Microsoft Azure
Microsoft Security Operations Analyst
SC-200
Popular
Validate your skills with the SC-200 exam for Microsoft Security Operations Analyst.
147 questions
0 views
Free
Questions 111–120 of 147
What happens when you enable 'Azure Active Directory Identity Protection'?
-
A
Strengthens password policies.
-
B
Identifies potential vulnerabilities.
-
C
Monitors risky user behavior.
-
D
Handles user provisioning automatically.
Explanation
It specifically monitors and responds to risky behaviors, while the other options do not reflect its primary function.
Which Azure service helps manage compliance with regulations?
-
A
Azure Policy
-
B
Azure Blob Storage
-
C
Azure Functions
-
D
Azure Load Balancer
Explanation
Azure Policy enforces compliance through rules, while the others have different primary functions.
A company needs to protect data and prevent unauthorized access. What approach should they implement?
-
A
Identity and Access Management
-
B
Backup and Disaster Recovery
-
C
Application Performance Monitoring
-
D
API Management
Explanation
Identity and Access Management secures data access, while others focus on performance or recovery.
You are configuring Conditional Access policies for your organization. What happens when a user's access is denied by an invoked policy?
-
A
User can reattempt access
-
B
Access is permanently blocked
-
C
User is redirected to help
-
D
Access is allowed without restrictions
Explanation
Users can reattempt, but if repeatedly denied, they might require additional steps to access.
Which service can be used for log analytics in Azure Sentinel?
-
A
Azure Monitor
-
B
Azure Storage
-
C
Azure SQL Database
-
D
Azure DevOps
Explanation
Azure Monitor provides insights and analytics for logs, making it suitable for Azure Sentinel.
A company needs to deploy threat detection for Azure resources. What should they use?
-
A
Azure Defender
-
B
Azure Firewall
-
C
Azure Load Balancer
-
D
Azure Backup
Explanation
Azure Defender offers threat protection for Azure resources, which is essential for security.
What happens when you enable Azure Disk Encryption on a virtual machine?
-
A
VM is automatically backed up
-
B
Data is encrypted at rest
-
C
VM scales automatically
-
D
Network traffic is encrypted
Explanation
Azure Disk Encryption encrypts the virtual machine's disks, ensuring data is encrypted at rest.
Which Microsoft Azure service is best for real-time threat detection and response?
-
A
Azure Sentinel
-
B
Azure Blob Storage
-
C
Azure Functions
-
D
Azure App Service
Explanation
Azure Sentinel provides security information and event management (SIEM) capabilities, while the others serve different functions.
A company needs to securely monitor their Azure resources. What should they implement?
-
A
Azure Policy
-
B
Azure Security Center
-
C
Azure Monitor
-
D
Azure Automation
Explanation
Azure Security Center offers features for monitoring security postures, whereas others have different primary functions.
What happens when an Azure Firewall policy is applied to multiple Firewalls?
-
A
Policies merge with individual settings
-
B
Only the latest policy applies
-
C
It causes a configuration error
-
D
Each firewall uses its own policy only
Explanation
Policies can be shared and settings are merged; the other options either misinterpret the behavior or suggest errors.