A company needs to ensure that only approved users can access sensitive data in Azure. What should they implement?
ARole-Based Access Control (RBAC)
BAzure Blob Storage
CResource Locking
DAzure Firewall
Explanation
Role-Based Access Control (RBAC) manages permissions; the other options do not directly control user access.
Q72
What happens when you disable Multi-Factor Authentication (MFA) for a user?
AUser can log in without verification
BUser's password is reset
CUser account is deleted
DUser must always use MFA
Explanation
Disabling MFA allows simplified login; the other options are not consequences of disabling MFA.
Q73
Which service within Azure provides automated compliance assessments?
AAzure Security Center
BAzure Monitor
CAzure Active Directory
DAzure DevOps
Explanation
Azure Security Center offers comprehensive compliance assessments, while the others focus on different aspects.
Q74
A company needs to ensure multi-factor authentication for critical resources. What should they implement?
AConditional Access Policies
BApplication Insights
CVirtual Network
DAzure Functions
Explanation
Conditional Access Policies enforce multi-factor authentication, unlike the other services.
Q75
You are configuring Azure Key Vault. What happens when a secret is deleted?
AIt's permanently removed immediately
BIt's moved to the recovery layer
CIt becomes inaccessible only
DIt's locked for 30 days
Explanation
Deleted secrets go to the recovery layer for possible restoration, unlike immediate deletion or access restrictions.
Q76
Which service provides identity protection based on user behavior?
AAzure Active Directory Identity Protection
BAzure Security Center
CAzure Information Protection
DAzure Key Vault
Explanation
Azure Active Directory Identity Protection uses user behavior analytics to detect anomalies, while the other options serve different security purposes.
Q77
A company needs to enforce least privilege access to its Azure resources. What should they implement?
ARole-Based Access Control (RBAC)
BNetwork Security Groups (NSGs)
CAzure Policy
DKey Vault Access Policies
Explanation
Role-Based Access Control (RBAC) allows fine-grained access management, unlike the other options which focus on different security aspects.
Q78
What happens when a user logs in with Multi-Factor Authentication (MFA) enabled and their second factor fails?
ALogin is successful, warning provided
BUser is denied access
CAccount is locked for 24 hours
DUser can reset second factor
Explanation
If the second factor fails, the user is denied access to enhance security, contrary to the other misleading options.
Q79
Which service provides identity management in Azure?
AAzure Active Directory
BAzure Synapse Analytics
CAzure Logic Apps
DAzure Blob Storage
Explanation
Azure Active Directory manages identities, while others are unrelated.
Q80
A company needs to ensure all its Azure resources are monitored for security vulnerabilities. Which Azure service should they use?
AAzure Monitor
BAzure Security Center
CAzure DevOps
DAzure Functions
Explanation
Azure Security Center specifically monitors security vulnerabilities.