Authentication is the process of proving you are who you say you are, typically with a username and password. It answers the question, "Who are you?".
Incorrect! Try again.
2Which of the following best describes authorization?
Authentication vs Authorisation
Easy
A.The process of granting or denying access to specific resources
B.The process of tracking user login times
C.The process of creating a new user account
D.The process of proving your identity with a password
Correct Answer: The process of granting or denying access to specific resources
Explanation:
Authorization happens after successful authentication and determines the level of access an authenticated user has. It answers the question, "What are you allowed to do?".
Incorrect! Try again.
3A user successfully logs into a system but is blocked from opening a confidential folder. This is an example of a successful authentication followed by a denial of:
Authentication vs Authorisation
Easy
A.Identification
B.Registration
C.Authorization
D.Authentication
Correct Answer: Authorization
Explanation:
The user's identity was successfully authenticated (they logged in), but they were not authorized (did not have the necessary permissions) to access the specific folder.
Incorrect! Try again.
4What is the core principle of a Zero Trust security model?
Zero trust
Easy
A.Never trust, always verify
B.Trust everyone inside the corporate network
C.Only verify users accessing from outside the network
D.Trust devices, but not users
Correct Answer: Never trust, always verify
Explanation:
The Zero Trust model operates on the principle of assuming a breach. It does not trust any user or device by default, requiring verification for every access request, regardless of its origin.
Incorrect! Try again.
5In a Zero Trust framework, what does the principle of "least privileged access" mean?
Zero trust
Easy
A.Give users just-in-time and just-enough-access to do their job
B.Give users access to everything, but monitor their activity
C.Give users privileges based on their seniority
D.Give all users administrator rights to simplify management
Correct Answer: Give users just-in-time and just-enough-access to do their job
Explanation:
Least privileged access is a fundamental pillar of Zero Trust. It ensures that users are only granted the specific permissions they need, for the shortest time necessary, to complete a task, minimizing potential security risks.
Incorrect! Try again.
6In the shared responsibility model for IaaS (Infrastructure as a Service), who is responsible for securing the physical datacenter?
Cloud security
Easy
A.The cloud provider
B.The end-user
C.The customer
D.A third-party security vendor
Correct Answer: The cloud provider
Explanation:
In all cloud service models (IaaS, PaaS, SaaS), the cloud provider is always responsible for the security of the physical infrastructure, such as datacenters, servers, and networking hardware.
Incorrect! Try again.
7What is a basic security best practice for managing identities in the cloud?
Cloud security
Easy
A.Never changing your password
B.Enforcing Multi-Factor Authentication (MFA)
C.Disabling all security alerts to reduce noise
D.Using a single, shared administrator account for all IT staff
MFA adds a critical layer of security by requiring two or more verification methods to prove a user's identity, significantly reducing the risk of unauthorized access from compromised credentials.
Incorrect! Try again.
8What is Microsoft Entra ID?
Understand Microsoft Entra ID
Easy
A.A service for hosting virtual machines
B.A cloud-based identity and access management service
C.A tool for creating websites
D.A cloud-based database service
Correct Answer: A cloud-based identity and access management service
Explanation:
Microsoft Entra ID (formerly Azure Active Directory) is Microsoft's multi-tenant, cloud-based directory and identity management service. It provides user authentication, single sign-on (SSO), and access management for various applications.
Incorrect! Try again.
9A company wants to allow users to sign in to thousands of different SaaS applications like Microsoft 365 and Salesforce with a single set of credentials. Which Microsoft Entra ID feature supports this?
Understand Microsoft Entra ID
Easy
A.Virtual Machines
B.Single Sign-On (SSO)
C.Azure Storage
D.Azure SQL Database
Correct Answer: Single Sign-On (SSO)
Explanation:
Single Sign-On (SSO) is a key feature of Microsoft Entra ID that allows users to authenticate once and gain access to multiple different applications and resources without needing to re-enter their credentials.
Incorrect! Try again.
10Microsoft Entra ID can be synchronized with which on-premises directory service to create a hybrid identity solution?
Understand Microsoft Entra ID
Easy
A.Windows Server Active Directory
B.Novell eDirectory
C.Apple Open Directory
D.LDAP Directory
Correct Answer: Windows Server Active Directory
Explanation:
A common hybrid scenario involves using Microsoft Entra Connect to synchronize user identities from a traditional on-premises Windows Server Active Directory to the cloud-based Microsoft Entra ID.
Incorrect! Try again.
11What is the main advantage of using groups in Microsoft Entra ID for managing access?
configure user and group accounts
Easy
A.It makes the directory structure more complex
B.It forces users to have stronger passwords
C.It is the only way to assign licenses
D.It simplifies permission management for multiple users
Correct Answer: It simplifies permission management for multiple users
Explanation:
Groups allow administrators to grant access rights and permissions to a collection of users at once. Managing group membership is far more efficient than assigning permissions to each individual user.
Incorrect! Try again.
12In Microsoft Entra ID, which type of group automatically manages its membership based on rules, such as a user's department?
configure user and group accounts
Easy
A.Dynamic
B.Static
C.Manual
D.Assigned
Correct Answer: Dynamic
Explanation:
Dynamic groups use rules based on user or device attributes to automatically add or remove members. This reduces administrative overhead as membership is kept up-to-date without manual intervention.
Incorrect! Try again.
13When you invite a user from another organization to collaborate, what type of user account is created in your Microsoft Entra ID tenant?
configure user and group accounts
Easy
A.Guest user
B.Member user
C.Admin user
D.Service user
Correct Answer: Guest user
Explanation:
Guest users are B2B (business-to-business) collaboration accounts. They are for external users that you invite to your tenant to grant them access to specific apps or resources.
Incorrect! Try again.
14What does RBAC stand for?
Configure role-based access control
Easy
A.Rule-Based Application Configuration
B.Resource-Based Access Control
C.Role-Based Access Control
D.Resource-Based Authentication Credential
Correct Answer: Role-Based Access Control
Explanation:
RBAC stands for Role-Based Access Control, a system for managing access to resources based on the roles of individual users within an organization.
Incorrect! Try again.
15In Azure RBAC, what are the three main components of a role assignment?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Easy
A.Security Principal, Role Definition, and Scope
B.Virtual Machine, Storage Account, and Network
C.Subscription, Resource, and Region
D.User, Password, and MFA
Correct Answer: Security Principal, Role Definition, and Scope
Explanation:
A role assignment in Azure connects three elements: a Security Principal (who gets access - user, group), a Role Definition (what they can do - e.g., 'Reader'), and a Scope (what resources the access applies to - e.g., a specific resource group).
Incorrect! Try again.
16Which built-in Azure RBAC role allows a user to view all resources but not make any changes?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Easy
A.Contributor
B.Owner
C.Administrator
D.Reader
Correct Answer: Reader
Explanation:
The Reader role provides read-only access to Azure resources. Users with this role can view everything but cannot create, update, or delete resources.
Incorrect! Try again.
17What is meant by "scope" in Azure RBAC?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Easy
A.The set of resources to which the access permissions apply
B.The specific set of permissions in a role
C.The user or group receiving permissions
D.The geographical region of the datacenter
Correct Answer: The set of resources to which the access permissions apply
Explanation:
Scope defines the boundary for the role assignment. It can be a management group, a subscription, a resource group, or an individual resource. Permissions are inherited by lower-level scopes.
Incorrect! Try again.
18What is the primary function of a Conditional Access policy?
Identity Governance and Conditional Access Policies
Easy
A.To automatically create new user accounts
B.To delete inactive user accounts
C.To assign roles to users permanently
D.To enforce controls like MFA based on signals from a user's sign-in
Correct Answer: To enforce controls like MFA based on signals from a user's sign-in
Explanation:
Conditional Access policies are if-then statements. If a user meets certain conditions (like signing in from an unfamiliar location), then an access control (like requiring MFA or blocking access) is enforced.
Incorrect! Try again.
19Which of the following is an example of a condition used in a Conditional Access policy?
Identity Governance and Conditional Access Policies
Easy
A condition is a signal that is evaluated. Common conditions include the user's location, the device they are using, the application they are accessing, and the real-time sign-in risk. Requiring MFA and blocking access are controls, not conditions.
Incorrect! Try again.
20What is the main purpose of Microsoft Entra Identity Governance?
Identity Governance and Conditional Access Policies
Easy
A.To design the network topology for a cloud environment
B.To provide a backup and recovery solution for virtual machines
C.To manage the physical security of datacenters
D.To manage the identity and access lifecycle, ensuring the right people have the right access
Correct Answer: To manage the identity and access lifecycle, ensuring the right people have the right access
Explanation:
Identity Governance focuses on visibility and control over the access lifecycle. It includes features like access reviews, privileged identity management, and entitlement management to ensure access is appropriate and removed when no longer needed.
Incorrect! Try again.
21A user successfully provides their username, password, and a one-time code from their authenticator app to access a cloud management portal. However, when they try to delete a virtual machine, they receive an "Access Denied" message. Which statement accurately describes this situation?
Authentication vs Authorisation
Medium
A.Authentication was successful, but authorisation failed.
B.The user's one-time code was invalid, leading to a partial login state.
C.Both authentication and authorisation failed.
D.Authentication failed, but authorisation was successful.
Correct Answer: Authentication was successful, but authorisation failed.
Explanation:
Authentication is the process of verifying a user's identity, which was successful when the user logged in with their credentials and MFA. Authorisation is the process of determining what an authenticated user is allowed to do. The "Access Denied" message indicates that the user's identity was verified, but they do not have the necessary permissions (authorisation) to perform the delete action.
Incorrect! Try again.
22A company is implementing a Zero Trust security model. Which of the following architectural decisions best embodies the core principle of "assume breach"?
Zero trust
Medium
A.Implementing a strong perimeter firewall and trusting all traffic originating from inside the corporate network.
B.Granting all employees local administrator rights on their workstations to reduce IT support tickets.
C.Requiring users to change their passwords every 30 days.
D.Segmenting networks into smaller, isolated zones and encrypting all internal traffic between services.
Correct Answer: Segmenting networks into smaller, isolated zones and encrypting all internal traffic between services.
Explanation:
The "assume breach" principle means you operate as if an attacker is already inside your network. Micro-segmentation and encrypting internal traffic limit an attacker's ability to move laterally and eavesdrop on communications, which directly addresses this principle. A strong perimeter, password policies, and admin rights are security measures, but they don't directly reflect the operational mindset of assuming a breach has already occurred.
Incorrect! Try again.
23An IT administrator wants to create a Microsoft Entra Conditional Access policy that requires users from a specific partner organization (guests) to use Multi-Factor Authentication (MFA) only when they access a specific enterprise application named 'ProjectPhoenix'. What are the three most critical components to configure in this policy?
Conditional Access Policies
Medium
A.Users (All users), Conditions (Device platforms), and Grant controls (Require MFA).
B.Users (All guest users), Cloud apps ('ProjectPhoenix'), and Grant controls (Require MFA).
C.Conditions (Sign-in risk), Cloud apps ('All cloud apps'), and Grant controls (Require compliant device).
Correct Answer: Users (All guest users), Cloud apps ('ProjectPhoenix'), and Grant controls (Require MFA).
Explanation:
To meet the specific requirement, the policy must be targeted correctly. The 'Users' assignment should be scoped to 'All guest and external users'. The 'Cloud apps' assignment must target the specific 'ProjectPhoenix' application. Finally, the 'Grant' control must be set to 'Require multi-factor authentication'. The other options either target the wrong users, the wrong apps, or apply the wrong controls.
Incorrect! Try again.
24A developer needs permission to restart and monitor Virtual Machines within a specific resource group named dev-rg, but should not be able to modify networking or storage settings. Which of the following is the most appropriate role assignment according to the principle of least privilege?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Medium
A.Assign the Contributor role at the subscription scope.
B.Assign the Owner role at the dev-rg resource group scope.
C.Assign the Virtual Machine User Login role at the dev-rg resource group scope.
D.Assign the Virtual Machine Contributor role at the dev-rg resource group scope.
Correct Answer: Assign the Virtual Machine Contributor role at the dev-rg resource group scope.
Explanation:
The Virtual Machine Contributor role provides permissions to manage virtual machines (including restarting them) but does not include permissions to manage the virtual network or storage accounts they connect to. Assigning this role at the specific resource group scope (dev-rg) ensures the developer's permissions are limited only to the resources they need to manage, perfectly aligning with the principle of least privilege. Contributor and Owner are too broad, and Virtual Machine User Login only allows logging into the VM, not managing it.
Incorrect! Try again.
25A company wants to allow users to request access to a bundle of resources (a SharePoint site, a security group, and an enterprise application) required for a specific project. The request should require approval from the user's manager. Which Microsoft Entra ID Governance feature is designed for this scenario?
Identity Governance
Medium
A.Privileged Identity Management (PIM).
B.Conditional Access Policies.
C.Access Reviews.
D.Access Packages in Entitlement Management.
Correct Answer: Access Packages in Entitlement Management.
Explanation:
Entitlement Management is designed to manage identity and access lifecycle at scale. Access Packages are bundles of resources that users can request. They can be configured with approval workflows, such as requiring manager approval, which perfectly fits this requirement. Access Reviews are for periodic re-certification of access, PIM is for managing privileged roles, and Conditional Access is for enforcing access policies at the time of sign-in.
Incorrect! Try again.
26You need to create a group in Microsoft Entra ID that automatically includes all users whose 'department' attribute is set to 'Sales'. The group membership must update automatically when a user's department is changed to or from 'Sales'. What type of group should you create?
configure user and group accounts
Medium
A.Security group with 'Dynamic User' membership type.
B.Distribution group with 'Dynamic Device' membership type.
C.Security group with 'Assigned' membership type.
D.Microsoft 365 group with 'Assigned' membership type.
Correct Answer: Security group with 'Dynamic User' membership type.
Explanation:
Dynamic groups in Microsoft Entra ID automatically manage membership based on rules that query user or device attributes. To automatically populate a group based on the 'department' attribute, you must create a group with a 'Dynamic User' membership type and configure a rule such as user.department -eq "Sales". 'Assigned' membership requires manual addition and removal of members.
Incorrect! Try again.
27A company has an on-premises Active Directory Domain Services (AD DS) environment and wants to synchronize user identities to Microsoft Entra ID to enable single sign-on for cloud applications. Which tool is primarily used for this purpose?
Understand Microsoft Entra ID
Medium
A.Azure Arc
B.Microsoft Entra Connect Sync
C.Active Directory Federation Services (AD FS)
D.Azure Policy
Correct Answer: Microsoft Entra Connect Sync
Explanation:
Microsoft Entra Connect is the tool designed to meet hybrid identity goals. Its synchronization service (Entra Connect Sync) is responsible for creating users, groups, and other objects in Microsoft Entra ID based on the on-premises Active Directory. It also synchronizes password hashes to enable seamless sign-on. While AD FS can be used for federation, Entra Connect is the core tool for synchronization.
Incorrect! Try again.
28Which pillar of the Zero Trust model is most directly addressed by implementing a solution that provides just-in-time (JIT) access to privileged administrator roles?
Zero trust
Medium
A.Verify explicitly.
B.Secure communications.
C.Assume breach.
D.Use least privileged access.
Correct Answer: Use least privileged access.
Explanation:
Just-in-time (JIT) access ensures that users only have elevated permissions for a limited time when they are actively needed. This is a direct implementation of the principle of least privileged access, as it removes standing, persistent access that could be exploited. While it relates to other pillars, its primary function is to minimize privilege.
Incorrect! Try again.
29You have assigned a user the Reader role on an Azure subscription. You then assign the same user the Contributor role on a resource group within that subscription. What will be the user's effective permissions on the resources inside that resource group?
Configure role-based access control
Medium
A.The user will have a combination of Reader and Contributor permissions, requiring them to choose a role at sign-in.
B.The user's access will be denied due to a role conflict.
C.The user will have Reader permissions, as the subscription-level role overrides the resource group role.
D.The user will have Contributor permissions, as RBAC assignments are additive and the most permissive role takes precedence at the resource scope.
Correct Answer: The user will have Contributor permissions, as RBAC assignments are additive and the most permissive role takes precedence at the resource scope.
Explanation:
Azure RBAC permissions are additive. When multiple role assignments are made, the permissions are the sum of those assignments. The assignment at a child scope (the resource group) grants additional permissions that are not denied by the parent scope (the subscription). Therefore, the user will have Reader permissions on all resources in the subscription and Contributor permissions on the specific resources within that resource group.
Incorrect! Try again.
30A security team detects that a user account is signing in from two different continents within a 10-minute window. Which Microsoft Entra ID feature is specifically designed to detect and automatically respond to such an event?
Cloud security
Medium
A.Microsoft Entra ID Protection
B.Azure Policy
C.Microsoft Entra Domain Services
D.Network Security Groups (NSGs)
Correct Answer: Microsoft Entra ID Protection
Explanation:
Microsoft Entra ID Protection is a feature that uses machine learning and heuristics to detect identity-based risks. One of its key capabilities is detecting impossible travel, where a user signs in from geographically distant locations in a short period. It can then be configured to automatically trigger a response, such as forcing a password reset or requiring MFA.
Incorrect! Try again.
31An application uses OAuth 2.0 to access an API on behalf of a user. The application first redirects the user to an identity provider to sign in. After successful sign-in, the application receives an access token. What is the primary purpose of this access token in the context of the API?
Authentication vs Authorisation
Medium
A.To encrypt the data being transmitted between the application and the API.
B.To identify the application itself, not the user.
C.To re-authenticate the user's identity on every API call.
D.To prove that the user has been authorised to access specific resources or actions on the API.
Correct Answer: To prove that the user has been authorised to access specific resources or actions on the API.
Explanation:
In the OAuth 2.0 flow, the initial sign-in handles authentication. The resulting access token represents authorisation. It is presented to the API (the resource server) with each request to prove that the application has been granted specific permissions (scopes) to act on behalf of the authenticated user. The API validates the token to decide if the requested action is allowed.
Incorrect! Try again.
32A company's policy requires that all users with the Global Administrator role must have their access reviewed and re-approved by the Chief Information Security Officer (CISO) every 30 days. Which specific feature should be configured to automate this compliance requirement?
Identity Governance
Medium
A.An Access Review in Microsoft Entra ID, scoped to the Global Administrator role with the CISO as the reviewer.
B.A dynamic group that removes users from the Global Administrator role after 30 days.
C.An Entitlement Management access package with a 30-day expiration policy.
D.A Conditional Access policy that blocks Global Administrators after 30 days of inactivity.
Correct Answer: An Access Review in Microsoft Entra ID, scoped to the Global Administrator role with the CISO as the reviewer.
Explanation:
Access Reviews are the designated tool for managing and recertifying access to resources and roles. You can create an access review specifically for a privileged role like Global Administrator, set a recurring schedule (e.g., monthly), and assign a specific person (the CISO) to perform the review and approve or deny continued access. This directly fulfills the policy requirement.
Incorrect! Try again.
33An organization is migrating to the cloud and wants to ensure that all newly created user accounts have a default usage location of 'United States' to ensure correct licensing is applied. How can an administrator automate this process in Microsoft Entra ID?
configure user and group accounts
Medium
A.Configure an Azure Policy for Microsoft Entra ID.
B.Create a dynamic group that assigns the usage location based on a user attribute.
C.Set the default 'Usage location' property in the Microsoft Entra ID user settings.
D.Use a PowerShell script that runs daily to update the usage location for new users.
Correct Answer: Use a PowerShell script that runs daily to update the usage location for new users.
Explanation:
While it seems there should be a simpler way, Microsoft Entra ID does not have a native setting for a default usage location for all new users. Dynamic groups assign members based on attributes; they don't set attributes. Azure Policy primarily governs Azure resources, not Entra ID user properties directly. Therefore, the most common and reliable method to automate this is to use a PowerShell script (often run as an Azure Automation runbook) that periodically finds users without a usage location and sets it to the desired default.
Incorrect! Try again.
34A custom service principal for a CI/CD pipeline needs to deploy application code to an existing Azure App Service, but it must be prevented from changing the App Service Plan (e.g., scaling it up) or its network settings. Which built-in role is the most suitable to assign to the service principal at the App Service's scope?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Medium
A.App Service Contributor
B.Website Contributor
C.Contributor
D.Reader
Correct Answer: Website Contributor
Explanation:
The Website Contributor role is specifically designed for this scenario. It grants permissions to manage the content of web apps (i.e., deploy code) but excludes permissions to manage the App Service Plan itself. App Service Contributor and Contributor are too permissive as they would allow changes to the plan and other settings. Reader would not allow code deployment.
Incorrect! Try again.
35An organization wants to block all sign-in attempts from countries where it has no business operations. However, they need to allow specific executives who travel frequently to be exempt from this rule. How should this be configured in a Conditional Access policy?
Conditional Access Policies
Medium
A.It is not possible to exclude users from a block policy; the executives must use a VPN.
B.Configure named locations for the blocked countries and apply a 'Deny' Azure Policy at the subscription level.
C.Create two policies: one to block all users from the specified countries, and a second, higher-priority policy to allow the executive user group.
D.Create one policy. In 'Conditions', configure 'Locations' to include the blocked countries. In 'Users and groups', exclude the executive user group.
Correct Answer: Create one policy. In 'Conditions', configure 'Locations' to include the blocked countries. In 'Users and groups', exclude the executive user group.
Explanation:
Conditional Access policies allow for fine-grained control. The most efficient way to achieve this is within a single policy. The policy is targeted to 'All users' by default, then the specific executive group is added to the 'Exclude' tab under 'Users and groups'. The 'Conditions' are set to the named locations of the blocked countries, and the 'Grant' control is set to 'Block access'. The exclusion ensures the policy does not apply to the traveling executives.
Incorrect! Try again.
36What is the primary difference between a Microsoft Entra ID tenant and an Azure subscription?
Understand Microsoft Entra ID
Medium
A.A tenant is used for billing, and a subscription is used for identity.
B.A tenant is a dedicated instance of Microsoft Entra ID representing an organization for identity management, while a subscription is a billing and management boundary for Azure resources.
C.There is no difference; the terms are used interchangeably.
D.A subscription contains one or more tenants for resource isolation.
Correct Answer: A tenant is a dedicated instance of Microsoft Entra ID representing an organization for identity management, while a subscription is a billing and management boundary for Azure resources.
Explanation:
This is a fundamental concept. The Microsoft Entra ID tenant is the identity and access management service for an organization. An Azure subscription is an agreement with Microsoft to use one or more cloud services, for which charges accrue. An Azure subscription has a trust relationship with exactly one Microsoft Entra ID tenant, which is used to secure and manage access to the resources within that subscription.
Incorrect! Try again.
37A security architect is designing a system based on Zero Trust principles. They decide that instead of using long-lived API keys, services must acquire short-lived access tokens from a central identity provider to communicate with each other. This design choice primarily strengthens which Zero Trust pillar?
Zero trust
Medium
A.Secure communications.
B.Assume breach.
C.Verify explicitly.
D.Use least privileged access.
Correct Answer: Verify explicitly.
Explanation:
Using short-lived tokens forces services to re-authenticate and re-authorize frequently with a central authority. This process of continuous validation aligns directly with the 'Verify explicitly' pillar, which mandates that every access request should be authenticated and authorized. While it also helps with 'Assume breach' (by limiting the window of opportunity for a compromised token), its core function is explicit verification for every session.
Incorrect! Try again.
38You need to grant an external auditing firm temporary access to review configurations in your Azure environment. The auditors are from a different organization that also uses Microsoft Entra ID. What is the most secure and efficient method to provide them with the necessary access?
configure user and group accounts
Medium
A.Use Microsoft Entra B2C to create a separate user flow and directory for the auditors.
B.Invite them as B2B guest users to your tenant and assign them the Reader role on the required scope.
C.Ask for their personal Microsoft account emails and grant them access directly.
D.Create new member user accounts (e.g., auditor1@yourcompany.com) for them in your tenant with temporary passwords.
Correct Answer: Invite them as B2B guest users to your tenant and assign them the Reader role on the required scope.
Explanation:
Microsoft Entra B2B (Business-to-Business) collaboration is the designed feature for this exact scenario. It allows you to securely share your applications and services with guest users from any other organization, while maintaining control over your own corporate data. The auditors can use their own corporate credentials to sign in, and you can apply security policies and easily revoke their access when the audit is complete. Creating member accounts or using personal accounts reduces security and manageability.
Incorrect! Try again.
39To enhance security for privileged accounts, an administrator enables Privileged Identity Management (PIM) for the Global Administrator role. A user who is eligible for this role needs to perform an administrative task. What is the standard process they must follow to elevate their permissions?
Cloud security
Medium
A.The user's account is permanently assigned the Global Administrator role, but their activities are more closely monitored by PIM.
B.They must go to the PIM portal, request activation of the role, provide a justification, potentially pass an MFA check, and then they will have the role for a limited time.
C.They must contact another administrator who has a permanent Global Administrator role to perform the task for them.
D.They sign in normally, and PIM automatically grants them the role based on the sign-in risk level.
Correct Answer: They must go to the PIM portal, request activation of the role, provide a justification, potentially pass an MFA check, and then they will have the role for a limited time.
Explanation:
PIM operates on the principle of just-in-time access. Instead of having permanent (standing) permissions, a user is made eligible for a role. To use the role's permissions, they must go through an explicit activation process. This typically involves providing a business justification and/or completing an MFA challenge. The role is then granted for a pre-configured, time-limited period, after which it is automatically revoked.
Incorrect! Try again.
40An administrator is unable to delete a resource group even though they have been assigned the Owner role at the resource group's scope. The deletion fails with an error message indicating a lock is present. What is the most likely reason for this failure?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Medium
A.The administrator must activate a privileged role using PIM before they can delete locked resources.
B.The Owner role does not include the Microsoft.Authorization/locks/delete permission.
C.A Conditional Access policy is blocking the delete action.
D.A CanNotDelete resource lock has been applied to the resource group or a resource within it, which prevents deletion even by Owners.
Correct Answer: A CanNotDelete resource lock has been applied to the resource group or a resource within it, which prevents deletion even by Owners.
Explanation:
Azure resource locks are a mechanism to prevent accidental deletion or modification of critical resources. A CanNotDelete lock applies to all users, regardless of their RBAC role, including Owner. To delete the resource group, the lock must first be removed by a user who has permissions to manage locks (such as an Owner).
Incorrect! Try again.
41A user, user@contoso.com, is a member of GroupA and GroupB. GroupA is assigned the Storage Blob Data Contributor role on a storage account sa1. GroupB is assigned a custom Azure RBAC role with a Deny assignment for the action Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete on the same storage account sa1. The user attempts to delete a blob within sa1. What is the outcome?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Hard
A.The outcome depends on which group membership was processed first by the Azure Resource Manager.
B.The delete operation is denied because Deny assignments always take precedence over Allow assignments.
C.The user is prompted to choose which role context to use for the operation, GroupA's or GroupB's.
D.The delete operation is allowed because the Storage Blob Data Contributor role includes the delete permission, and Azure RBAC is additive.
Correct Answer: The delete operation is denied because Deny assignments always take precedence over Allow assignments.
Explanation:
Azure RBAC has a specific order of evaluation. Deny assignments are evaluated first and take precedence over any Allow assignments (role assignments). Even though the user is part of a group that grants permission to delete blobs, the Deny assignment for the delete action on another group they are a member of will block the operation. Deny assignments are a powerful way to explicitly block access regardless of other roles.
Incorrect! Try again.
42An organization configures two Conditional Access policies. Policy A targets 'All Users', 'All Cloud Apps', and requires 'MFA' as a grant control. Policy B targets a security group 'High-Privilege Users', the 'Azure Management' cloud app, and requires 'Compliant or Hybrid Azure AD joined device' as a grant control. A user is a member of 'High-Privilege Users' and is attempting to sign in to the Azure Portal from a non-compliant, Azure AD registered device. Both policies are active. What is the outcome?
Conditional Access Policies
Hard
A.Access is granted after the user successfully completes MFA, as Policy A's less restrictive grant control is met.
B.Access is blocked because Policy B is more specific and its requirement for a compliant device is not met.
C.Access is blocked because the user's sign-in meets the conditions for both policies, and the combined controls (MFA AND a compliant/hybrid device) cannot be met.
D.The user is prompted to satisfy either MFA or the device compliance requirement to gain access.
Correct Answer: Access is blocked because the user's sign-in meets the conditions for both policies, and the combined controls (MFA AND a compliant/hybrid device) cannot be met.
Explanation:
When multiple Conditional Access policies apply to a single sign-in, all grant controls from all matching policies must be satisfied. This acts as a logical AND. In this scenario, the user's sign-in to the Azure Portal matches both Policy A (All users, All cloud apps) and Policy B (High-Privilege Users, Azure Management). Therefore, the user must satisfy both the 'MFA' requirement from Policy A and the 'Compliant or Hybrid Azure AD joined device' requirement from Policy B. Since their device is non-compliant, they cannot satisfy the second requirement, and access is blocked.
Incorrect! Try again.
43In a strict Zero Trust architecture, a developer needs to access a production Kubernetes cluster's API server, which is hosted in Azure Kubernetes Service (AKS) and integrated with Microsoft Entra ID. The developer is working from a corporate-managed, compliant device. Which combination of controls best represents the 'Assume Breach' principle for this specific access scenario?
Zero trust
Hard
A.Assigning the developer a permanent cluster-admin role and relying solely on network security groups (NSGs) to restrict access to the corporate network.
B.Granting the developer Owner role at the AKS resource group level, allowing them to generate their own kubeconfig file.
C.Using Privileged Identity Management (PIM) to provide just-in-time (JIT) cluster-admin role activation, combined with a Conditional Access policy requiring MFA and a compliant device.
D.Using a shared service principal with a long-lived secret stored in the developer's local machine configuration to authenticate to the AKS API.
Correct Answer: Using Privileged Identity Management (PIM) to provide just-in-time (JIT) cluster-admin role activation, combined with a Conditional Access policy requiring MFA and a compliant device.
Explanation:
The 'Assume Breach' principle of Zero Trust means that you operate as if an attacker has already breached the network perimeter. Therefore, you must protect resources internally. PIM for JIT access minimizes the time window an identity has elevated privileges, reducing the attack surface if the account is compromised. Combining this with Conditional Access that verifies the user's identity (MFA) and device health (compliant device) for every access attempt provides strong, dynamic, risk-based access control, which is central to assuming breach and verifying explicitly.
Incorrect! Try again.
44An Access Package in Microsoft Entra Identity Governance is configured with a policy that assigns users to a group named 'ProjectX-Members'. This policy has an annual access review requirement for group members. The 'If reviewers don't respond' setting for the review is configured to 'Take recommendations'. The system's recommendation for an inactive user, Jane, is 'Deny'. Jane's manager, the designated reviewer, is on a long vacation and does not respond to the review request before the deadline. What happens to Jane's membership in the 'ProjectX-Members' group?
Identity Governance
Hard
A.The access review is automatically escalated to a Global Administrator who must then approve or deny Jane's access.
B.Jane remains in the group because a manual decision from the reviewer is required to remove access.
C.Jane is removed from the group because the 'Take recommendations' setting will apply the system's 'Deny' recommendation.
D.Jane remains in the group, but her access is disabled until her manager completes the review.
Correct Answer: Jane is removed from the group because the 'Take recommendations' setting will apply the system's 'Deny' recommendation.
Explanation:
The 'If reviewers don't respond' setting is critical in automating access governance. When set to 'Take recommendations', the system will automatically apply its own recommendation if the human reviewer fails to act. Since the system recommended 'Deny' for the inactive user Jane, and her manager did not respond, Entra ID will automatically process the 'Deny' recommendation and remove her from the group and any other resources in the access package.
Incorrect! Try again.
45A single-page application (SPA) uses the OAuth 2.0 Implicit Flow (for demonstration purposes, though Authorization Code Flow with PKCE is recommended). It authenticates a user against Microsoft Entra ID and receives an id_token and an access_token in the URL fragment. The access_token has an audience (aud) claim for the Microsoft Graph API. The SPA then makes a call to a custom backend API (api://my-custom-api), passing this access_token. The custom API is also secured by Entra ID. What is the expected result of the API call?
Authentication vs Authorisation
Hard
A.The API call will succeed because the access_token was issued by a trusted issuer (Entra ID) and is cryptographically valid.
B.The API call will succeed, but the API will only have access to the user's identity information, not authorization to perform any actions.
C.The SPA will receive a CORS error from the browser because the token is being sent to a different domain.
D.The API call will fail with a 401 Unauthorized error because the access_token's audience (aud) claim does not match the custom API's identifier.
Correct Answer: The API call will fail with a 401 Unauthorized error because the access_token's audience (aud) claim does not match the custom API's identifier.
Explanation:
This question tests a core security principle of token-based authorization. An access_token is audience-specific. The aud claim declares the intended recipient (the API) of the token. When a resource server (the custom API in this case) receives a token, one of the first validation steps is to check if the aud claim matches its own identifier. Since the token was issued for the Microsoft Graph API, its aud claim will be for Graph (https://graph.microsoft.com). The custom API will see this mismatch, reject the token as not being intended for it, and return a 401 Unauthorized error.
Incorrect! Try again.
46Your organization uses dynamic membership rules for Microsoft 365 groups. You need to create a group that includes all users who are in the 'Sales' department OR are in the 'Marketing' department, but EXCLUDES any user whose job title contains the word 'Intern'. Which of the following dynamic membership rules correctly implements this logic?
This question tests the complex syntax and operator precedence of dynamic membership rules. The logic requires grouping the two department checks with an OR. Parentheses are crucial to ensure this OR condition is evaluated first. The result of that is then combined with the jobTitle exclusion using an AND. Option D is incorrect due to operator precedence; without parentheses, the -and would bind more tightly than -or, effectively creating the rule (user.department -eq "Sales") or (user.department -eq "Marketing" and user.jobTitle -notContains "Intern"), which is not the desired logic. Option C is incorrect because -ne is an exact match, while the requirement is to exclude titles containing 'Intern'. Option B uses -and for departments, which is impossible for a single user.
Incorrect! Try again.
47A resource hierarchy consists of a Management Group (MG1), a Subscription (Sub1) under MG1, and a Resource Group (RG1) in Sub1. A user is assigned the Reader role at the MG1 scope. They are also assigned the Contributor role at the RG1 scope. Finally, there is an Azure Policy Deny action in effect at the Sub1 scope that prevents the creation of Virtual Machines. The user attempts to create a new storage account in RG1 and then a new virtual machine in RG1. What will be the results?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Hard
A.Creating the storage account will fail because the inherited Reader role conflicts with the Contributor role, but creating the virtual machine will succeed.
B.Both operations will succeed because the Contributor role at the RG1 scope is more specific and overrides the inherited Reader role and the Azure Policy.
C.Both operations will fail because the Azure Policy Deny action at the subscription scope overrides the Contributor role at the resource group scope.
D.Creating the storage account will succeed, but creating the virtual machine will fail.
Correct Answer: Creating the storage account will succeed, but creating the virtual machine will fail.
Explanation:
This scenario tests the interaction between RBAC inheritance and Azure Policy. The user's effective permissions on RG1 are an additive combination of inherited and direct assignments, making them a Contributor (since Contributor includes all Reader permissions). Therefore, RBAC allows them to create both resources in RG1. However, Azure Policy is evaluated separately. The Deny policy at the subscription scope specifically blocks VM creation. This policy will block the VM deployment request even though the user has the necessary RBAC permissions. The policy does not mention storage accounts, so that operation is permitted by the user's Contributor role and is not blocked by the policy.
Incorrect! Try again.
48An enterprise application is registered in Microsoft Entra ID. You need to allow users from another Entra ID tenant (partner.com) to access this application while enforcing that only users from a specific security group within the partner.com tenant can sign in. How should you configure the application's authentication settings in your tenant?
Understand Microsoft Entra ID
Hard
A.Set up an Azure AD B2B federation with partner.com and create a dynamic group in your tenant that queries for users from the partner.com tenant's specific security group.
B.Configure the application for single-tenant access and manually invite each required user from partner.com as a B2B guest user, then assign them to the application.
C.Configure the application for multi-tenant access and enable the 'User assignment required?' setting. Then, have the partner.com admin grant consent and create a service principal in their tenant, assigning the required group to it.
D.Use Azure AD B2C and create a custom policy that uses an API connector to query the partner.com tenant's group membership during the sign-in journey.
Correct Answer: Configure the application for multi-tenant access and enable the 'User assignment required?' setting. Then, have the partner.com admin grant consent and create a service principal in their tenant, assigning the required group to it.
Explanation:
This is the standard and most scalable method for multi-tenant application control. By making the app multi-tenant, it can be provisioned in other tenants. When the partner.com admin grants consent, a service principal for your application is created in their tenant. They can then manage access to this service principal like any other enterprise app, including assigning specific users or groups to it. Setting 'User assignment required?' in your home tenant ensures that access isn't open by default.
Incorrect! Try again.
49A company wants to enforce phishing-resistant MFA for all administrative roles. They create a Conditional Access policy targeting users with 'Directory Roles' such as 'Global Administrator'. The policy's 'Grant' control is set to 'Require authentication strength' and they select a custom strength that only allows 'FIDO2 Security Key' and 'Windows Hello for Business'. A Global Administrator attempts to activate their role in PIM from a device that only supports MFA via the Authenticator App push notification. What is the expected behavior?
Conditional Access Policies
Hard
A.The user will be prompted to register a FIDO2 key or use Windows Hello for Business before they can proceed.
B.The policy will not apply because PIM activation is an internal Azure AD process, not a cloud app sign-in.
C.The PIM activation will be blocked because the user cannot satisfy the required authentication strength.
D.The PIM activation will succeed, as PIM's own MFA requirement is separate and will be satisfied by the Authenticator app.
Correct Answer: The PIM activation will be blocked because the user cannot satisfy the required authentication strength.
Explanation:
Conditional Access policies can be triggered by role activation in Privileged Identity Management (PIM). The 'Require authentication strength' grant control is a powerful feature that goes beyond simply requiring MFA; it dictates the type of MFA allowed. Since the administrator is trying to authenticate for role activation and their available method (Authenticator app push) is not in the list of allowed methods defined by the authentication strength, the grant control condition cannot be met, and access (in this case, the role activation) will be blocked.
Incorrect! Try again.
50A company is implementing a Zero Trust strategy and wants to secure data exfiltration from corporate devices. They are using Microsoft Defender for Endpoint and Conditional Access. An engineer designs a Conditional Access App Control policy with a 'Block downloads' session control for a specific, unsanctioned cloud storage application. A user on a corporate, Defender-managed device signs into this application. What happens when the user attempts to download a file?
Zero trust
Hard
A.The sign-in to the application is blocked entirely by the Conditional Access policy, so the user cannot even attempt a download.
B.The download is blocked at the network level by Defender for Endpoint before the request leaves the device.
C.The user's session is proxied through Microsoft Defender for Cloud Apps, and the download action is intercepted and blocked in real-time.
D.The user receives a warning but is allowed to proceed after providing a business justification.
Correct Answer: The user's session is proxied through Microsoft Defender for Cloud Apps, and the download action is intercepted and blocked in real-time.
Explanation:
This scenario describes the functionality of Conditional Access App Control, which integrates with Microsoft Defender for Cloud Apps (MDCA). When a Conditional Access policy with a session control is triggered, the user's session to the targeted cloud app is routed through a reverse proxy managed by MDCA. This proxy allows for real-time monitoring and control of in-session activities, such as blocking file downloads or uploads, without blocking access to the app itself. This is a key Zero Trust control for preventing data exfiltration.
Incorrect! Try again.
51You have created a custom RBAC role with the action Microsoft.Compute/virtualMachines/start/action and assigned it to a user at the scope of a specific virtual machine, VM1. This user does not have any other roles assigned anywhere. The user attempts to start VM1 via the Azure Portal. The operation fails. What is the most likely reason for the failure?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Hard
A.The custom role must be assigned at the resource group level, not directly on the resource.
B.Azure portal operations require the Microsoft.Portal/dashboards/read permission, which was not included in the custom role.
C.The user lacks the Microsoft.Resources/subscriptions/resourceGroups/read permission, which is required to navigate to the VM in the portal.
D.The start/action permission is insufficient; the user also needs the Microsoft.Compute/virtualMachines/write permission to modify the VM's state.
Correct Answer: The user lacks the Microsoft.Resources/subscriptions/resourceGroups/read permission, which is required to navigate to the VM in the portal.
Explanation:
This question highlights the difference between API permissions and portal usability permissions. While the user has the specific action permission to start the VM, the Azure Portal's user interface needs to read containing resources like resource groups and subscriptions to render the pages and locate the VM. Without at least read permissions on the resource group and subscription (Microsoft.Resources/subscriptions/resourceGroups/read), the user cannot navigate through the portal to find the VM and click the 'Start' button. The API call would likely succeed if made directly via CLI or PowerShell with the full resource ID, but the portal experience would fail.
Incorrect! Try again.
52An organization uses Microsoft Entra ID Privileged Identity Management (PIM) for Groups. A group, 'KeyVault-Admins', is PIM-enabled, and being a member of this group grants the 'Key Vault Crypto Officer' role to several Key Vaults via an RBAC assignment. A user, Priya, is an eligible member of this group. She activates her membership for 2 hours to perform a task. During this 2-hour window, what is the state of her role assignment?
Identity Governance
Hard
A.Priya is temporarily added as a direct member of the 'KeyVault-Admins' group, which grants her the RBAC role for the 2-hour window.
B.Priya's account is given a special attribute isPIMActivated=true that Azure Resource Manager interprets to grant the role.
C.A temporary security token is issued to Priya containing the group's object ID, but her group membership status in Entra ID does not change.
D.Priya is not added to the group. Instead, a temporary, direct 'Key Vault Crypto Officer' RBAC assignment is created for Priya on the Key Vaults for 2 hours.
Correct Answer: Priya is temporarily added as a direct member of the 'KeyVault-Admins' group, which grants her the RBAC role for the 2-hour window.
Explanation:
PIM for Groups works by making a user an active member of the security or Microsoft 365 group for the duration of their activation. When Priya activates her eligible assignment, the PIM service adds her user object to the 'KeyVault-Admins' group's membership list. Because that group is assigned the RBAC role, she inherits the permissions. When the activation expires, the PIM service removes her from the group's membership, thus revoking the inherited permissions. This mechanism allows for JIT access to all resources assigned to that group.
Incorrect! Try again.
53You are managing a large Microsoft Entra ID tenant and need to grant an application's service principal the ability to read all properties of all users except for a specific set of highly sensitive executive accounts. The executives are members of a security group called C-Level-Execs. How can this be achieved using Microsoft Graph permissions and Entra ID features?
configure user and group accounts
Hard
A.Create a custom security attribute for all non-executive users and grant the service principal a custom role that allows reading users with this attribute.
B.This is not possible; the User.Read.All permission is tenant-wide and cannot be restricted.
C.Assign the service principal to an Administrative Unit (AU) that contains all users except the executives, and then grant the service principal the User.Read.All Graph permission scoped to that AU.
D.Grant the service principal the User.Read.All Graph permission and create an Azure Policy that denies read access to members of the C-Level-Execs group.
Correct Answer: Assign the service principal to an Administrative Unit (AU) that contains all users except the executives, and then grant the service principal the User.Read.All Graph permission scoped to that AU.
Explanation:
Administrative Units (AUs) are the primary mechanism in Microsoft Entra ID for delegating administrative permissions over a subset of directory objects. You can create an AU containing the users you want the application to manage. Then, instead of assigning a directory role (like Directory Readers) at the tenant level, you assign it to the service principal with the scope of the AU. This effectively grants the User.Read.All permission but limits its application to only the members of that AU, achieving the desired least-privilege access model.
Incorrect! Try again.
54A user authenticates to a web API using OpenID Connect (OIDC). The API receives an ID Token. The API needs to verify the user's identity and also confirm that the user authenticated using a specific, high-assurance method (e.g., a FIDO2 key). Which OIDC claims should the API inspect to perform both these checks?
Authentication vs Authorisation
Hard
A.The iss and aud claims to identify the user, and the auth_time claim to verify the method.
B.The nonce claim to identify the user and the acr (Authentication Context Class Reference) claim to check the assurance level.
C.The sub claim to identify the user and the amr (Authentication Methods References) claim to check the authentication method.
D.The upn claim to identify the user and the mfa claim to confirm that multi-factor authentication was used.
Correct Answer: The sub claim to identify the user and the amr (Authentication Methods References) claim to check the authentication method.
Explanation:
This question requires deep knowledge of OIDC claims. The sub (subject) claim is the primary, stable identifier for the user and must be used for identification. The amr (Authentication Methods References) claim is a JSON array of strings that identify the authentication methods used in the authentication. For example, it might contain ['pwd', 'mfa', 'fido']. The API can inspect this array to confirm that the required FIDO2 method was used. The acr claim is related but refers to the assurance level of the authentication, not the specific method, and nonce is for preventing replay attacks.
Incorrect! Try again.
55Your CISO is concerned about attackers gaining access to an Azure administrator's session token and replaying it to access the Azure portal. You need to implement a control that mitigates this risk by ensuring the token is only valid from the administrator's original location. Which Microsoft Entra ID feature directly addresses this threat?
Cloud security
Hard
A.Azure AD Identity Protection with a user risk policy that forces a password change.
B.Configuring a named location for the corporate network and requiring MFA from outside this location.
Conditional Access token protection, also known as token binding or strict location enforcement, is a feature designed specifically to combat token theft and replay attacks. When enabled, it cryptographically binds the token to the device or browser it was issued to. For location enforcement, it ensures that if a token is stolen and replayed from a different IP address, Microsoft Entra ID will detect the location mismatch and invalidate the session, effectively blocking the attacker. The other options are good security controls but do not directly prevent a stolen token from being replayed from a different location.
Incorrect! Try again.
56A company has two Microsoft Entra ID tenants: a primary tenant (contoso.com) and a development tenant (dev.contoso.com). They want developers to use their primary contoso.com credentials to sign into applications registered in the dev.contoso.com tenant, without creating guest accounts for every developer in the dev tenant. Which configuration enables this seamless cross-tenant authentication?
Understand Microsoft Entra ID
Hard
A.Registering all dev applications as multi-tenant applications.
B.Configuring Cross-tenant access settings with B2B direct connect between the two tenants.
C.Using Microsoft Entra B2C as an identity broker between the two tenants.
D.Setting up a SAML federation trust between the two Entra ID tenants.
Correct Answer: Configuring Cross-tenant access settings with B2B direct connect between the two tenants.
Explanation:
B2B direct connect is a feature of External Identities designed for this exact scenario of seamless collaboration between two Entra ID tenants. It creates a mutual, two-way trust that allows users from one tenant to access resources in the other without needing to be represented as guest objects. This provides a much smoother user experience than traditional B2B collaboration, as the user accesses the resource as if it were in their home tenant. Making the apps multi-tenant would work but is less controlled; B2B direct connect allows for granular trust configuration.
Incorrect! Try again.
57You need to create a custom RBAC role that allows a user to perform a rolling restart of all virtual machine scale set (VMSS) instances, but nothing else on the VMSS resource. The user must not be able to change the VMSS model, capacity, or configuration. Which set of permissions is the most precise and follows the principle of least privilege?
This question requires precise knowledge of Azure resource provider actions. The Microsoft.Compute/virtualMachineScaleSets/restart/action permission specifically allows for the restart of all VMs in the scale set (a rolling restart). The .../instances/restart/action is for restarting specific instances, not the whole set. The .../write permission is far too broad and would allow the user to change the scale set's model, which violates the principle of least privilege. performMaintenance is a different operation. Therefore, the single restart/action on the parent resource is the correct, most granular permission for the stated task.
Incorrect! Try again.
58A managed identity, MI-FuncApp, is assigned to an Azure Function. This managed identity is granted the Storage Blob Data Reader role on a specific storage account, sa-data. A separate networking configuration is applied to the storage account, setting the default network access to 'Disabled' and adding a VNet service endpoint for the subnet where the Azure Function is integrated. There are no firewall IP rules. The function code attempts to read a blob from sa-data. What is the outcome?
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Hard
A.The operation succeeds because managed identities bypass network restrictions on Azure services.
B.The operation fails with an authorization error because the managed identity also needs the Reader role on the storage account itself to see its properties.
C.The operation succeeds because both the identity (RBAC) and network (VNet service endpoint) access paths are correctly configured.
D.The operation fails with a network error because service endpoints do not work for managed identity authentication.
Correct Answer: The operation succeeds because both the identity (RBAC) and network (VNet service endpoint) access paths are correctly configured.
Explanation:
This complex scenario tests the interplay of identity-based security (RBAC) and network-based security for Azure services. For access to be granted, both layers must permit it. The managed identity has the required data-plane RBAC role (Storage Blob Data Reader). The network path is secured via a service endpoint, which allows traffic from the integrated subnet to reach the storage account over the Azure backbone, even when public access is disabled. The managed identity's authentication token is passed within this trusted network traffic. Therefore, both the 'who' (identity) and the 'how' (network) are validated, and the access succeeds.
Incorrect! Try again.
59A security architect is designing a Zero Trust network for an application that uses an Azure Application Gateway with WAF, an internal Azure Kubernetes Service (AKS) cluster, and an Azure SQL Database. The architect insists that all traffic, including from the AKS pods to the Azure SQL Database, must be encrypted and authenticated using workload identities. Which combination of technologies best achieves this intra-Azure traffic security in line with Zero Trust principles?
Zero trust
Hard
A.Configure the Azure SQL firewall to only allow the public IP of the AKS egress gateway.
B.Use NSGs to allow traffic only between the AKS and SQL subnets and rely on the default Azure network encryption.
C.Deploy a service mesh like Istio within AKS to enforce mTLS between pods, and use SQL authentication with secrets stored in Azure Key Vault.
D.Use Microsoft Entra Workload ID for pods to get tokens, and enforce Azure AD authentication and TLS 1.2 on Azure SQL Database.
Correct Answer: Use Microsoft Entra Workload ID for pods to get tokens, and enforce Azure AD authentication and TLS 1.2 on Azure SQL Database.
Explanation:
This is the most complete Zero Trust solution. Zero Trust requires explicit verification for all access, even internal 'east-west' traffic. Microsoft Entra Workload ID allows Kubernetes pods to have their own Entra ID identity, eliminating the need for secrets. They can use this identity to acquire an access token for Azure SQL. Forcing Azure AD authentication on the SQL Database ensures it only accepts these valid, identity-based tokens. Enforcing TLS 1.2 ensures the data is encrypted in transit. This combination verifies the identity of the workload and secures the communication channel, perfectly aligning with the 'verify explicitly' and 'assume breach' principles.
Incorrect! Try again.
60A security team uses Microsoft Sentinel for SIEM. They onboard Microsoft Entra ID Protection alerts, which has generated a high-severity 'Unfamiliar sign-in properties' alert for a user, Bob. The security team wants to automate the response: if the risk level is 'High' and the user is a member of the 'Domain Admins' group, their account must be disabled immediately, and their sessions revoked. Which two Azure services are best suited to build this specific, conditional automation?
Cloud security
Hard
A.Azure Automation runbooks and Azure CLI
B.Microsoft Defender for Cloud and Just-In-Time (JIT) access
C.Azure Logic Apps and Microsoft Graph API
D.Azure Functions and Azure Policy
Correct Answer: Azure Logic Apps and Microsoft Graph API
Explanation:
This scenario requires a workflow automation tool that can be triggered by a security alert and can perform complex, conditional actions. Azure Logic Apps is the ideal tool for this. It has a built-in Sentinel connector that can trigger a playbook (a Logic App) when an alert is created. Inside the Logic App, you can parse the alert details (like risk level), then use the Microsoft Graph API connector to check the user's group memberships. Based on this logic, you can then call the Graph API again to disable the user account and revoke their sign-in sessions. This provides the most flexible and powerful way to build the required conditional response.