Microsoft Azure

Microsoft Security Operations Analyst

SC-200
Popular

Validate your skills with the SC-200 exam for Microsoft Security Operations Analyst.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 31–40 of 147

Q31

Which service facilitates real-time threat detection in Azure?

  • A Azure Security Center
  • B Azure Blob Storage
  • C Azure Functions
  • D Azure Virtual Network
Explanation Azure Security Center provides real-time threat detection; the others serve different purposes.
Q32

A company needs to monitor network traffic to detect potential breaches. Which Azure service would you implement?

  • A Azure Monitor
  • B Azure Firewalls
  • C Azure Sentinel
  • D Azure Logic Apps
Explanation Azure Sentinel is specifically designed for security monitoring and detection.
Q33

You are configuring Azure Active Directory. What happens when a user is assigned a conditional access policy that includes Multi-Factor Authentication (MFA)?

  • A User must always use a PIN.
  • B User may skip MFA if trusted.
  • C User will always be prompted for MFA.
  • D User cannot access any resources.
Explanation Users are prompted for MFA unless conditions allow skipping; other options misrepresent conditions.
Q34

Which service provides threat detection for Azure resources?

  • A Azure Security Center
  • B Azure Monitor
  • C Azure Functions
  • D Azure DevOps
Explanation Azure Security Center specifically enhances threat detection, while others serve different functions.
Q35

A company needs to log all Azure resource access. Which service should they implement?

  • A Azure Sentinel
  • B Azure Monitor Logs
  • C Azure Policy
  • D Azure Key Vault
Explanation Azure Monitor Logs collects and analyzes log data, whereas others don't focus specifically on resource access logging.
Q36

What happens when you remove a user from an Azure AD group?

  • A User retains all previous permissions
  • B User loses group-assigned permissions
  • C User must re-accept all permissions
  • D User is deleted from Azure AD
Explanation Removing a user from a group revokes permissions assigned through that group, unlike other options which are incorrect.
Q37

Which service would you use for Azure threat detection?

  • A Azure Security Center
  • B Azure DevOps
  • C Azure Resource Manager
  • D Azure Storage
Explanation Azure Security Center provides threat detection capabilities, while the other options focus on different functionalities.
Q38

A company needs to ensure compliance with GDPR by managing user data access. Which Azure feature should they implement?

  • A Azure Role-Based Access Control
  • B Azure Firewall
  • C Azure Load Balancer
  • D Azure Functions
Explanation Azure Role-Based Access Control (RBAC) provides appropriate access management to sensitive user data, unlike the other options.
Q39

You are configuring Azure Sentinel's data connectors. What happens if you connect a log source that is not supported?

  • A It will generate a warning.
  • B It will fail to connect.
  • C It will connect partially.
  • D It will cause data loss.
Explanation Connecting unsupported log sources results in a failed connection, while the others describe incorrect consequences.
Q40

A company needs to automate deployment of security policies. Which service should they use?

  • A Azure Policy
  • B Azure Logic Apps
  • C Azure Monitor
  • D Azure Functions
Explanation Azure Policy automates and enforces policies, while the others focus on workflows, monitoring, and serverless computing.