Microsoft Azure
Microsoft Cybersecurity Architect
SC-100
Popular Trending
Become a Microsoft Cybersecurity Architect by passing the SC-100 exam.
147 questions
0 views
Free
Questions 31–40 of 147
Which service provides real-time protection against threats?
-
A
Microsoft Defender for Identity
-
B
Azure Files
-
C
Azure Data Lake
-
D
Azure App Services
Explanation
Microsoft Defender for Identity offers real-time threat protection, while the other options focus on storage or hosting.
A company needs to monitor user sign-ins for anomalies. Which Azure service should they use?
-
A
Azure Activity Log
-
B
Azure Monitor
-
C
Azure AD Identity Protection
-
D
Azure Security Center
Explanation
Azure AD Identity Protection specifically monitors sign-ins for anomalies; the other services serve broader or different purposes.
You are configuring a new Azure Security Policy. What will happen if you set the policy to 'Audit' mode?
-
A
Non-compliant resources will be deleted
-
B
Alerts will be generated for non-compliance
-
C
Automatic remediation will occur
-
D
No changes are reported or taken
Explanation
'Audit' mode generates alerts without enforcing changes, unlike deletion or automatic remediation.
Which Azure service should a company use for real-time threat detection?
-
A
Azure Sentinel
-
B
Azure Blob Storage
-
C
Azure Functions
-
D
Azure Kubernetes Service
Explanation
Azure Sentinel is designed for threat detection, while the others serve different functions.
A company needs to manage access permissions across multiple Azure subscriptions. What should they use?
-
A
Azure RBAC
-
B
Azure AD Groups
-
C
Azure Policy
-
D
Azure Key Vault
Explanation
Azure RBAC controls access at subscription level; others do not.
What happens when a data redundancy option is not selected for Azure Storage?
-
A
Data is lost permanently
-
B
Default redundancy is applied
-
C
Service is unavailable
-
D
Data transfer is slowed down
Explanation
Azure applies default redundant storage settings if none are specified; others are incorrect outcomes.
Which Azure service is primarily used for DDoS protection?
-
A
Azure DDoS Protection
-
B
Azure Firewall
-
C
Azure VPN Gateway
-
D
Azure Security Center
Explanation
Azure DDoS Protection specifically mitigates DDoS attacks, while other services serve different purposes.
A company needs to monitor and manage identities across Azure and on-premises resources. Which Azure feature should they implement?
-
A
Azure Active Directory
-
B
Azure Policy
-
C
Azure Sentinel
-
D
Azure Key Vault
Explanation
Azure Active Directory efficiently manages identities across environments, unlike the other options.
You are configuring an Azure function that should have a minimum privilege to access a storage account. What should you assign?
-
A
Storage Blob Data Owner
-
B
Storage Blob Data Contributor
-
C
Storage Blob Data Reader
-
D
Storage Account Contributor
Explanation
Storage Blob Data Reader provides read-only access, adhering to the principle of least privilege.
What Azure service helps to protect applications from DDoS attacks?
-
A
Azure DDoS Protection
-
B
Azure Security Center
-
C
Azure Firewall
-
D
Azure Active Directory
Explanation
Azure DDoS Protection specifically mitigates DDoS attacks, while others focus on different security aspects.