Which Azure service can be used to manage and monitor access to resources?
AAzure Active Directory
BAzure Blob Storage
CAzure Function Apps
DAzure DevOps
Explanation
Azure Active Directory is designed for identity management, while others do not manage access.
Q62
A company needs to limit access to certain data in Azure Storage based on the user's roles. What should they use?
AShared Access Signatures
BAzure Role-Based Access Control
CNetwork Security Groups
DService Endpoints
Explanation
Azure Role-Based Access Control enables role-specific access over Azure resources, unlike the other options.
Q63
What happens when a user tries to access a resource they have no permissions for?
AAccess is granted with warnings
BAn error stating insufficient permissions
CSystem reboots
DUser data is deleted
Explanation
An error indicating insufficient permissions is returned, as the system denies unauthorized access.
Q64
Which Azure service helps implement identity as a service?
AAzure Active Directory
BAzure Blob Storage
CAzure Functions
DAzure SQL Database
Explanation
Azure Active Directory provides identity as a service, while the others serve different purposes.
Q65
A company needs to segment network traffic to improve security. What should they configure?
ANetwork Security Groups
BVirtual Network Peering
CAzure Monitor
DPrivate Link
Explanation
Network Security Groups allow for traffic segmentation, while the others serve different functions.
Q66
What happens when Azure Policy evaluates an initiative with a denied effect?
AIt denies the resource creation.
BIt logs the event only.
CIt alerts administrators.
DIt allows the resource creation.
Explanation
A denied effect in Azure Policy prevents resource creation, while the other options are incorrect behavior.
Q67
Which Azure service is designed for secure key management?
AAzure Key Vault
BAzure Blob Storage
CAzure VPN Gateway
DAzure SQL Database
Explanation
Azure Key Vault is specifically designed for managing cryptographic keys, while the others serve different purposes.
Q68
A company needs to control access strictly based on user roles and ensure users can only perform actions permitted by their roles. Which Azure feature should they implement?
AAzure RBAC
BAzure AD Join
CAzure Policy
DAzure Firewall
Explanation
Azure RBAC (Role-Based Access Control) allows management of permissions based on user roles, unlike the others.
Q69
You are configuring a network security group (NSG) in Azure. What happens when conflicting rules exist with the same priority?
AOnly the first rule is applied
BBoth rules are ignored
CThe last rule takes effect
DThe lowest priority rule is applied
Explanation
In Azure NSGs, the last rule defined takes effect when rules with the same priority conflict, while other options misunderstand priority application.
Q70
Which Azure service provides threat detection and response?
AAzure Sentinel
BAzure Logic Apps
CAzure Functions
DAzure Blob Storage
Explanation
Azure Sentinel is designed for threat detection; the others do not offer this capability.