What happens when a user is assigned to multiple Azure Active Directory (AAD) roles?
AOnly the highest role is active.
BRoles are cumulative for permissions.
CRoles conflict and deny access.
DRoles are ignored during access checks.
Explanation
Multiple roles in AAD accumulate permissions, allowing for broader access, while the others misrepresent how AAD roles operate.
Q82
Which service provides advanced threat detection in Azure?
AAzure Security Center
BAzure App Service
CAzure Cosmos DB
DAzure Key Vault
Explanation
Azure Security Center offers comprehensive threat detection, while the others focus on different areas like app services, databases, and secrets management.
Q83
A company needs to monitor network traffic in Azure; which tool should it use?
AAzure Virtual Network
BAzure Network Watcher
CAzure ExpressRoute
DAzure Logic Apps
Explanation
Azure Network Watcher is specifically designed for monitoring and diagnosing network issues, whereas the others serve different purposes.
Q84
What happens when a user assigns a role with "Owner" permissions to another user in Azure?
AThe user can only view resources.
BThe user can modify resources.
CThe user cannot assign roles.
DThe user can delete the subscription.
Explanation
The "Owner" role allows users to modify resources, unlike the other incorrect options that state limited permissions.
Q85
Which Azure service provides security recommendations?
AAzure Security Center
BAzure Monitor
CAzure Sentinel
DAzure Policy
Explanation
Azure Security Center offers security recommendations based on assessments; others focus on monitoring or policy enforcement.
Q86
A company needs to protect sensitive data during transmission. What should they implement?
AEncryption at rest
BEnable Firewall
CData Loss Prevention
DEncryption in transit
Explanation
Encryption in transit secures data during transmission; the others do not specifically address this concern.
Q87
You are configuring Azure AD Conditional Access policies. What happens if a user fails MFA?
AAccess is granted immediately
BAccess is allowed after a delay
CAccess is blocked until successful
DAccess is granted with limited permissions
Explanation
If MFA fails, access is blocked until the user successfully completes it; the others do not accurately describe the process.
Q88
Which service provides real-time monitoring for Azure resources?
AAzure Monitor
BAzure DevOps
CAzure Backup
DAzure Blob Storage
Explanation
Azure Monitor provides real-time monitoring, while the others serve different purposes like CI/CD or backup.
Q89
A company needs to implement zero-trust network access for its employees. Which Azure service should it use?
AAzure Active Directory
BAzure Information Protection
CAzure Security Center
DAzure Virtual Network
Explanation
Azure Active Directory supports zero-trust principles; the others focus on data protection or network configurations.
Q90
What happens when you enable Azure policy enforcement on a subscription?
AResources are automatically created
BResource deployments are failed if non-compliant
CSecurity alerts are suppressed
DNetworking configurations are deleted
Explanation
Enabling policy enforcement ensures only compliant resources are deployed, unlike the other options which don’t align with policy enforcement behavior.