Microsoft Azure
Microsoft Certified: Information Security Administrator Associate
SC-401
Achieve the SC-401 certification as an Information Security Administrator Associate.
147 questions
0 views
Free
Questions 1–10 of 147
You are configuring Azure Security Center. Which feature helps identify vulnerabilities in your systems?
-
A
Just-in-time access
-
B
Security recommendations
-
C
Secure Score analysis
-
D
Advanced threat protection
Explanation
Security recommendations provide insights on vulnerabilities, while the other options describe different security features.
A company needs to limit access to Azure resources based on user roles. Which Azure service should be utilized?
-
A
Azure Key Vault
-
B
Azure Active Directory
-
C
Azure Virtual Network
-
D
Azure Monitor
Explanation
Azure Active Directory manages access based on roles; the others do not primarily provide role-based access control.
What happens when you enable diagnostic settings for Azure resources?
-
A
Automatic updates are enabled
-
B
Logs are sent to a storage account
-
C
Resources are deleted automatically
-
D
Alerts are suppressed for resources
Explanation
Enabling diagnostic settings sends logs to designated storage, whereas the other options incorrectly describe resource behaviors.
Which service provides advanced threat protection across Azure resources?
-
A
Azure Security Center
-
B
Azure Monitor
-
C
Azure DevOps
-
D
Azure CLI
Explanation
Azure Security Center offers comprehensive security management features while others focus on different functionalities.
A company needs to implement MFA for its Azure resources. What should you recommend?
-
A
Azure Active Directory Conditional Access
-
B
Azure Blob Storage
-
C
Azure Virtual Machines
-
D
Azure Logic Apps
Explanation
Azure AD Conditional Access enables Multi-Factor Authentication, while others serve different purposes.
What happens when Azure Key Vault access policies are not configured correctly for an application?
-
A
The application succeeds in accessing secrets.
-
B
The application fails to access secrets.
-
C
Access is always granted to all users.
-
D
The application runs without any issues.
Explanation
Incorrect access policies result in access denial, while the other options suggest scenarios that contradict correct policy enforcement.
Which Azure service is best for DDoS protection?
-
A
Azure DDoS Protection
-
B
Azure Firewall
-
C
Network Security Groups
-
D
Application Gateway
Explanation
Azure DDoS Protection specifically targets DDoS threats, while others have different focuses.
A company needs secure access for remote employees. Which option best serves this requirement?
-
A
VPN Gateway
-
B
Azure Storage Account
-
C
Azure CDN
-
D
Azure Blob Storage
Explanation
VPN Gateway provides secure remote access, while others do not focus on secure network connections.
You are configuring Azure Key Vault with access policies. What happens if you set the 'Get' permission for an identity?
-
A
Cannot access Key Vault secrets
-
B
Can read secrets in Key Vault
-
C
Can delete Key Vault
-
D
Can manage Key Vault properties
Explanation
Setting 'Get' permission allows the identity to read secrets, while other options incorrectly imply different access rights.
Which Azure service provides advanced threat protection for Azure resources?
-
A
Azure Security Center
-
B
Azure Resource Manager
-
C
Azure Active Directory
-
D
Azure DevOps
Explanation
Azure Security Center monitors and protects resources, while the others serve different purposes.