A company needs to manage user access across multiple Azure subscriptions. What should they implement?
AAzure Policy
BAzure Privileged Identity Management
CAzure Active Directory Management Groups
DAzure Resource Manager
Explanation
Azure Active Directory Management Groups enable unified access management across subscriptions.
Q102
You are configuring Azure Data Lake Storage. What happens when you create a file without any access control lists (ACLs)?
AEveryone has full access by default
BNo access for any users
COnly the creator has access
DAccess is granted to all users
Explanation
By default, only the creator has access when no ACLs are set for Azure Data Lake Storage files.
Q103
Which service provides identity and access management in Azure?
AAzure Active Directory
BAzure Key Vault
CAzure Security Center
DAzure Monitor
Explanation
Azure Active Directory is specifically designed for identity and access management, while the others serve different functions.
Q104
A company needs to ensure compliance with GDPR while using Azure. Which Azure feature should they prioritize?
AAzure Sentinel
BAzure Compliance Manager
CAzure DevOps
DAzure Blob Storage
Explanation
Azure Compliance Manager helps organizations track and manage compliance with regulations like GDPR, unlike the other options.
Q105
What happens when a user is deleted in Azure Active Directory?
AUser data is permanently deleted
BUser can be restored for 30 days
CUser automatically reactivates after 90 days
DUser is disabled but not deleted
Explanation
In Azure AD, deleted users can be restored within 30 days; other options do not accurately describe the behavior.
Q106
Which service provides real-time threat protection in Azure?
AAzure Security Center
BAzure Blob Storage
CAzure CDN
DAzure Functions
Explanation
Azure Security Center offers comprehensive security management and threat detection, while others serve different purposes.
Q107
A company needs to grant specific users access to Azure resources but restrict all other users. Which Azure feature should they use?
ARole-Based Access Control (RBAC)
BAzure Policy
CNetwork Security Groups
DIdentity Protection
Explanation
RBAC allows fine-grained access management for Azure resources, unlike the other options which serve different control functions.
Q108
You are configuring Azure AD Identity Protection. What happens if a user’s risk is flagged as high?
AUser is automatically deleted.
BUser's password must be reset.
CUser is sign-in blocked until resolved.
DUser is notified with no action taken.
Explanation
A high-risk flag can block the user's sign-in to protect the account, while other options do not correctly reflect handled actions.
Q109
Which Azure service provides a centralized identity management solution?
AAzure Active Directory
BAzure Blob Storage
CAzure Virtual Network
DAzure Kubernetes Service
Explanation
Azure Active Directory centralizes identity management, while others focus on storage or networking.
Q110
A company needs to ensure sensitive data is not lost during cloud migration. Which concept should they prioritize?
AData Redundancy
BAccess Control
CEncryption in Transit
DMonitoring Services
Explanation
Encryption in transit protects sensitive data during migration, unlike redundancy, access control, and monitoring, which are less directly related.