A company needs to secure their Azure Storage account. What should they implement to limit access based on networks?
AAccess Keys
BFirewalls and Virtual Networks
CShared Access Signatures
DBlob Indexing
Explanation
Firewalls and Virtual Networks restrict access based on defined network rules, unlike the options which do not provide network-specific access control.
Q72
You are configuring Azure Active Directory (AAD) Conditional Access policies. What happens when a user is marked as 'MFA Required'?
AUser can bypass MFA login
BUser must complete MFA verification
CUser is permanently blocked
DUser device becomes unregistered
Explanation
Marking a user as 'MFA Required' mandates MFA completion during login, while others indicate incorrect access scenarios.
Q73
Which Azure service provides DDoS protection through AI algorithms?
AAzure DDoS Protection
BAzure Firewall
CAzure Security Center
DAzure Traffic Manager
Explanation
Azure DDoS Protection specifically offers AI-based DDoS mitigation; the others address different security issues.
Q74
You are configuring a conditional access policy for users accessing Azure resources. What condition can you specify?
AUser location
BDevice battery percentage
CTime of day limit
DUser's favorite color
Explanation
User location is a valid condition for access policies; battery percentage, time limits, and color aren't.
Q75
A company needs to audit all access to Azure Key Vault. Which feature should they enable?
AAccess policies
BDiagnostic logs
CStorage replication
DNetworking rule
Explanation
Diagnostic logs provide detailed audit trails of Key Vault access, while the other options do not.
Q76
Which Azure service is used for monitoring application performance?
AAzure Monitor
BAzure DevOps
CAzure Logic Apps
DAzure Functions
Explanation
Azure Monitor provides metrics and logs for application performance; others serve different purposes such as development or automation.
Q77
A company needs to restrict users from accessing Azure resources based on their job title. What should they implement?
ANetwork Security Groups
BAzure Role-Based Access Control (RBAC)
CAzure Policy
DResource Locks
Explanation
RBAC allows role assignments based on attributes like job title; the others serve different functions or are not user-specific.
Q78
What happens when a user tries to access resources without the necessary permissions in Azure?
AAccess is granted with limited functionality
BAccess is denied entirely
CPermissions are automatically escalated
DAn alert is sent to the admin
Explanation
Access is denied entirely if permissions are missing; it does not grant limited access or escalate permissions automatically.
Q79
Which service provides advanced threat protection in Azure?
AAzure Defender
BAzure Firewall
CAzure Sentinel
DAzure DDoS Protection
Explanation
Azure Defender is designed specifically for threat protection across Azure resources, whereas the others focus on networking or security monitoring.
Q80
A company needs to automatically respond to detected threats in Azure. Which Azure service should they implement?
AAzure Security Center
BAzure Logic Apps
CAzure Automation
DMicrosoft Sentinel
Explanation
Microsoft Sentinel includes capabilities for automated response actions to security threats, while the others have different primary functions.