A company needs to control user access to an application deployed in Azure. What should they use?
AAzure Network Security Groups
BAzure Active Directory
CAzure Virtual Network
DAzure Blob Storage
Explanation
Azure Active Directory provides identity management and access control, unlike the other options which focus on networking or storage management.
Q42
You are configuring Azure Security Center. What happens when you enable continuous export?
AExports compliance data only
BSends alerts to all users
CExports security recommendations only
DExports security alerts and recommendations
Explanation
Enabling continuous export sends both security alerts and recommendations, unlike the others which are incomplete scopes.
Q43
Which service can help with Azure Security Center recommendations?
AAzure Policy
BAzure Sentinel
CAzure Firewall
DAzure Key Vault
Explanation
Azure Policy helps ensure compliance by applying security recommendations, unlike others which serve different purposes.
Q44
A company needs to prevent unauthorized access to its Azure resources. Which approach should it adopt?
AUtilize RBAC
BEnable Public Access
CUse Storage Analytics
DSet Up VNet Peering
Explanation
Utilizing Role-Based Access Control (RBAC) restricts access effectively, while others do not focus on access management.
Q45
What happens when a user exceeds their Azure subscription limits?
AServices are denied provisioning
BAccount is automatically suspended
CResources are upgraded automatically
DUsage is doubled without charge
Explanation
Exceeding subscription limits results in provisioning denial, while others are not correct scenarios.
Q46
Which Azure service provides secure access to applications without a VPN?
AAzure Bastion
BAzure AD Conditional Access
CAzure Firewall
DAzure Front Door
Explanation
Azure Bastion allows secure access to applications via RDP/SSH without requiring a VPN; the others serve different purposes like access control and routing.
Q47
A company needs to automatically evaluate security alerts in Azure. Which service should they use?
AAzure Security Center
BAzure Monitor
CAzure Sentinel
DAzure Policy
Explanation
Azure Sentinel uses AI to evaluate and respond to security alerts automatically; the other options do not focus on security event management.
Q48
What happens when you delete an Azure Key Vault?
AAll secrets are deleted immediately
BVault goes into a soft-delete state
CVault can never be recovered
DUsers lose access to Azure resources
Explanation
When deleted, an Azure Key Vault enters a soft-delete state for recovery, while the other options incorrectly state the deletion outcome.
Q49
Which Azure service is best for managing identity access?
AAzure Active Directory
BAzure Storage
CAzure VM
DAzure Functions
Explanation
Azure Active Directory manages user identities and access, while the others serve different purposes.
Q50
A company needs to secure sensitive data in transit. What Azure feature should they use?
AAzure Firewall
BNetwork Security Groups
CVPN Gateway
DDDoS Protection
Explanation
A VPN Gateway provides secure connections, while the others enhance security but do not specifically encrypt traffic.