A company needs to ensure only authorized users can access their sensitive data in Azure. What is the best practice to achieve this?
AUse least privilege access
BEnable public access
CUtilize shared accounts
DDisable all user access
Explanation
Using least privilege access ensures users have only the permissions necessary for their roles, while the other options create security risks.
Q102
You are configuring Azure Security Center. What happens when you set the security response action to 'Take No Action'?
AAutomatic remediation occurs
BAlerts are ignored
CNo alerts are generated
DIssues are left unresolved
Explanation
Setting to 'Take No Action' leaves issues unresolved, while the other options incorrectly suggest some proactive response.
Q103
Which service is primarily used for managing Azure network security groups?
AAzure Security Center
BAzure Network Watcher
CAzure Virtual Network
DAzure Firewall
Explanation
The Azure Virtual Network is responsible for managing network security groups, enabling traffic control and security definitions.
Q104
A company needs to ensure that only specific users can access sensitive Azure blobs. What should they implement?
AAzure Active Directory roles
BShared Access Signatures
CNetwork Security Groups
DAzure Policy
Explanation
Shared Access Signatures allow for granular access control by providing limited permissions to specified users.
Q105
What happens when you assign a high privileged role to a user in Azure?
AAccess is denied immediately
BUser can change roles for others
CUser gains temporary permissions only
DUser automatically loses existing roles
Explanation
Assigning a high privileged role grants the user permissions to manage resources, including altering roles for others.
Q106
Which service provides Azure security posture management?
AMicrosoft Defender for Cloud
BAzure Sentinel
CAzure Security Center
DAzure Monitor
Explanation
Microsoft Defender for Cloud is the primary service for security posture management, while others focus on specific functionalities or monitoring.
Q107
A company needs to restrict access to sensitive information based on user roles. Which Azure feature is best suited for this need?
ARole-Based Access Control (RBAC)
BAzure Policies
CNetwork Security Groups (NSG)
DApplication Security Groups (ASG)
Explanation
RBAC allows for precise access control based on defined user roles, while the others serve different purposes.
Q108
You are configuring a Virtual Network in Azure. What happens if you try to create two subnets with overlapping address spaces?
ACreation succeeds without issues
BCreation fails with an error message
COnly one subnet gets created
DResources within subnets become uncommunicable
Explanation
Azure prohibits overlapping address spaces across subnets, leading to creation failure.
Q109
Which service provides advanced threat protection for Azure resources?
AAzure Defender
BAzure AD
CAzure Monitor
DAzure Site Recovery
Explanation
Azure Defender offers advanced threat protection; others focus on different functions.
Q110
A company needs to secure its Azure Virtual Network. What is a best practice?
AApply Network Security Groups
BDisable all public IPs
CUse only private endpoints
DLeave default security settings
Explanation
Network Security Groups restrict traffic; other options may not fully secure the network.