
AAzure Security Center
BAzure Firewall
CAzure DDoS Protection
DAzure Sentinel
Explanation
Azure Security Center provides overall threat protection and compliance management, while the others serve specific roles in network security.
Q137
A company needs to enforce Conditional Access policies for cloud applications. What Azure component should they leverage?
AAzure AD Identity Protection
BAzure AD Privileged Identity Management
CAzure AD Conditional Access
DAzure AD B2C
Explanation
Azure AD Conditional Access directly enforces access policies; the others focus on different aspects of identity management.
Q138
What happens when you configure Azure Policy to audit resources, but not enforce compliance?
ANon-compliant resources are deleted
BNon-compliant resources remain unaffected
CResources are automatically tagged
DCompliance reports are not generated
Explanation
Auditing allows for monitoring non-compliant resources without enforcement actions, unlike deletion or tagging.
Q139
Which Azure service provides threat protection for SQL databases?
AAzure Defender for SQL
BAzure Policy
CAzure Monitor
DAzure Firewall
Explanation
Azure Defender for SQL helps protect databases against threats, unlike the others which serve different purposes.
Q140
A company needs to ensure that users only access the minimum necessary resources. Which Azure feature would they implement?
ARBAC (Role-Based Access Control)
BAzure Blob Storage
CAzure Key Vault
DVirtual Network
Explanation
RBAC ensures minimum necessary access, unlike the other options that provide different functionalities.