Microsoft Azure

Microsoft Certified: Information Security Administrator Associate

SC-401

Achieve the SC-401 certification as an Information Security Administrator Associate.

147 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 21–30 of 147

Q21

What happens when a user modifies an existing role assignment in Azure RBAC?

  • A All resources become inaccessible
  • B Permission errors for other users
  • C Change applies to existing sessions
  • D New roles are inherited immediately
Explanation Existing sessions do not see changes until restarted.
Q22

Which service provides file shares in the cloud?

  • A Azure Files
  • B Azure Functions
  • C Azure Blob Storage
  • D Azure SQL Database
Explanation Azure Files offers managed file shares, while others serve different purposes.
Q23

A company needs to analyze user activities on Azure. Which solution should they use?

  • A Azure Active Directory Logs
  • B Azure Search
  • C Azure Logic Apps
  • D Azure Monitor
Explanation Azure Monitor provides extensive activity analysis; others aren't primarily for monitoring.
Q24

You are configuring alerts in Azure Sentinel. What happens when an alert is triggered?

  • A An emailed report is generated
  • B An incident is created
  • C The log is deleted
  • D Access is automatically revoked
Explanation An alert triggers incident creation to track security issues; others are not outcomes of a triggered alert.
Q25

Which Azure service provides identity protection and monitoring?

  • A Azure Active Directory
  • B Azure Firewall
  • C Azure Monitor
  • D Azure Key Vault
Explanation Azure Active Directory offers identity protection features, while others focus on networking or storage.
Q26

A company needs to manage their sensitive information access based on job roles. What should they implement?

  • A Azure Virtual Network
  • B Role-Based Access Control (RBAC)
  • C Network Security Groups
  • D Azure Load Balancer
Explanation RBAC allows for access management based on roles, unlike the other choices.
Q27

You are configuring Azure Security Center. What is a key feature you must enable for advanced threat protection?

  • A Integration with Azure Functions
  • B Multi-factor authentication
  • C Security recommendations
  • D Continuous export of data
Explanation Security recommendations must be enabled for threat protection; others do not specifically relate.
Q28

Which Azure service provides identity and access management?

  • A Azure Active Directory
  • B Azure Functions
  • C Azure Virtual Network
  • D Azure Blob Storage
Explanation Azure Active Directory manages identities, while the others serve different purposes.
Q29

A company needs to ensure its Azure resources are monitored for security issues. Which service should they use?

  • A Azure Security Center
  • B Azure DevOps
  • C Azure Batch
  • D Azure Firewall
Explanation Azure Security Center provides continuous security assessments and monitoring.
Q30

You are configuring conditional access policies. What happens if the user is not compliant?

  • A Access is granted immediately
  • B Access is blocked until compliant
  • C User is notified but granted access
  • D Policy is ignored
Explanation Non-compliance triggers access restrictions under conditional access policies.