Which service is primarily used for integrating security into CI/CD workflows?
AAzure DevOps
BAzure Monitor
CAzure Logic Apps
DAzure Sentinel
Explanation
Azure DevOps provides tools for CI/CD with security integrations, while the others focus on monitoring or automation.
Q32
A company needs to ensure compliance with data sovereignty laws. Which Azure offering is best suited for this purpose?
AAzure Key Vault
BAzure Storage
CAzure Policy
DAzure Regions
Explanation
Choosing the correct Azure Region ensures data residency and compliance with local laws, unlike the other options which manage keys or policies.
Q33
What happens when Azure AD user logins exceed the allowed limit within a timeframe?
AUser gets notified via email
BAccount is locked for 30 minutes
CUser can reset password immediately
DLogin attempts are logged but not restricted
Explanation
Exceeding login attempts triggers temporary account lockout for security, whereas the other options do not effectively prevent unauthorized access.
Q34
Which Azure service provides centralized logging and analytics?
AAzure Monitor
BAzure Security Center
CAzure Key Vault
DAzure Active Directory
Explanation
Azure Monitor offers logging and analytics capabilities; the others serve different functions.
Q35
A company needs to ensure that sensitive data is encrypted in transit. What should they implement?
ASSL/TLS
BData Loss Prevention
CAzure Firewall
DAzure Policy
Explanation
SSL/TLS encrypts data in transit; the others target different security aspects.
Q36
You are configuring a multi-factor authentication policy. What must you consider?
AUser location restrictions
BDevice type management
CUser password expirations
DApplication permissions management
Explanation
User location restrictions are critical for MFA; the others do not directly influence MFA policy.
Q37
Which Azure service provides built-in DDoS protection?
AAzure Front Door
BAzure DDoS Protection
CAzure Traffic Manager
DAzure Notifications
Explanation
Azure DDoS Protection specifically provides DDoS mitigation, while the others serve different purposes.
Q38
A company needs to analyze security logs sent from Azure resources. What should they configure?
AAzure Blob Storage
BAzure Sentinel
CAzure Functions
DAzure VPN Gateway
Explanation
Azure Sentinel is designed for security log analysis, while the others are unrelated to security analytics.
Q39
You are configuring Azure Key Vault. What happens if a user does not have permission to access a secret?
AThe secret is deleted
BAccess is logged
CAn error is returned
DThe secret is shared
Explanation
If a user lacks permissions, Azure Key Vault returns an error rather than deleting or sharing the secret.
Q40
Which Azure service provides security for APIs?
AAzure API Management
BAzure Functions
CAzure Logic Apps
DAzure App Services
Explanation
Azure API Management facilitates security features like authentication and rate limiting, while the other options do not solely focus on API security.