A company needs to ensure that only specific users can access its Azure resources. What should they implement?
ANetwork Security Groups
BRole-Based Access Control
CAzure Sentinel
DVirtual Networks
Explanation
Role-Based Access Control enables user-specific access while others do not manage user permissions.
Q12
What happens when configuring Azure Policy with a trigger action?
APolicies automatically enforce compliance
BPolicies only audit existing resources
CPolicies apply instantly with no delay
DPolicies require manual initiation
Explanation
Policy triggers audit resources and assess compliance but do not enforce instantly or automatically.
Q13
Which Azure service provides protection against DDoS attacks?
AAzure DDoS Protection
BAzure Firewall
CAzure Security Center
DAzure Sentinel
Explanation
Azure DDoS Protection is specifically designed to defend against DDoS attacks, while the others serve different security roles.
Q14
A company needs to receive alerts when unusual login patterns are detected in Azure. What Azure service can this utilize?
AAzure Monitor
BAzure Active Directory Identity Protection
CAzure Log Analytics
DAzure Sentinel
Explanation
Azure AD Identity Protection helps identify and respond to atypical sign-in behavior, while the others serve different monitoring purposes.
Q15
What happens when you enable 'soft delete' for Azure Blob Storage?
AImmediate deletion of blobs on modify
BBlobs can be recovered after deletion
CPermanent loss of deleted blobs
DBlobs are archived automatically
Explanation
Soft delete allows recovery of blobs for a retention period after deletion, whereas the other options misrepresent blob management.
Q16
Which service provides real-time monitoring and alerting for Azure resources?
AAzure Monitor
BAzure Governance
CAzure DevOps
DAzure Blob Storage
Explanation
Azure Monitor tracks performance and health, while others serve different purposes.
Q17
A company needs to deploy a virtual machine but ensure it is isolated from other virtual machines in the same region. What should they use?
AAvailability Zone
BVirtual Network
CAzure Load Balancer
DResource Group
Explanation
A Virtual Network isolates resources, while others do not provide isolation directly.
Q18
You are configuring Security Center standard policy for your resources. What happens if you define a custom initiative?
AOverrides existing security controls
BCombines existing definitions into one
CRemoves all existing policies
DEncourages non-compliance policies
Explanation
A custom initiative encompasses multiple definitions without removing existing policies.
Q19
Which Azure service is used for centralized logging and monitoring?
AAzure Monitor
BAzure DevOps
CAzure Virtual Machines
DAzure Functions
Explanation
Azure Monitor collects and analyzes telemetry data, while the others serve different purposes.
Q20
A company needs to restrict access to its Azure resources based on user roles. What service should they use?
AAzure Active Directory
BAzure Firewall
CAzure Security Center
DAzure Load Balancer
Explanation
Azure Active Directory manages user roles and permissions, while other services do not primarily control access.