Microsoft Azure

Microsoft Cybersecurity Architect

SC-100
Popular Trending

Become a Microsoft Cybersecurity Architect by passing the SC-100 exam.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 81–90 of 147

Q81

What happens when you enable Azure AD Identity Protection on your tenant?

  • A Users are immediately locked out
  • B Risk policies are applied automatically
  • C Only administrators receive alerts
  • D Alerts are disabled for all users
Explanation Enabling Identity Protection applies risk policies automatically, while the other options misrepresent the functionality.
Q82

Which Azure service provides a serverless computing environment?

  • A Azure Functions
  • B Azure Virtual Machines
  • C Azure Blob Storage
  • D Azure SQL Database
Explanation Azure Functions allows execution of code without managing infrastructure, while other options involve provisioning resources or data storage.
Q83

A company needs to ensure confidential data is shared securely with partners. What should they implement?

  • A Public links to shared folders
  • B Azure Storage Access Tiers
  • C Azure Data Share
  • D Azure Monitoring Alerts
Explanation Azure Data Share provides a secure way to share data, while other options lack specific secure sharing capabilities.
Q84

What happens when a user's Azure Active Directory account is disabled?

  • A User can still log in
  • B User loses all access immediately
  • C User can access only email
  • D User's permissions become limited
Explanation Disabling an account revokes all access; other options incorrectly describe account functionalities post-disablement.
Q85

Which Azure service provides DDoS protection?

  • A Azure DDoS Protection
  • B Azure Firewall
  • C Azure Security Center
  • D Azure Sentinel
Explanation Azure DDoS Protection specifically mitigates DDoS attacks; others are for different security purposes.
Q86

A company needs to ensure sensitive data is encrypted at rest and in transit in Azure Blob Storage. What should they use?

  • A Azure Blob encryption settings
  • B Azure Key Vault only
  • C Network Security Groups
  • D Azure Active Directory
Explanation Azure Blob encryption settings provide encryption at both states, while the others do not ensure both requirements.
Q87

What happens when an Azure Policy is assigned to a scope?

  • A Enforce compliance with regulations
  • B Remove existing resources automatically
  • C Ensure resources are created only
  • D Monitor compliance only
Explanation Assigned Azure Policies enforce compliance, whereas the others do not fully describe the policy function.
Q88

Which Azure service provides DDoS protection?

  • A Azure DDoS Protection
  • B Azure Firewall
  • C Azure Security Center
  • D Azure CDN
Explanation Azure DDoS Protection specifically mitigates DDoS attacks, while others serve different security purposes.
Q89

A company needs to ensure user access is based on the least privilege model. What should they implement?

  • A Role-Based Access Control
  • B Multi-Factor Authentication
  • C Network Security Groups
  • D Firewalls
Explanation Role-Based Access Control enforces access based on assigned roles, essential for least privilege.
Q90

What happens when you enable Azure Policy for a subscription?

  • A Resources become immutable
  • B Policies start evaluating resources
  • C Compliance scores are reset
  • D Budget alerts are triggered
Explanation Enabling Azure Policy causes instant evaluation of resources against assigned policies.