Microsoft Azure
Microsoft Certified: Information Security Administrator Associate
SC-401
Achieve the SC-401 certification as an Information Security Administrator Associate.
147 questions
0 views
Free
Questions 21–30 of 147
What happens when a user modifies an existing role assignment in Azure RBAC?
-
A
All resources become inaccessible
-
B
Permission errors for other users
-
C
Change applies to existing sessions
-
D
New roles are inherited immediately
Explanation
Existing sessions do not see changes until restarted.
Which service provides file shares in the cloud?
-
A
Azure Files
-
B
Azure Functions
-
C
Azure Blob Storage
-
D
Azure SQL Database
Explanation
Azure Files offers managed file shares, while others serve different purposes.
A company needs to analyze user activities on Azure. Which solution should they use?
-
A
Azure Active Directory Logs
-
B
Azure Search
-
C
Azure Logic Apps
-
D
Azure Monitor
Explanation
Azure Monitor provides extensive activity analysis; others aren't primarily for monitoring.
You are configuring alerts in Azure Sentinel. What happens when an alert is triggered?
-
A
An emailed report is generated
-
B
An incident is created
-
C
The log is deleted
-
D
Access is automatically revoked
Explanation
An alert triggers incident creation to track security issues; others are not outcomes of a triggered alert.
Which Azure service provides identity protection and monitoring?
-
A
Azure Active Directory
-
B
Azure Firewall
-
C
Azure Monitor
-
D
Azure Key Vault
Explanation
Azure Active Directory offers identity protection features, while others focus on networking or storage.
A company needs to manage their sensitive information access based on job roles. What should they implement?
-
A
Azure Virtual Network
-
B
Role-Based Access Control (RBAC)
-
C
Network Security Groups
-
D
Azure Load Balancer
Explanation
RBAC allows for access management based on roles, unlike the other choices.
You are configuring Azure Security Center. What is a key feature you must enable for advanced threat protection?
-
A
Integration with Azure Functions
-
B
Multi-factor authentication
-
C
Security recommendations
-
D
Continuous export of data
Explanation
Security recommendations must be enabled for threat protection; others do not specifically relate.
Which Azure service provides identity and access management?
-
A
Azure Active Directory
-
B
Azure Functions
-
C
Azure Virtual Network
-
D
Azure Blob Storage
Explanation
Azure Active Directory manages identities, while the others serve different purposes.
A company needs to ensure its Azure resources are monitored for security issues. Which service should they use?
-
A
Azure Security Center
-
B
Azure DevOps
-
C
Azure Batch
-
D
Azure Firewall
Explanation
Azure Security Center provides continuous security assessments and monitoring.
You are configuring conditional access policies. What happens if the user is not compliant?
-
A
Access is granted immediately
-
B
Access is blocked until compliant
-
C
User is notified but granted access
-
D
Policy is ignored
Explanation
Non-compliance triggers access restrictions under conditional access policies.