What happens when you assign a role at the subscription level in Azure?
AInherited by resource groups
BLimited to subscription only
CRevoked at resource group level
DDuplicate roles created in resource groups
Explanation
Roles assigned at the subscription level cascade down to all resource groups, contrasting with the potential misconceptions of other options.
Q142
Which service provides security for Azure resources?
AAzure Security Center
BAzure Monitor
CAzure Automation
DAzure Logic Apps
Explanation
Azure Security Center is specifically designed to enhance the security posture of Azure resources, while the others serve different functions.
Q143
You are configuring conditional access policies. What occurs if a user fails to meet required conditions?
AAccess is granted anyway
BAccess is denied
CAccess is granted with warnings
DAccess is logged for review
Explanation
Access is denied if a user fails to meet the configured conditions, ensuring security compliance.
Q144
A company needs to enforce encryption for all data in transit. Which Azure feature should they use?
AAzure Traffic Manager
BAzure ExpressRoute
CAzure VPN Gateway
DAzure Application Gateway
Explanation
Azure VPN Gateway provides secure connectivity and encrypts data in transit, whereas the other options serve different networking purposes.
Q145
Which service offers real-time threat protection and detection?
AMicrosoft Sentinel
BAzure Logic Apps
CAzure Mobile Apps
DAzure Blob Storage
Explanation
Microsoft Sentinel is a SIEM tool designed for security, while the others serve different functions.
Q146
A company needs to protect sensitive data in Azure. What should they do?
AEnable Azure Security Center
BUse Azure Firewall
CInstall local antivirus
DUtilize Azure Cost Management
Explanation
Azure Security Center provides security management and threat protection capabilities, which includes sensitive data protection.
Q147
What happens when an Azure Key Vault accesses a stored secret?
ASecret is copied to VM
BAudit logs are created
CSecret is deleted
DLast access timestamp resets
Explanation
Accessing a secret generates audit logs to track usage, while the other options do not occur with a simple access.