Microsoft Azure

Microsoft Certified: Information Security Administrator Associate

SC-401

Achieve the SC-401 certification as an Information Security Administrator Associate.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 141–147 of 147

Q141

What happens when you assign a role at the subscription level in Azure?

  • A Inherited by resource groups
  • B Limited to subscription only
  • C Revoked at resource group level
  • D Duplicate roles created in resource groups
Explanation Roles assigned at the subscription level cascade down to all resource groups, contrasting with the potential misconceptions of other options.
Q142

Which service provides security for Azure resources?

  • A Azure Security Center
  • B Azure Monitor
  • C Azure Automation
  • D Azure Logic Apps
Explanation Azure Security Center is specifically designed to enhance the security posture of Azure resources, while the others serve different functions.
Q143

You are configuring conditional access policies. What occurs if a user fails to meet required conditions?

  • A Access is granted anyway
  • B Access is denied
  • C Access is granted with warnings
  • D Access is logged for review
Explanation Access is denied if a user fails to meet the configured conditions, ensuring security compliance.
Q144

A company needs to enforce encryption for all data in transit. Which Azure feature should they use?

  • A Azure Traffic Manager
  • B Azure ExpressRoute
  • C Azure VPN Gateway
  • D Azure Application Gateway
Explanation Azure VPN Gateway provides secure connectivity and encrypts data in transit, whereas the other options serve different networking purposes.
Q145

Which service offers real-time threat protection and detection?

  • A Microsoft Sentinel
  • B Azure Logic Apps
  • C Azure Mobile Apps
  • D Azure Blob Storage
Explanation Microsoft Sentinel is a SIEM tool designed for security, while the others serve different functions.
Q146

A company needs to protect sensitive data in Azure. What should they do?

  • A Enable Azure Security Center
  • B Use Azure Firewall
  • C Install local antivirus
  • D Utilize Azure Cost Management
Explanation Azure Security Center provides security management and threat protection capabilities, which includes sensitive data protection.
Q147

What happens when an Azure Key Vault accesses a stored secret?

  • A Secret is copied to VM
  • B Audit logs are created
  • C Secret is deleted
  • D Last access timestamp resets
Explanation Accessing a secret generates audit logs to track usage, while the other options do not occur with a simple access.