Microsoft Azure

Microsoft Security Operations Analyst

SC-200
Popular

Validate your skills with the SC-200 exam for Microsoft Security Operations Analyst.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 147

Q131

A company needs to protect sensitive data at rest in Azure SQL Database. What should they enable?

  • A Data Masking
  • B Transparent Data Encryption
  • C Auditing
  • D Always Encrypted
Explanation Transparent Data Encryption encrypts data at rest, while data masking, auditing, and always encrypted serve different purposes.
Q132

You are configuring Azure Active Directory conditional access policies. What happens when you configure a policy with 'require multi-factor authentication'?

  • A All users are denied access.
  • B Only multi-factor capable devices can log in.
  • C Users must authenticate using two methods.
  • D Only admins will require MFA.
Explanation Users must authenticate using two methods when MFA is required; the other options misinterpret the functionality of conditional access.
Q133

Which Azure service helps you analyze security alerts?

  • A Microsoft Sentinel
  • B Azure Logic Apps
  • C Azure DevOps
  • D Azure Cognitive Services
Explanation Microsoft Sentinel specializes in security alert management, while the others focus on different functionalities.
Q134

A company needs to secure access to Azure resources based on user roles. Which feature should they implement?

  • A Network Security Groups
  • B Azure RBAC
  • C VPN Gateway
  • D Storage Accounts
Explanation Azure RBAC enables role-based access control for resources, while the others serve different purposes.
Q135

You are configuring Azure Security Center. What happens if you enable the 'Just-in-time VM access' feature?

  • A Blocks all VM traffic always
  • B Reduces VM costs
  • C Limits access to VMs based on need
  • D Automatically updates VM policies
Explanation Just-in-time VM access restricts access to when needed, while the others do not accurately describe its function.
Q136

Which Azure service provides comprehensive security management and threat protection?

  • A Azure Security Center
  • B Azure Monitor
  • C Azure Logic Apps
  • D Azure Functions
Explanation Azure Security Center offers integrated security management, while others focus on different functionalities.
Q137

A company needs to ensure their data in Azure Blob Storage is encrypted at rest. What should they implement?

  • A Azure Active Directory
  • B Managed Disk Encryption
  • C Storage Service Encryption
  • D Network Security Groups
Explanation Storage Service Encryption automatically encrypts data at rest, whereas the other options do not specifically address data encryption in storage.
Q138

You are configuring Azure Sentinel for log analytics. What happens when you enable continuous export?

  • A Logs are deleted immediately
  • B Logs are sent to Azure Blob for analysis
  • C Logs are only accessible for 30 days
  • D Logs are archived in the original workspace
Explanation Continuous export directs logs to Azure Blob for further analysis; other options misrepresent log handling.
Q139

Which Azure service is primarily used for threat detection in cloud applications?

  • A Azure Sentinel
  • B Azure Firewall
  • C Azure Load Balancer
  • D Azure Backup
Explanation Azure Sentinel focuses on threat detection and security analytics, while others serve different purposes.
Q140

A company needs to automate security assessments for its Azure resources. Which tool should they use?

  • A Azure Security Center
  • B Azure Functions
  • C Azure DevOps
  • D Azure Monitor
Explanation Azure Security Center automates security assessments; others provide different automation functionalities.