Microsoft Azure

Microsoft Security Operations Analyst

SC-200
Popular

Validate your skills with the SC-200 exam for Microsoft Security Operations Analyst.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 51–60 of 147

Q51

You are configuring alerts in Azure Sentinel. What happens if the alert rule is set to `Suppressed`?

  • A Alerts will be generated normally
  • B Alerts will be blocked completely
  • C Alerts are raised but ignored
  • D Alerts will not be raised
Explanation Setting an alert rule to `Suppressed` prevents it from raising alerts, unlike the other options.
Q52

Which Azure service allows real-time threat detection and security monitoring?

  • A Azure Sentinel
  • B Azure Monitor
  • C Azure Firewall
  • D Azure Logic Apps
Explanation Azure Sentinel provides security information and event management (SIEM) capabilities, unlike the others which serve different purposes.
Q53

A company needs to enforce MFA for all admins on Azure. What should they use?

  • A Conditional Access policies
  • B Azure Security Center
  • C Azure Active Directory Groups
  • D Network Security Groups
Explanation Conditional Access policies are designed to enforce multifactor authentication specifically for admins.
Q54

What happens when an Azure Security Center recommendation is marked as 'Implemented'?

  • A It is no longer visible.
  • B It remains visible as resolved.
  • C An alert is created.
  • D Compliance status changes immediately.
Explanation An 'Implemented' recommendation remains visible but indicates it has been acted upon, not removed.
Q55

Which Azure service can help you manage security policies across Microsoft 365 and Azure?

  • A Microsoft Security Center
  • B Azure Sentinel
  • C Azure Information Protection
  • D Microsoft Defender for Cloud
Explanation Microsoft Defender for Cloud manages security policies across both Azure and Microsoft 365, while others focus on specific areas.
Q56

A company needs to analyze security data from Azure service logs. Which Azure service should they use?

  • A Microsoft Azure Firewall
  • B Azure Log Analytics
  • C Azure API Management
  • D Azure Blob Storage
Explanation Azure Log Analytics is designed to analyze log data from various Azure services, unlike the other options that serve different functions.
Q57

What happens when you assign RBAC roles at the resource group level but have conflicting roles at the subscription level?

  • A Conflicting roles are ignored.
  • B The least privileged role is applied.
  • C Roles are combined for access.
  • D The subscription role overrides the resource group role.
Explanation Roles are additive; the user receives combined permissions from both the resource group and subscription levels, allowing broader access than a single role alone.
Q58

Which service allows for security incident management in Azure?

  • A Azure Sentinel
  • B Azure DevOps
  • C Azure Logic Apps
  • D Azure Virtual Machines
Explanation Azure Sentinel provides full incident management capabilities, while the others serve different functions.
Q59

A company needs to securely store sensitive data with compliance requirements. Which Azure service should they use?

  • A Azure Blob Storage
  • B Azure Key Vault
  • C Azure SQL Database
  • D Azure App Service
Explanation Azure Key Vault is specifically designed for securing keys and secrets, while the other options do not offer the same level of dedicated secret management.
Q60

What happens when you enable Azure Defender for IoT in a virtual network?

  • A IoT devices are automatically updated
  • B Security alerts are generated for breaches
  • C Network bandwidth is increased
  • D Traffic is automatically encrypted
Explanation Enabling Azure Defender for IoT provides surveillance for potential security breaches, while others do not directly relate to intrusion detection.