A company needs to comply with GDPR and must ensure data residency in Europe. Which service feature should they utilize?
ARegional services deployment
BAzure AD Premium
CGlobal subscription
DCross-region resource sharing
Explanation
Utilizing regional services deployment ensures data stays within specified geographic boundaries; the other options do not directly address data residency.
Q72
What happens when you configure a network security group (NSG) rule with 'DenyAll' at the subnet level?
AAccess is blocked for all VMs
BTraffic is logged but allowed
COnly inbound traffic is denied
DOnly outbound traffic is denied
Explanation
A 'DenyAll' NSG rule blocks all incoming and outgoing traffic at that level; the others suggest incorrect effects or limited scope.
Q73
Which Azure service is primarily used for managing user identities?
AAzure Active Directory
BAzure Blob Storage
CAzure Functions
DAzure Virtual Network
Explanation
Azure Active Directory manages identities, while others serve different purposes.
Q74
A company needs to ensure that all data traffic to Azure services is encrypted. Which feature should they enable?
AAzure ExpressRoute
BEnd-to-end encryption
CNetwork Security Groups
DApplication Gateway
Explanation
End-to-end encryption ensures all traffic is secure, while others focus on isolation or filtering.
Q75
What happens when an Azure Policy is assigned a resource group but is set to deny 'Microsoft.Sql/servers/write'?
ASQL servers can be created.
BSQL servers can be updated.
CSQL servers cannot be created.
DSQL servers can be deleted.
Explanation
The policy explicitly denies the creation of SQL servers, preventing any new instances.
Q76
Which service provides centralized logging for Azure resources?
AAzure Log Analytics
BAzure Blob Storage
CAzure Functions
DAzure Data Lake
Explanation
Azure Log Analytics allows for consolidation and analysis of logs from various Azure services, while the other options serve different purposes.
Q77
A company needs to restrict access to specific resources based on user location. What should they implement?
AAzure Security Center
BCondition Access Policies
CNetwork Security Groups
DAzure AD Roles
Explanation
Conditional Access Policies can restrict access based on user attributes like location, while the other options do not specifically offer location-based restrictions.
Q78
What happens when you set a key vault secret's 'content type' to 'application/json'?
ALimits secret value to JSON only
BAllows secret to be accessed via REST
CNo effect on usage
DChanges encryption method
Explanation
Setting the content type to 'application/json' does not restrict its usage, while the other options incorrectly interpret its effects.
Q79
Which service provides advanced threat protection for Azure resources?
AAzure Sentinel
BAzure Firewall
CAzure Policy
DAzure Load Balancer
Explanation
Azure Sentinel offers intelligent security analytics, while the others focus on networking or policy governance.
Q80
A company needs to identify which users access Azure resources during suspicious hours. Which Azure feature should they use?
AAzure Monitor
BAzure Security Center
CAzure AD Sign-In Logs
DAzure Key Vault
Explanation
Azure AD Sign-In Logs provide detailed user access logs, while the others serve different purposes.