Unit 2 - Practice Quiz

INT327 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary purpose of authentication?

Authentication vs Authorisation Easy
A. To verify a user's identity
B. To determine what a user can do with a resource
C. To log a user's activities for auditing
D. To assign permissions to a user group

2 Which of the following best describes authorization?

Authentication vs Authorisation Easy
A. The process of granting or denying access to specific resources
B. The process of tracking user login times
C. The process of creating a new user account
D. The process of proving your identity with a password

3 A user successfully logs into a system but is blocked from opening a confidential folder. This is an example of a successful authentication followed by a denial of:

Authentication vs Authorisation Easy
A. Identification
B. Registration
C. Authorization
D. Authentication

4 What is the core principle of a Zero Trust security model?

Zero trust Easy
A. Never trust, always verify
B. Trust everyone inside the corporate network
C. Only verify users accessing from outside the network
D. Trust devices, but not users

5 In a Zero Trust framework, what does the principle of "least privileged access" mean?

Zero trust Easy
A. Give users just-in-time and just-enough-access to do their job
B. Give users access to everything, but monitor their activity
C. Give users privileges based on their seniority
D. Give all users administrator rights to simplify management

6 In the shared responsibility model for IaaS (Infrastructure as a Service), who is responsible for securing the physical datacenter?

Cloud security Easy
A. The cloud provider
B. The end-user
C. The customer
D. A third-party security vendor

7 What is a basic security best practice for managing identities in the cloud?

Cloud security Easy
A. Never changing your password
B. Enforcing Multi-Factor Authentication (MFA)
C. Disabling all security alerts to reduce noise
D. Using a single, shared administrator account for all IT staff

8 What is Microsoft Entra ID?

Understand Microsoft Entra ID Easy
A. A service for hosting virtual machines
B. A cloud-based identity and access management service
C. A tool for creating websites
D. A cloud-based database service

9 A company wants to allow users to sign in to thousands of different SaaS applications like Microsoft 365 and Salesforce with a single set of credentials. Which Microsoft Entra ID feature supports this?

Understand Microsoft Entra ID Easy
A. Virtual Machines
B. Single Sign-On (SSO)
C. Azure Storage
D. Azure SQL Database

10 Microsoft Entra ID can be synchronized with which on-premises directory service to create a hybrid identity solution?

Understand Microsoft Entra ID Easy
A. Windows Server Active Directory
B. Novell eDirectory
C. Apple Open Directory
D. LDAP Directory

11 What is the main advantage of using groups in Microsoft Entra ID for managing access?

configure user and group accounts Easy
A. It makes the directory structure more complex
B. It forces users to have stronger passwords
C. It is the only way to assign licenses
D. It simplifies permission management for multiple users

12 In Microsoft Entra ID, which type of group automatically manages its membership based on rules, such as a user's department?

configure user and group accounts Easy
A. Dynamic
B. Static
C. Manual
D. Assigned

13 When you invite a user from another organization to collaborate, what type of user account is created in your Microsoft Entra ID tenant?

configure user and group accounts Easy
A. Guest user
B. Member user
C. Admin user
D. Service user

14 What does RBAC stand for?

Configure role-based access control Easy
A. Rule-Based Application Configuration
B. Resource-Based Access Control
C. Role-Based Access Control
D. Resource-Based Authentication Credential

15 In Azure RBAC, what are the three main components of a role assignment?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Easy
A. Security Principal, Role Definition, and Scope
B. Virtual Machine, Storage Account, and Network
C. Subscription, Resource, and Region
D. User, Password, and MFA

16 Which built-in Azure RBAC role allows a user to view all resources but not make any changes?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Easy
A. Contributor
B. Owner
C. Administrator
D. Reader

17 What is meant by "scope" in Azure RBAC?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Easy
A. The set of resources to which the access permissions apply
B. The specific set of permissions in a role
C. The user or group receiving permissions
D. The geographical region of the datacenter

18 What is the primary function of a Conditional Access policy?

Identity Governance and Conditional Access Policies Easy
A. To automatically create new user accounts
B. To delete inactive user accounts
C. To assign roles to users permanently
D. To enforce controls like MFA based on signals from a user's sign-in

19 Which of the following is an example of a condition used in a Conditional Access policy?

Identity Governance and Conditional Access Policies Easy
A. User's sign-in location (IP address)
B. Block access
C. Require Multi-Factor Authentication
D. Grant access

20 What is the main purpose of Microsoft Entra Identity Governance?

Identity Governance and Conditional Access Policies Easy
A. To design the network topology for a cloud environment
B. To provide a backup and recovery solution for virtual machines
C. To manage the physical security of datacenters
D. To manage the identity and access lifecycle, ensuring the right people have the right access

21 A user successfully provides their username, password, and a one-time code from their authenticator app to access a cloud management portal. However, when they try to delete a virtual machine, they receive an "Access Denied" message. Which statement accurately describes this situation?

Authentication vs Authorisation Medium
A. Authentication was successful, but authorisation failed.
B. The user's one-time code was invalid, leading to a partial login state.
C. Both authentication and authorisation failed.
D. Authentication failed, but authorisation was successful.

22 A company is implementing a Zero Trust security model. Which of the following architectural decisions best embodies the core principle of "assume breach"?

Zero trust Medium
A. Implementing a strong perimeter firewall and trusting all traffic originating from inside the corporate network.
B. Granting all employees local administrator rights on their workstations to reduce IT support tickets.
C. Requiring users to change their passwords every 30 days.
D. Segmenting networks into smaller, isolated zones and encrypting all internal traffic between services.

23 An IT administrator wants to create a Microsoft Entra Conditional Access policy that requires users from a specific partner organization (guests) to use Multi-Factor Authentication (MFA) only when they access a specific enterprise application named 'ProjectPhoenix'. What are the three most critical components to configure in this policy?

Conditional Access Policies Medium
A. Users (All users), Conditions (Device platforms), and Grant controls (Require MFA).
B. Users (All guest users), Cloud apps ('ProjectPhoenix'), and Grant controls (Require MFA).
C. Conditions (Sign-in risk), Cloud apps ('All cloud apps'), and Grant controls (Require compliant device).
D. Users (Specific internal group), Cloud apps ('ProjectPhoenix'), and Session controls (Use app enforced restrictions).

24 A developer needs permission to restart and monitor Virtual Machines within a specific resource group named dev-rg, but should not be able to modify networking or storage settings. Which of the following is the most appropriate role assignment according to the principle of least privilege?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Medium
A. Assign the Contributor role at the subscription scope.
B. Assign the Owner role at the dev-rg resource group scope.
C. Assign the Virtual Machine User Login role at the dev-rg resource group scope.
D. Assign the Virtual Machine Contributor role at the dev-rg resource group scope.

25 A company wants to allow users to request access to a bundle of resources (a SharePoint site, a security group, and an enterprise application) required for a specific project. The request should require approval from the user's manager. Which Microsoft Entra ID Governance feature is designed for this scenario?

Identity Governance Medium
A. Privileged Identity Management (PIM).
B. Conditional Access Policies.
C. Access Reviews.
D. Access Packages in Entitlement Management.

26 You need to create a group in Microsoft Entra ID that automatically includes all users whose 'department' attribute is set to 'Sales'. The group membership must update automatically when a user's department is changed to or from 'Sales'. What type of group should you create?

configure user and group accounts Medium
A. Security group with 'Dynamic User' membership type.
B. Distribution group with 'Dynamic Device' membership type.
C. Security group with 'Assigned' membership type.
D. Microsoft 365 group with 'Assigned' membership type.

27 A company has an on-premises Active Directory Domain Services (AD DS) environment and wants to synchronize user identities to Microsoft Entra ID to enable single sign-on for cloud applications. Which tool is primarily used for this purpose?

Understand Microsoft Entra ID Medium
A. Azure Arc
B. Microsoft Entra Connect Sync
C. Active Directory Federation Services (AD FS)
D. Azure Policy

28 Which pillar of the Zero Trust model is most directly addressed by implementing a solution that provides just-in-time (JIT) access to privileged administrator roles?

Zero trust Medium
A. Verify explicitly.
B. Secure communications.
C. Assume breach.
D. Use least privileged access.

29 You have assigned a user the Reader role on an Azure subscription. You then assign the same user the Contributor role on a resource group within that subscription. What will be the user's effective permissions on the resources inside that resource group?

Configure role-based access control Medium
A. The user will have a combination of Reader and Contributor permissions, requiring them to choose a role at sign-in.
B. The user's access will be denied due to a role conflict.
C. The user will have Reader permissions, as the subscription-level role overrides the resource group role.
D. The user will have Contributor permissions, as RBAC assignments are additive and the most permissive role takes precedence at the resource scope.

30 A security team detects that a user account is signing in from two different continents within a 10-minute window. Which Microsoft Entra ID feature is specifically designed to detect and automatically respond to such an event?

Cloud security Medium
A. Microsoft Entra ID Protection
B. Azure Policy
C. Microsoft Entra Domain Services
D. Network Security Groups (NSGs)

31 An application uses OAuth 2.0 to access an API on behalf of a user. The application first redirects the user to an identity provider to sign in. After successful sign-in, the application receives an access token. What is the primary purpose of this access token in the context of the API?

Authentication vs Authorisation Medium
A. To encrypt the data being transmitted between the application and the API.
B. To identify the application itself, not the user.
C. To re-authenticate the user's identity on every API call.
D. To prove that the user has been authorised to access specific resources or actions on the API.

32 A company's policy requires that all users with the Global Administrator role must have their access reviewed and re-approved by the Chief Information Security Officer (CISO) every 30 days. Which specific feature should be configured to automate this compliance requirement?

Identity Governance Medium
A. An Access Review in Microsoft Entra ID, scoped to the Global Administrator role with the CISO as the reviewer.
B. A dynamic group that removes users from the Global Administrator role after 30 days.
C. An Entitlement Management access package with a 30-day expiration policy.
D. A Conditional Access policy that blocks Global Administrators after 30 days of inactivity.

33 An organization is migrating to the cloud and wants to ensure that all newly created user accounts have a default usage location of 'United States' to ensure correct licensing is applied. How can an administrator automate this process in Microsoft Entra ID?

configure user and group accounts Medium
A. Configure an Azure Policy for Microsoft Entra ID.
B. Create a dynamic group that assigns the usage location based on a user attribute.
C. Set the default 'Usage location' property in the Microsoft Entra ID user settings.
D. Use a PowerShell script that runs daily to update the usage location for new users.

34 A custom service principal for a CI/CD pipeline needs to deploy application code to an existing Azure App Service, but it must be prevented from changing the App Service Plan (e.g., scaling it up) or its network settings. Which built-in role is the most suitable to assign to the service principal at the App Service's scope?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Medium
A. App Service Contributor
B. Website Contributor
C. Contributor
D. Reader

35 An organization wants to block all sign-in attempts from countries where it has no business operations. However, they need to allow specific executives who travel frequently to be exempt from this rule. How should this be configured in a Conditional Access policy?

Conditional Access Policies Medium
A. It is not possible to exclude users from a block policy; the executives must use a VPN.
B. Configure named locations for the blocked countries and apply a 'Deny' Azure Policy at the subscription level.
C. Create two policies: one to block all users from the specified countries, and a second, higher-priority policy to allow the executive user group.
D. Create one policy. In 'Conditions', configure 'Locations' to include the blocked countries. In 'Users and groups', exclude the executive user group.

36 What is the primary difference between a Microsoft Entra ID tenant and an Azure subscription?

Understand Microsoft Entra ID Medium
A. A tenant is used for billing, and a subscription is used for identity.
B. A tenant is a dedicated instance of Microsoft Entra ID representing an organization for identity management, while a subscription is a billing and management boundary for Azure resources.
C. There is no difference; the terms are used interchangeably.
D. A subscription contains one or more tenants for resource isolation.

37 A security architect is designing a system based on Zero Trust principles. They decide that instead of using long-lived API keys, services must acquire short-lived access tokens from a central identity provider to communicate with each other. This design choice primarily strengthens which Zero Trust pillar?

Zero trust Medium
A. Secure communications.
B. Assume breach.
C. Verify explicitly.
D. Use least privileged access.

38 You need to grant an external auditing firm temporary access to review configurations in your Azure environment. The auditors are from a different organization that also uses Microsoft Entra ID. What is the most secure and efficient method to provide them with the necessary access?

configure user and group accounts Medium
A. Use Microsoft Entra B2C to create a separate user flow and directory for the auditors.
B. Invite them as B2B guest users to your tenant and assign them the Reader role on the required scope.
C. Ask for their personal Microsoft account emails and grant them access directly.
D. Create new member user accounts (e.g., auditor1@yourcompany.com) for them in your tenant with temporary passwords.

39 To enhance security for privileged accounts, an administrator enables Privileged Identity Management (PIM) for the Global Administrator role. A user who is eligible for this role needs to perform an administrative task. What is the standard process they must follow to elevate their permissions?

Cloud security Medium
A. The user's account is permanently assigned the Global Administrator role, but their activities are more closely monitored by PIM.
B. They must go to the PIM portal, request activation of the role, provide a justification, potentially pass an MFA check, and then they will have the role for a limited time.
C. They must contact another administrator who has a permanent Global Administrator role to perform the task for them.
D. They sign in normally, and PIM automatically grants them the role based on the sign-in risk level.

40 An administrator is unable to delete a resource group even though they have been assigned the Owner role at the resource group's scope. The deletion fails with an error message indicating a lock is present. What is the most likely reason for this failure?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Medium
A. The administrator must activate a privileged role using PIM before they can delete locked resources.
B. The Owner role does not include the Microsoft.Authorization/locks/delete permission.
C. A Conditional Access policy is blocking the delete action.
D. A CanNotDelete resource lock has been applied to the resource group or a resource within it, which prevents deletion even by Owners.

41 A user, user@contoso.com, is a member of GroupA and GroupB. GroupA is assigned the Storage Blob Data Contributor role on a storage account sa1. GroupB is assigned a custom Azure RBAC role with a Deny assignment for the action Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete on the same storage account sa1. The user attempts to delete a blob within sa1. What is the outcome?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Hard
A. The outcome depends on which group membership was processed first by the Azure Resource Manager.
B. The delete operation is denied because Deny assignments always take precedence over Allow assignments.
C. The user is prompted to choose which role context to use for the operation, GroupA's or GroupB's.
D. The delete operation is allowed because the Storage Blob Data Contributor role includes the delete permission, and Azure RBAC is additive.

42 An organization configures two Conditional Access policies. Policy A targets 'All Users', 'All Cloud Apps', and requires 'MFA' as a grant control. Policy B targets a security group 'High-Privilege Users', the 'Azure Management' cloud app, and requires 'Compliant or Hybrid Azure AD joined device' as a grant control. A user is a member of 'High-Privilege Users' and is attempting to sign in to the Azure Portal from a non-compliant, Azure AD registered device. Both policies are active. What is the outcome?

Conditional Access Policies Hard
A. Access is granted after the user successfully completes MFA, as Policy A's less restrictive grant control is met.
B. Access is blocked because Policy B is more specific and its requirement for a compliant device is not met.
C. Access is blocked because the user's sign-in meets the conditions for both policies, and the combined controls (MFA AND a compliant/hybrid device) cannot be met.
D. The user is prompted to satisfy either MFA or the device compliance requirement to gain access.

43 In a strict Zero Trust architecture, a developer needs to access a production Kubernetes cluster's API server, which is hosted in Azure Kubernetes Service (AKS) and integrated with Microsoft Entra ID. The developer is working from a corporate-managed, compliant device. Which combination of controls best represents the 'Assume Breach' principle for this specific access scenario?

Zero trust Hard
A. Assigning the developer a permanent cluster-admin role and relying solely on network security groups (NSGs) to restrict access to the corporate network.
B. Granting the developer Owner role at the AKS resource group level, allowing them to generate their own kubeconfig file.
C. Using Privileged Identity Management (PIM) to provide just-in-time (JIT) cluster-admin role activation, combined with a Conditional Access policy requiring MFA and a compliant device.
D. Using a shared service principal with a long-lived secret stored in the developer's local machine configuration to authenticate to the AKS API.

44 An Access Package in Microsoft Entra Identity Governance is configured with a policy that assigns users to a group named 'ProjectX-Members'. This policy has an annual access review requirement for group members. The 'If reviewers don't respond' setting for the review is configured to 'Take recommendations'. The system's recommendation for an inactive user, Jane, is 'Deny'. Jane's manager, the designated reviewer, is on a long vacation and does not respond to the review request before the deadline. What happens to Jane's membership in the 'ProjectX-Members' group?

Identity Governance Hard
A. The access review is automatically escalated to a Global Administrator who must then approve or deny Jane's access.
B. Jane remains in the group because a manual decision from the reviewer is required to remove access.
C. Jane is removed from the group because the 'Take recommendations' setting will apply the system's 'Deny' recommendation.
D. Jane remains in the group, but her access is disabled until her manager completes the review.

45 A single-page application (SPA) uses the OAuth 2.0 Implicit Flow (for demonstration purposes, though Authorization Code Flow with PKCE is recommended). It authenticates a user against Microsoft Entra ID and receives an id_token and an access_token in the URL fragment. The access_token has an audience (aud) claim for the Microsoft Graph API. The SPA then makes a call to a custom backend API (api://my-custom-api), passing this access_token. The custom API is also secured by Entra ID. What is the expected result of the API call?

Authentication vs Authorisation Hard
A. The API call will succeed because the access_token was issued by a trusted issuer (Entra ID) and is cryptographically valid.
B. The API call will succeed, but the API will only have access to the user's identity information, not authorization to perform any actions.
C. The SPA will receive a CORS error from the browser because the token is being sent to a different domain.
D. The API call will fail with a 401 Unauthorized error because the access_token's audience (aud) claim does not match the custom API's identifier.

46 Your organization uses dynamic membership rules for Microsoft 365 groups. You need to create a group that includes all users who are in the 'Sales' department OR are in the 'Marketing' department, but EXCLUDES any user whose job title contains the word 'Intern'. Which of the following dynamic membership rules correctly implements this logic?

configure user and group accounts Hard
A. user.department -in ["Sales", "Marketing"] -and user.jobTitle -ne "Intern"
B. user.department -eq "Sales" -or user.department -eq "Marketing" -and user.jobTitle -notContains "Intern"
C. (user.department -eq "Sales" -and user.department -eq "Marketing") -or (user.jobTitle -notContains "Intern")
D. (user.department -eq "Sales" -or user.department -eq "Marketing") -and (user.jobTitle -notContains "Intern")

47 A resource hierarchy consists of a Management Group (MG1), a Subscription (Sub1) under MG1, and a Resource Group (RG1) in Sub1. A user is assigned the Reader role at the MG1 scope. They are also assigned the Contributor role at the RG1 scope. Finally, there is an Azure Policy Deny action in effect at the Sub1 scope that prevents the creation of Virtual Machines. The user attempts to create a new storage account in RG1 and then a new virtual machine in RG1. What will be the results?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Hard
A. Creating the storage account will fail because the inherited Reader role conflicts with the Contributor role, but creating the virtual machine will succeed.
B. Both operations will succeed because the Contributor role at the RG1 scope is more specific and overrides the inherited Reader role and the Azure Policy.
C. Both operations will fail because the Azure Policy Deny action at the subscription scope overrides the Contributor role at the resource group scope.
D. Creating the storage account will succeed, but creating the virtual machine will fail.

48 An enterprise application is registered in Microsoft Entra ID. You need to allow users from another Entra ID tenant (partner.com) to access this application while enforcing that only users from a specific security group within the partner.com tenant can sign in. How should you configure the application's authentication settings in your tenant?

Understand Microsoft Entra ID Hard
A. Set up an Azure AD B2B federation with partner.com and create a dynamic group in your tenant that queries for users from the partner.com tenant's specific security group.
B. Configure the application for single-tenant access and manually invite each required user from partner.com as a B2B guest user, then assign them to the application.
C. Configure the application for multi-tenant access and enable the 'User assignment required?' setting. Then, have the partner.com admin grant consent and create a service principal in their tenant, assigning the required group to it.
D. Use Azure AD B2C and create a custom policy that uses an API connector to query the partner.com tenant's group membership during the sign-in journey.

49 A company wants to enforce phishing-resistant MFA for all administrative roles. They create a Conditional Access policy targeting users with 'Directory Roles' such as 'Global Administrator'. The policy's 'Grant' control is set to 'Require authentication strength' and they select a custom strength that only allows 'FIDO2 Security Key' and 'Windows Hello for Business'. A Global Administrator attempts to activate their role in PIM from a device that only supports MFA via the Authenticator App push notification. What is the expected behavior?

Conditional Access Policies Hard
A. The user will be prompted to register a FIDO2 key or use Windows Hello for Business before they can proceed.
B. The policy will not apply because PIM activation is an internal Azure AD process, not a cloud app sign-in.
C. The PIM activation will be blocked because the user cannot satisfy the required authentication strength.
D. The PIM activation will succeed, as PIM's own MFA requirement is separate and will be satisfied by the Authenticator app.

50 A company is implementing a Zero Trust strategy and wants to secure data exfiltration from corporate devices. They are using Microsoft Defender for Endpoint and Conditional Access. An engineer designs a Conditional Access App Control policy with a 'Block downloads' session control for a specific, unsanctioned cloud storage application. A user on a corporate, Defender-managed device signs into this application. What happens when the user attempts to download a file?

Zero trust Hard
A. The sign-in to the application is blocked entirely by the Conditional Access policy, so the user cannot even attempt a download.
B. The download is blocked at the network level by Defender for Endpoint before the request leaves the device.
C. The user's session is proxied through Microsoft Defender for Cloud Apps, and the download action is intercepted and blocked in real-time.
D. The user receives a warning but is allowed to proceed after providing a business justification.

51 You have created a custom RBAC role with the action Microsoft.Compute/virtualMachines/start/action and assigned it to a user at the scope of a specific virtual machine, VM1. This user does not have any other roles assigned anywhere. The user attempts to start VM1 via the Azure Portal. The operation fails. What is the most likely reason for the failure?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Hard
A. The custom role must be assigned at the resource group level, not directly on the resource.
B. Azure portal operations require the Microsoft.Portal/dashboards/read permission, which was not included in the custom role.
C. The user lacks the Microsoft.Resources/subscriptions/resourceGroups/read permission, which is required to navigate to the VM in the portal.
D. The start/action permission is insufficient; the user also needs the Microsoft.Compute/virtualMachines/write permission to modify the VM's state.

52 An organization uses Microsoft Entra ID Privileged Identity Management (PIM) for Groups. A group, 'KeyVault-Admins', is PIM-enabled, and being a member of this group grants the 'Key Vault Crypto Officer' role to several Key Vaults via an RBAC assignment. A user, Priya, is an eligible member of this group. She activates her membership for 2 hours to perform a task. During this 2-hour window, what is the state of her role assignment?

Identity Governance Hard
A. Priya is temporarily added as a direct member of the 'KeyVault-Admins' group, which grants her the RBAC role for the 2-hour window.
B. Priya's account is given a special attribute isPIMActivated=true that Azure Resource Manager interprets to grant the role.
C. A temporary security token is issued to Priya containing the group's object ID, but her group membership status in Entra ID does not change.
D. Priya is not added to the group. Instead, a temporary, direct 'Key Vault Crypto Officer' RBAC assignment is created for Priya on the Key Vaults for 2 hours.

53 You are managing a large Microsoft Entra ID tenant and need to grant an application's service principal the ability to read all properties of all users except for a specific set of highly sensitive executive accounts. The executives are members of a security group called C-Level-Execs. How can this be achieved using Microsoft Graph permissions and Entra ID features?

configure user and group accounts Hard
A. Create a custom security attribute for all non-executive users and grant the service principal a custom role that allows reading users with this attribute.
B. This is not possible; the User.Read.All permission is tenant-wide and cannot be restricted.
C. Assign the service principal to an Administrative Unit (AU) that contains all users except the executives, and then grant the service principal the User.Read.All Graph permission scoped to that AU.
D. Grant the service principal the User.Read.All Graph permission and create an Azure Policy that denies read access to members of the C-Level-Execs group.

54 A user authenticates to a web API using OpenID Connect (OIDC). The API receives an ID Token. The API needs to verify the user's identity and also confirm that the user authenticated using a specific, high-assurance method (e.g., a FIDO2 key). Which OIDC claims should the API inspect to perform both these checks?

Authentication vs Authorisation Hard
A. The iss and aud claims to identify the user, and the auth_time claim to verify the method.
B. The nonce claim to identify the user and the acr (Authentication Context Class Reference) claim to check the assurance level.
C. The sub claim to identify the user and the amr (Authentication Methods References) claim to check the authentication method.
D. The upn claim to identify the user and the mfa claim to confirm that multi-factor authentication was used.

55 Your CISO is concerned about attackers gaining access to an Azure administrator's session token and replaying it to access the Azure portal. You need to implement a control that mitigates this risk by ensuring the token is only valid from the administrator's original location. Which Microsoft Entra ID feature directly addresses this threat?

Cloud security Hard
A. Azure AD Identity Protection with a user risk policy that forces a password change.
B. Configuring a named location for the corporate network and requiring MFA from outside this location.
C. Conditional Access token protection (Strictly enforce location policies)
D. Privileged Identity Management (PIM) with an approval workflow.

56 A company has two Microsoft Entra ID tenants: a primary tenant (contoso.com) and a development tenant (dev.contoso.com). They want developers to use their primary contoso.com credentials to sign into applications registered in the dev.contoso.com tenant, without creating guest accounts for every developer in the dev tenant. Which configuration enables this seamless cross-tenant authentication?

Understand Microsoft Entra ID Hard
A. Registering all dev applications as multi-tenant applications.
B. Configuring Cross-tenant access settings with B2B direct connect between the two tenants.
C. Using Microsoft Entra B2C as an identity broker between the two tenants.
D. Setting up a SAML federation trust between the two Entra ID tenants.

57 You need to create a custom RBAC role that allows a user to perform a rolling restart of all virtual machine scale set (VMSS) instances, but nothing else on the VMSS resource. The user must not be able to change the VMSS model, capacity, or configuration. Which set of permissions is the most precise and follows the principle of least privilege?

Configure role-based access control Hard
A. [Microsoft.Compute/virtualMachineScaleSets/read, Microsoft.Compute/virtualMachineScaleSets/performMaintenance/action]
B. [Microsoft.Compute/virtualMachineScaleSets/read, Microsoft.Compute/virtualMachineScaleSets/instances/restart/action]
C. [Microsoft.Compute/virtualMachineScaleSets/write, Microsoft.Compute/virtualMachineScaleSets/read]
D. [Microsoft.Compute/virtualMachineScaleSets/restart/action]

58 A managed identity, MI-FuncApp, is assigned to an Azure Function. This managed identity is granted the Storage Blob Data Reader role on a specific storage account, sa-data. A separate networking configuration is applied to the storage account, setting the default network access to 'Disabled' and adding a VNet service endpoint for the subnet where the Azure Function is integrated. There are no firewall IP rules. The function code attempts to read a blob from sa-data. What is the outcome?

Secure your Azure resources with Azure role-based access control (Azure RBAC) Hard
A. The operation succeeds because managed identities bypass network restrictions on Azure services.
B. The operation fails with an authorization error because the managed identity also needs the Reader role on the storage account itself to see its properties.
C. The operation succeeds because both the identity (RBAC) and network (VNet service endpoint) access paths are correctly configured.
D. The operation fails with a network error because service endpoints do not work for managed identity authentication.

59 A security architect is designing a Zero Trust network for an application that uses an Azure Application Gateway with WAF, an internal Azure Kubernetes Service (AKS) cluster, and an Azure SQL Database. The architect insists that all traffic, including from the AKS pods to the Azure SQL Database, must be encrypted and authenticated using workload identities. Which combination of technologies best achieves this intra-Azure traffic security in line with Zero Trust principles?

Zero trust Hard
A. Configure the Azure SQL firewall to only allow the public IP of the AKS egress gateway.
B. Use NSGs to allow traffic only between the AKS and SQL subnets and rely on the default Azure network encryption.
C. Deploy a service mesh like Istio within AKS to enforce mTLS between pods, and use SQL authentication with secrets stored in Azure Key Vault.
D. Use Microsoft Entra Workload ID for pods to get tokens, and enforce Azure AD authentication and TLS 1.2 on Azure SQL Database.

60 A security team uses Microsoft Sentinel for SIEM. They onboard Microsoft Entra ID Protection alerts, which has generated a high-severity 'Unfamiliar sign-in properties' alert for a user, Bob. The security team wants to automate the response: if the risk level is 'High' and the user is a member of the 'Domain Admins' group, their account must be disabled immediately, and their sessions revoked. Which two Azure services are best suited to build this specific, conditional automation?

Cloud security Hard
A. Azure Automation runbooks and Azure CLI
B. Microsoft Defender for Cloud and Just-In-Time (JIT) access
C. Azure Logic Apps and Microsoft Graph API
D. Azure Functions and Azure Policy