You are configuring Azure Policy and need to deny specific VM sizes. What is an important outcome of this configuration?
APolicy will only apply to new resources
BNon-compliant VMs will be deleted
CPolicy is ignored during deployment
DDeployment of those sizes will be blocked
Explanation
Policies block non-compliance; deletion does not occur automatically.
Q52
Which service provides advanced threat protection in Azure?
AAzure Security Center
BAzure Load Balancer
CAzure SQL Database
DAzure Virtual Network
Explanation
Azure Security Center offers threat protection, while others provide different functionalities.
Q53
A company needs to ensure that only certain users can access sensitive data in Azure. Which feature should they use?
ANetwork Security Groups
BRole-Based Access Control (RBAC)
CAzure Active Directory SSO
DAzure Backup
Explanation
RBAC restricts access based on roles, unlike the other options which do not manage access control.
Q54
What happens when an Azure resource is tagged with a specific label?
AResource becomes more secure
BIt receives lower costs automatically
CIt can be organized or categorized
DPerformance is improved significantly
Explanation
Tags help organize resources but do not affect security, cost, or performance directly.
Q55
Which Azure service provides unified security management?
AMicrosoft Defender 365
BAzure Security Center
CAzure Policy
DAzure Monitor
Explanation
Azure Security Center offers centralized security management, while others serve different functions.
Q56
A company needs to ensure that only specific employees can access sensitive data in Azure Storage. What should they use?
AManaged Identity
BAzure Role-Based Access Control
CNetwork Security Group
DAzure Firewall
Explanation
Azure Role-Based Access Control allows fine-grained access management, unlike the other options which do not address user permissions directly.
Q57
You are configuring Azure Policy. What happens if a resource does not comply with the policy?
ANothing, it's ignored
BThe resource is deleted
CAn audit entry is logged
DThe resource is immediately flagged
Explanation
When non-compliance occurs, Azure Policy logs an audit entry; it neither deletes nor immediately flags resources.
Q58
Which Azure service provides a sandboxed environment for testing code?
AAzure DevTest Labs
BAzure Functions
CAzure Logic Apps
DAzure API Management
Explanation
Azure DevTest Labs is specifically designed for creating test environments, unlike the others.
Q59
A company needs to ensure that all users must use multi-factor authentication (MFA). What Azure feature should they implement?
AConditional Access
BIdentity Protection
CPrivileged Identity Management
DAccess Reviews
Explanation
Conditional Access policies can enforce MFA based on user conditions.
Q60
You are configuring Azure Active Directory Identity Protection. What happens if 'user risk policy' grants access anyway?
AAccess is fully secure.
BAccess will prompt for MFA.
CAccess is logged but unrestricted.
DAccess will be denied.
Explanation
If access is granted, a prompt for MFA can be configured, ensuring a security layer.