A company needs to monitor compliance across Azure resources. Which service should they use?
AAzure Monitor
BAzure Policy
CAzure Firewall
DAzure Sentinel
Explanation
Azure Policy enforces compliance at scale; other services serve different monitoring or security roles.
Q132
You are configuring a user to have only necessary permissions in Azure. What should you apply?
ARole-Based Access Control (RBAC)
BAzure AD Connect
CMulti-Factor Authentication (MFA)
DAzure Bastion
Explanation
RBAC grants least privilege access; other options do not directly manage permissions.
Q133
Which Azure service provides DDoS protection?
AAzure DDoS Protection
BAzure Firewall
CNetwork Security Groups
DAzure Bastion
Explanation
Azure DDoS Protection specifically protects applications from DDoS attacks, while the other options provide different types of security.
Q134
A company needs to audit access to sensitive data in Azure Blob Storage. Which feature can help?
AAzure Monitor Logs
BStorage Account Access Keys
CAzure Data Lake
DAzure Blob Storage Lifecycle Management
Explanation
Azure Monitor Logs can track and audit access, while the other options do not audit access effectively.
Q135
What happens when you set an Azure subscription to 'Disabled'?
AAll resources are deleted
BYou cannot create new resources
CBilling is still charged
DResources continue running from it
Explanation
Setting a subscription to 'Disabled' prevents new resource creation, while existing resources remain unaffected and charges may still apply.
Q136
Which service is designed for threat detection in Azure?
AAzure Security Center
BAzure Monitor
CAzure Backup
DAzure Logic Apps
Explanation
Azure Security Center offers comprehensive threat detection, while others focus on monitoring, backup or workflows.
Q137
A company needs to restrict access to Azure files based on user identity. What should they implement?
AAzure Network Security Groups
BAzure Role-Based Access Control
CAzure Firewall
DAzure ExpressRoute
Explanation
Azure Role-Based Access Control manages user access based on roles, unlike the other options which focus on network security or connection types.
Q138
You are configuring Azure Key Vault. What happens if a secret expires?
AIt automatically deleted
BAccess is denied
CIt remains accessible
DProvides a warning
Explanation
Expired secrets remain accessible, but are not recommended for use, unlike incorrect options which suggest deletion or access issues.
Q139
Which service helps protect Azure resources from DDoS attacks?
AAzure DDoS Protection
BAzure Security Center
CAzure Firewall
DAzure VPN Gateway
Explanation
Azure DDoS Protection specifically safeguards against DDoS attacks, whereas others serve different security functions.
Q140
A company needs to manage user access to Azure resources based on their job roles. Which Azure service should they implement?
AAzure Policy
BAzure RBAC
CAzure Key Vault
DAzure Monitor
Explanation
Azure RBAC (Role-Based Access Control) is designed for role-based access management, unlike the other options.