A company needs to share sensitive data securely with external partners. What is the best Azure solution?
AAzure Blob Storage
BAzure VPN Gateway
CAzure Data Share
DAzure Functions
Explanation
Azure Data Share enables secure data sharing with external parties, unlike the other options which do not focus on data sharing directly.
Q12
You are configuring Azure Policies for a subscription. What happens when a non-compliant resource is detected?
AIt is automatically deleted
BIt is flagged for review
CIt is modified to meet compliance
DIt remains unchanged
Explanation
Non-compliant resources are flagged for review, rather than deleted or automatically modified.
Q13
Which Azure service provides DDoS protection to applications?
AAzure DDoS Protection
BAzure Traffic Manager
CAzure Application Gateway
DAzure Monitor
Explanation
Azure DDoS Protection specifically mitigates DDoS attacks; other options serve different traffic management and monitoring roles.
Q14
A company needs to apply different security policies based on data classifications. Which Azure service should they use?
AAzure Security Center
BAzure Information Protection
CAzure Sentinel
DAzure Key Vault
Explanation
Azure Information Protection enables classification and protection of data based on its sensitivity, unlike the other services.
Q15
What happens when you configure Azure AD Conditional Access to block access based on user risk?
AAll users are denied access.
BHigh-risk users are allowed access.
CLow-risk users face challenges.
DHigh-risk users are denied access.
Explanation
Conditional Access denies access for high-risk users to maintain security, while the other options misrepresent user access outcomes.
Q16
Which service provides centralized security management in Azure?
AMicrosoft Defender for Cloud
BAzure Monitor
CAzure Application Insights
DAzure DDoS Protection
Explanation
Microsoft Defender for Cloud centralizes security management; others serve different purposes.
Q17
A company needs to protect their Azure resources from unauthorized access. What should they implement?
AService Fabric
BNetwork Security Groups
CAzure Logic Apps
DAzure Functions
Explanation
Network Security Groups limit access; others do not provide access control.
Q18
You are configuring an Azure Active Directory (AAD) tenant. What happens when you enable user assignment for an application?
AAll users gain access automatically
BOnly assigned users can access
CAccess is denied for all users
DApplication is deleted
Explanation
Enabling user assignment restricts access to designated users; others are incorrect since they misrepresent access management.
Q19
Which service provides Azure's identity protection capabilities?
AAzure Active Directory
BAzure Key Vault
CAzure DevOps
DAzure Security Center
Explanation
Azure Active Directory provides identity protection features, while the others focus on different functionalities.
Q20
A company needs to ensure that sensitive information is only accessible to authorized users in Azure. What should they implement?
ANetwork Security Groups
BRole-Based Access Control
CAzure Firewall
DAzure Virtual Network
Explanation
Role-Based Access Control (RBAC) manages users' permissions effectively, while the others focus on network security rather than access the data layer.