Microsoft Azure

Microsoft Cybersecurity Architect

SC-100
Popular Trending

Become a Microsoft Cybersecurity Architect by passing the SC-100 exam.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 61–70 of 147

Q61

Which Azure service provides real-time threat detection?

  • A Azure Security Center
  • B Azure Blob Storage
  • C Azure Kubernetes Service
  • D Azure Active Directory
Explanation Azure Security Center offers advanced threat protection, while others focus on storage, orchestration, or identity management.
Q62

A company needs to restrict access to critical data for certain users. What feature should they implement?

  • A Network Security Groups
  • B Azure Role-Based Access Control
  • C Azure Firewall
  • D Azure Logic Apps
Explanation Azure Role-Based Access Control (RBAC) allows precise access management, while the others do not specifically restrict data access granularity.
Q63

You are configuring a security policy for Azure Cognitive Services. What happens when you set it to 'whitelist' certain IP addresses?

  • A All IPs can access the service
  • B Only whitelisted IPs can access
  • C Only non-whitelisted IPs can access
  • D Service becomes publicly accessible
Explanation Whitelisting specifically allows access only to designated IPs, while the other options contradict this function.
Q64

Which Azure service provides distributed denial-of-service (DDoS) protection?

  • A Azure DDoS Protection
  • B Azure Firewall
  • C Azure Application Gateway
  • D Azure Security Center
Explanation Azure DDoS Protection specifically mitigates DDoS attacks, while other services provide different security functions.
Q65

A company needs to ensure that only specific users can access Azure resources. Which feature should they implement?

  • A Resource Locks
  • B Role-Based Access Control (RBAC)
  • C Azure Policy
  • D Azure Blueprints
Explanation RBAC allows precise access control, while others serve different purposes like compliance or resource management.
Q66

You are configuring Azure Sentinel; what happens when a new data connector is added?

  • A Data stops flowing to Sentinel
  • B Historical data is integrated
  • C Real-time data begins collecting
  • D Alerts are automatically created
Explanation Adding a data connector initiates real-time data ingestion, while other options do not occur automatically.
Q67

Which service is used for centralized logging in Azure?

  • A Azure Monitor
  • B Azure Functions
  • C Azure Active Directory
  • D Azure Virtual Network
Explanation Azure Monitor offers centralized logging capabilities, while the others serve different functions.
Q68

A company wants to prevent data exfiltration on Azure Blob Storage. What feature should they implement?

  • A Shared Access Signatures
  • B Azure Policy
  • C Storage Account Firewall
  • D Data Encryption
Explanation The Storage Account Firewall controls access to prevent data exfiltration, unlike the other options.
Q69

You are configuring Azure AD Identity Protection. What happens when a risk is detected?

  • A User is directly deleted
  • B User must reset password
  • C No immediate action taken
  • D User assigned additional roles
Explanation Upon detecting a risk, the user is prompted to reset their password, while other options are incorrect actions.
Q70

Which service provides advanced threat protection for virtual machines?

  • A Microsoft Defender for Cloud
  • B Azure Security Center
  • C Azure Monitor
  • D Azure Firewall
Explanation Microsoft Defender for Cloud integrates security management and threat protection for VMs; the others focus on different functions.