A company needs to control access to sensitive data for specific user roles. Which Azure feature should they use?
ANetwork Security Groups
BRole-Based Access Control (RBAC)
CAzure Virtual Network
DGeo-Replication
Explanation
RBAC directly controls user access based on roles, while the others do not manage user permissions effectively.
Q72
You are configuring an Azure Logic App to track unauthorized access attempts. What happens when you set a trigger for this app?
AIt stops all unauthorized access attempts.
BIt starts executing for each access attempt.
CIt requires manual approval for each attempt.
DIt logs access attempts without alerting.
Explanation
Triggers in Logic Apps execute per defined criteria, gathering data on unauthorized attempts; the others do not describe trigger behavior accurately.
Q73
Which Azure service can help automate security assessments?
AMicrosoft Defender for Cloud
BAzure Monitor
CAzure Sentinel
DAzure Security Center
Explanation
Microsoft Defender for Cloud automates assessments, unlike others focused on monitoring or incident response.
Q74
A company needs to restrict user access based on their geographic location. What Azure feature should they use?
AConditional Access Policies
BIdentity Protection
CNetwork Security Groups
DAzure Firewall
Explanation
Conditional Access Policies allow geographic restrictions, while others focus on different aspects of security.
Q75
You are configuring Azure Key Vault. What happens when you set a secret to disabled?
ASecret becomes non-retrievable
BOnly admins can access it
CSecret remains retrievable
DKey Vault is automated to delete it
Explanation
Disabling a secret makes it non-retrievable, whereas others suggest ongoing accessibility or deletion which is incorrect.
Q76
Which Azure service provides security management for your Azure resources?
AAzure Security Center
BAzure Sentinel
CAzure Information Protection
DAzure Active Directory
Explanation
Azure Security Center offers security management features for Azure resources, while others focus on specific areas.
Q77
A company needs to store large amounts of confidential documents and manage access based on user roles. Which Azure service should they utilize?
AAzure Blob Storage
BAzure Files
CAzure Databases
DAzure Key Vault
Explanation
Azure Blob Storage allows for document storage and role-based access, unlike the others that serve different purposes.
Q78
You are configuring Azure Network Security Groups. What happens if conflicting rules are applied?
AThe first rule takes precedence
BAll rules are ignored
CThe most permissive rule applies
DExplicit deny rules override allows
Explanation
Explicit deny rules will always override any allow rules, while the other options misinterpret the rule processing order.
Q79
Which service provides advanced threat protection for Azure resources?
AAzure Security Center
BAzure Firewall
CAzure Monitor
DAzure AD
Explanation
Azure Security Center offers threat detection, while the others serve different purposes.
Q80
A company needs to ensure data encryption at rest in Azure Storage. What should they enable?
AAzure Data Lake
BStorage Service Encryption
CPrivate Link
DMonitoring Alerts
Explanation
Storage Service Encryption automatically encrypts data at rest; the others are unrelated.