You are configuring alerts in Azure Sentinel. What happens if the alert rule is set to `Suppressed`?
AAlerts will be generated normally
BAlerts will be blocked completely
CAlerts are raised but ignored
DAlerts will not be raised
Explanation
Setting an alert rule to `Suppressed` prevents it from raising alerts, unlike the other options.
Q52
Which Azure service allows real-time threat detection and security monitoring?
AAzure Sentinel
BAzure Monitor
CAzure Firewall
DAzure Logic Apps
Explanation
Azure Sentinel provides security information and event management (SIEM) capabilities, unlike the others which serve different purposes.
Q53
A company needs to enforce MFA for all admins on Azure. What should they use?
AConditional Access policies
BAzure Security Center
CAzure Active Directory Groups
DNetwork Security Groups
Explanation
Conditional Access policies are designed to enforce multifactor authentication specifically for admins.
Q54
What happens when an Azure Security Center recommendation is marked as 'Implemented'?
AIt is no longer visible.
BIt remains visible as resolved.
CAn alert is created.
DCompliance status changes immediately.
Explanation
An 'Implemented' recommendation remains visible but indicates it has been acted upon, not removed.
Q55
Which Azure service can help you manage security policies across Microsoft 365 and Azure?
AMicrosoft Security Center
BAzure Sentinel
CAzure Information Protection
DMicrosoft Defender for Cloud
Explanation
Microsoft Defender for Cloud manages security policies across both Azure and Microsoft 365, while others focus on specific areas.
Q56
A company needs to analyze security data from Azure service logs. Which Azure service should they use?
AMicrosoft Azure Firewall
BAzure Log Analytics
CAzure API Management
DAzure Blob Storage
Explanation
Azure Log Analytics is designed to analyze log data from various Azure services, unlike the other options that serve different functions.
Q57
What happens when you assign RBAC roles at the resource group level but have conflicting roles at the subscription level?
AConflicting roles are ignored.
BThe least privileged role is applied.
CRoles are combined for access.
DThe subscription role overrides the resource group role.
Explanation
Roles are additive; the user receives combined permissions from both the resource group and subscription levels, allowing broader access than a single role alone.
Q58
Which service allows for security incident management in Azure?
AAzure Sentinel
BAzure DevOps
CAzure Logic Apps
DAzure Virtual Machines
Explanation
Azure Sentinel provides full incident management capabilities, while the others serve different functions.
Q59
A company needs to securely store sensitive data with compliance requirements. Which Azure service should they use?
AAzure Blob Storage
BAzure Key Vault
CAzure SQL Database
DAzure App Service
Explanation
Azure Key Vault is specifically designed for securing keys and secrets, while the other options do not offer the same level of dedicated secret management.
Q60
What happens when you enable Azure Defender for IoT in a virtual network?
AIoT devices are automatically updated
BSecurity alerts are generated for breaches
CNetwork bandwidth is increased
DTraffic is automatically encrypted
Explanation
Enabling Azure Defender for IoT provides surveillance for potential security breaches, while others do not directly relate to intrusion detection.