Microsoft Azure

Microsoft Security Operations Analyst

SC-200
Popular

Validate your skills with the SC-200 exam for Microsoft Security Operations Analyst.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 111–120 of 147

Q111

What happens when you enable 'Azure Active Directory Identity Protection'?

  • A Strengthens password policies.
  • B Identifies potential vulnerabilities.
  • C Monitors risky user behavior.
  • D Handles user provisioning automatically.
Explanation It specifically monitors and responds to risky behaviors, while the other options do not reflect its primary function.
Q112

Which Azure service helps manage compliance with regulations?

  • A Azure Policy
  • B Azure Blob Storage
  • C Azure Functions
  • D Azure Load Balancer
Explanation Azure Policy enforces compliance through rules, while the others have different primary functions.
Q113

A company needs to protect data and prevent unauthorized access. What approach should they implement?

  • A Identity and Access Management
  • B Backup and Disaster Recovery
  • C Application Performance Monitoring
  • D API Management
Explanation Identity and Access Management secures data access, while others focus on performance or recovery.
Q114

You are configuring Conditional Access policies for your organization. What happens when a user's access is denied by an invoked policy?

  • A User can reattempt access
  • B Access is permanently blocked
  • C User is redirected to help
  • D Access is allowed without restrictions
Explanation Users can reattempt, but if repeatedly denied, they might require additional steps to access.
Q115

Which service can be used for log analytics in Azure Sentinel?

  • A Azure Monitor
  • B Azure Storage
  • C Azure SQL Database
  • D Azure DevOps
Explanation Azure Monitor provides insights and analytics for logs, making it suitable for Azure Sentinel.
Q116

A company needs to deploy threat detection for Azure resources. What should they use?

  • A Azure Defender
  • B Azure Firewall
  • C Azure Load Balancer
  • D Azure Backup
Explanation Azure Defender offers threat protection for Azure resources, which is essential for security.
Q117

What happens when you enable Azure Disk Encryption on a virtual machine?

  • A VM is automatically backed up
  • B Data is encrypted at rest
  • C VM scales automatically
  • D Network traffic is encrypted
Explanation Azure Disk Encryption encrypts the virtual machine's disks, ensuring data is encrypted at rest.
Q118

Which Microsoft Azure service is best for real-time threat detection and response?

  • A Azure Sentinel
  • B Azure Blob Storage
  • C Azure Functions
  • D Azure App Service
Explanation Azure Sentinel provides security information and event management (SIEM) capabilities, while the others serve different functions.
Q119

A company needs to securely monitor their Azure resources. What should they implement?

  • A Azure Policy
  • B Azure Security Center
  • C Azure Monitor
  • D Azure Automation
Explanation Azure Security Center offers features for monitoring security postures, whereas others have different primary functions.
Q120

What happens when an Azure Firewall policy is applied to multiple Firewalls?

  • A Policies merge with individual settings
  • B Only the latest policy applies
  • C It causes a configuration error
  • D Each firewall uses its own policy only
Explanation Policies can be shared and settings are merged; the other options either misinterpret the behavior or suggest errors.