A company needs to protect sensitive data at rest in Azure SQL Database. What should they enable?
AData Masking
BTransparent Data Encryption
CAuditing
DAlways Encrypted
Explanation
Transparent Data Encryption encrypts data at rest, while data masking, auditing, and always encrypted serve different purposes.
Q132
You are configuring Azure Active Directory conditional access policies. What happens when you configure a policy with 'require multi-factor authentication'?
AAll users are denied access.
BOnly multi-factor capable devices can log in.
CUsers must authenticate using two methods.
DOnly admins will require MFA.
Explanation
Users must authenticate using two methods when MFA is required; the other options misinterpret the functionality of conditional access.
Q133
Which Azure service helps you analyze security alerts?
AMicrosoft Sentinel
BAzure Logic Apps
CAzure DevOps
DAzure Cognitive Services
Explanation
Microsoft Sentinel specializes in security alert management, while the others focus on different functionalities.
Q134
A company needs to secure access to Azure resources based on user roles. Which feature should they implement?
ANetwork Security Groups
BAzure RBAC
CVPN Gateway
DStorage Accounts
Explanation
Azure RBAC enables role-based access control for resources, while the others serve different purposes.
Q135
You are configuring Azure Security Center. What happens if you enable the 'Just-in-time VM access' feature?
ABlocks all VM traffic always
BReduces VM costs
CLimits access to VMs based on need
DAutomatically updates VM policies
Explanation
Just-in-time VM access restricts access to when needed, while the others do not accurately describe its function.
Q136
Which Azure service provides comprehensive security management and threat protection?
AAzure Security Center
BAzure Monitor
CAzure Logic Apps
DAzure Functions
Explanation
Azure Security Center offers integrated security management, while others focus on different functionalities.
Q137
A company needs to ensure their data in Azure Blob Storage is encrypted at rest. What should they implement?
AAzure Active Directory
BManaged Disk Encryption
CStorage Service Encryption
DNetwork Security Groups
Explanation
Storage Service Encryption automatically encrypts data at rest, whereas the other options do not specifically address data encryption in storage.
Q138
You are configuring Azure Sentinel for log analytics. What happens when you enable continuous export?
ALogs are deleted immediately
BLogs are sent to Azure Blob for analysis
CLogs are only accessible for 30 days
DLogs are archived in the original workspace
Explanation
Continuous export directs logs to Azure Blob for further analysis; other options misrepresent log handling.
Q139
Which Azure service is primarily used for threat detection in cloud applications?
AAzure Sentinel
BAzure Firewall
CAzure Load Balancer
DAzure Backup
Explanation
Azure Sentinel focuses on threat detection and security analytics, while others serve different purposes.
Q140
A company needs to automate security assessments for its Azure resources. Which tool should they use?
AAzure Security Center
BAzure Functions
CAzure DevOps
DAzure Monitor
Explanation
Azure Security Center automates security assessments; others provide different automation functionalities.