Unit 3 - Practice Quiz

INT327 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary goal of cloud compliance?

Overview of Cloud Compliance Easy
A. To reduce the cost of cloud storage
B. To increase the speed of cloud servers
C. To ensure cloud services adhere to legal, regulatory, and corporate standards
D. To market cloud products more effectively

2 In the context of cloud computing, what does the "shared responsibility model" refer to?

Overview of Cloud Compliance Easy
A. The cloud provider and the customer share responsibility for security and compliance
B. All customers share the same physical server
C. The responsibility for compliance is shared between different government agencies
D. The customer is solely responsible for all aspects of compliance

3 Why is it important to adhere to regional data residency requirements in the cloud?

Overview of Cloud Compliance Easy
A. To comply with local laws that mandate where data must be stored
B. To get a discount on cloud services
C. To use a specific programming language
D. To make a website load faster for local users

4 The Digital Personal Data Protection (DPDP) Act is a data privacy law enacted by which country?

Digital Personal Data Protection Act Easy
A. India
B. Canada
C. United States
D. Australia

5 What is the primary purpose of the Digital Personal Data Protection (DPDP) Act?

Digital Personal Data Protection Act Easy
A. To set standards for hardware manufacturing
B. To regulate the price of internet services
C. To prevent all forms of cyberattacks
D. To protect the digital personal data of individuals

6 What does the acronym HIPAA stand for?

HIPAA Easy
A. Health Insurance Portability and Accountability Act
B. Health Information Privacy and Access Act
C. High-tech Information Portability and Authorization Act
D. Healthy Individual Privacy and Assurance Act

7 HIPAA regulations are primarily designed to protect what type of information?

HIPAA Easy
A. Protected Health Information (PHI)
B. Corporate trade secrets
C. Financial transaction data
D. Academic records

8 Which of the following industries is most directly impacted by HIPAA compliance requirements?

HIPAA Easy
A. Retail
B. Manufacturing
C. Transportation
D. Healthcare

9 The General Data Protection Regulation (GDPR) is a regulation in which region's law on data protection and privacy?

GDPR Easy
A. North America
B. European Union (EU)
C. Australia
D. Asia

10 What does the acronym GDPR stand for?

GDPR Easy
A. General Data Protection Regulation
B. Global Data Privacy Rules
C. General Digital Privacy Regulation
D. Government Data Protection Registry

11 Which of the following is a key right granted to individuals under GDPR?

GDPR Easy
A. The right to unlimited data storage
B. The right to sell their data without restrictions
C. The right to access any company's data
D. The right to be forgotten (erasure)

12 Which Microsoft service provides a unified portal for managing an organization's data governance, risk, and compliance?

Microsoft Compliance Easy
A. Microsoft Outlook
B. Microsoft Word
C. Microsoft Purview
D. Microsoft Windows

13 What can organizations find in the Microsoft Service Trust Portal?

Microsoft Compliance Easy
A. Technical support for Microsoft Office
B. Compliance reports, audit reports, and security assessments for Microsoft cloud services
C. Free software downloads
D. A marketplace for third-party applications

14 What does a higher "Compliance Score" in Microsoft Purview generally indicate?

Microsoft Compliance Easy
A. The organization has a better posture for meeting data protection standards
B. The organization is spending more money on Microsoft products
C. The organization has more users
D. The organization's network is faster

15 What is the primary function of Azure Policy?

Introduction to Azure Policy: Understand its purpose and functionality. Easy
A. To enforce organizational standards and assess compliance at-scale
B. To automatically back up data
C. To manage user identities and access
D. To monitor the performance of virtual machines

16 How does Azure Policy help in maintaining compliance?

Introduction to Azure Policy: Understand its purpose and functionality. Easy
A. By evaluating and preventing the creation of non-compliant resources
B. By providing discounts on compliant resources
C. By deleting all old resources automatically
D. By sending marketing emails to users

17 In Azure Policy, what is a "policy definition"?

Introduction to Azure Policy: Understand its purpose and functionality. Easy
A. A bill for Azure services
B. A group of virtual machines
C. A user's permission level
D. A rule or set of rules that defines what is allowed or denied

18 A key benefit of using Microsoft Purview for compliance automation is that it can...?

Compliance Automation and Audit Reporting using Microsoft Purview Easy
A. Manually create spreadsheets
B. Design company logos
C. Automatically apply sensitivity and retention labels to data
D. Order new server hardware

19 Which feature in Microsoft Purview is essential for providing evidence to auditors?

Compliance Automation and Audit Reporting using Microsoft Purview Easy
A. The web browser
B. Audit logging and reporting
C. The spell checker
D. Video conferencing

20 Microsoft Purview helps organizations with data governance, risk management, and which other key area?

Compliance Automation and Audit Reporting using Microsoft Purview Easy
A. Hardware sales
B. Social media marketing
C. Compliance
D. Employee payroll

21 A financial firm is migrating its services to a public cloud provider. They are concerned about compliance with regulations like PCI DSS. According to the shared responsibility model, which of the following is typically the cloud provider's responsibility?

Overview of Cloud Compliance Medium
A. Configuring network firewalls and access controls for the firm's virtual machines.
B. Securing the physical data centers and the underlying network fabric.
C. Managing user access and permissions to the firm's applications.
D. Encrypting the firm's data stored in a cloud database.

22 A cloud administrator wants to enforce a rule that all newly created Azure Storage Accounts must have secure transfer (HTTPS) enabled. If a user tries to create a storage account without this setting, the creation process should fail. Which Azure Policy effect should the administrator use?

Introduction to Azure Policy Medium
A. Deny
B. Append
C. Audit
D. Disabled

23 A global e-commerce company, hosted on a major cloud platform, processes orders for customers in the European Union. A customer from Germany exercises their 'right to be forgotten'. What is the most significant implication of this request for the company?

GDPR Medium
A. The company only needs to anonymize the customer's data in their primary CRM system.
B. The company must immediately delete all of the customer's personal data from all production and backup systems without exception.
C. The company must stop sending marketing emails to the customer but can retain their purchase history.
D. The company must erase the customer's personal data unless there is a compelling legal reason to retain it, such as for tax or warranty purposes.

24 A US-based healthcare startup is developing a mobile app that stores patient health information (ePHI) in a cloud database. To be HIPAA compliant, what is the most crucial agreement that must be established between the startup and the cloud service provider?

HIPAA Medium
A. A Non-Disclosure Agreement (NDA)
B. A Service Level Agreement (SLA)
C. A Data Processing Addendum (DPA)
D. A Business Associate Agreement (BAA)

25 A legal team needs to investigate a potential data leak. They want to find all documents and emails across Microsoft 365 containing a specific project codename, place a hold on them to prevent deletion, and review them in a secure environment. Which Microsoft Purview solution is specifically designed for this end-to-end workflow?

Compliance Automation and Audit Reporting using Microsoft Purview Medium
A. Microsoft Purview Data Loss Prevention (DLP)
B. Microsoft Purview eDiscovery (Premium)
C. Microsoft Purview Audit (Premium)
D. Microsoft Purview Information Protection

26 An Indian ed-tech company uses a cloud service provider to host its platform and process student data. Under the Digital Personal Data Protection Act (DPDPA), what are the respective roles of the ed-tech company and the cloud provider?

Digital Personal Data Protection Act Medium
A. Company: Data Principal; Cloud Provider: Data Fiduciary
B. Company: Data Processor; Cloud Provider: Data Fiduciary
C. Company: Data Fiduciary; Cloud Provider: Data Processor
D. Both are considered Data Fiduciaries

27 An organization has hundreds of existing Azure resources. A new Azure Policy is assigned with the Audit effect to check for a mandatory 'department' tag. What is the outcome for the existing resources that are missing this tag?

Introduction to Azure Policy Medium
A. The resources will be flagged as 'Non-compliant' in the Azure Policy compliance dashboard.
B. The policy will fail to apply because existing resources are non-compliant.
C. The resources will be automatically deleted.
D. An alert will be sent to the subscription owner, but the resource will be marked as compliant.

28 A company is preparing for a SOC 2 audit for its services running on Microsoft Azure. Where can the compliance team find Microsoft's own SOC 2 attestation reports to demonstrate that the underlying cloud infrastructure is compliant?

Microsoft Compliance Medium
A. The Azure Quickstart Templates gallery
B. The Microsoft Service Trust Portal
C. The Microsoft Learn documentation site
D. The Azure Portal's billing section

29 A company is designing a new cloud-based application that will serve users in the EU. To adhere to the GDPR principle of 'Data Protection by Design and by Default', what should the engineering team prioritize?

GDPR Medium
A. Storing all user data indefinitely in case it's needed for legal purposes later.
B. Making all user profiles public by default for better social engagement.
C. Collecting the maximum amount of user data possible for future feature development.
D. Implementing the strictest privacy settings by default and only collecting data essential for the service to function.

30 A hospital's IT team configures a cloud storage bucket to hold patient x-ray images (ePHI). Which of the following configurations would represent a clear violation of the HIPAA Security Rule's technical safeguards?

HIPAA Medium
A. Configuring the storage bucket to be publicly accessible on the internet.
B. Storing the images in an encrypted format using AES-256.
C. Enforcing multi-factor authentication for all administrator access.
D. Maintaining detailed audit logs of who accessed the files and when.

31 An administrator wants to prevent users from accidentally sharing documents containing EU passport numbers via Microsoft Teams chats with external users. Which Microsoft Purview feature should be configured to automatically block such messages?

Compliance Automation and Audit Reporting using Microsoft Purview Medium
A. eDiscovery (Standard)
B. Communication Compliance
C. Information Barriers
D. Data Loss Prevention (DLP) policies

32 To simplify the management of compliance requirements, a cloud governance team needs to assign a group of 20 related Azure Policies for data residency and logging to multiple subscriptions. What is the most efficient Azure Policy feature to use for this task?

Introduction to Azure Policy Medium
A. An initiative (also called a policy set)
B. A management group
C. A resource group
D. A policy exemption

33 According to the Digital Personal Data Protection Act (DPDPA), when must a Data Fiduciary report a personal data breach to the Data Protection Board of India and affected individuals?

Digital Personal Data Protection Act Medium
A. Only if the breach affects more than 500 individuals.
B. The Act does not mandate reporting breaches, only protecting data.
C. Within 72 hours of becoming aware of the breach.
D. The DPDPA does not specify a timeline, leaving it to the Fiduciary's discretion.

34 A company is choosing a cloud provider and wants to ensure the provider adheres to international standards for information security management. Which certification would be most relevant for them to verify?

Overview of Cloud Compliance Medium
A. GDPR
B. PCI DSS
C. ISO/IEC 27001
D. HIPAA

35 What is the primary function of Compliance Manager within the Microsoft Purview compliance portal?

Microsoft Compliance Medium
A. To provide a continuous assessment of an organization's compliance posture against various regulations and standards.
B. To store and analyze security event logs from virtual machines.
C. To directly manage firewall rules and network security groups in Azure.
D. To automatically block non-compliant actions by users in real-time.

36 A data controller, subject to GDPR, uses a third-party cloud analytics service (a data processor) to analyze customer behavior. A data breach occurs within the analytics service's systems. Who is ultimately responsible for notifying the supervisory authorities and the affected data subjects?

GDPR Medium
A. The cloud analytics service (processor), as the breach occurred on their systems.
B. The data controller, as they have the primary relationship with the data subjects.
C. Neither, as long as the data was encrypted.
D. Both the controller and the processor share equal responsibility for notification.

37 A hospital IT administrator is reviewing audit logs from their cloud environment. They are specifically looking for events related to the creation, modification, and deletion of user accounts with access to ePHI. This activity is a direct requirement of which part of the HIPAA Security Rule?

HIPAA Medium
A. The Privacy Rule concerning patient consent.
B. The Physical Safeguards concerning facility access controls.
C. The Technical Safeguards concerning audit controls.
D. The Administrative Safeguards concerning security management process.

38 A financial company needs to discover, classify, and apply a 'Confidential - Finance' sensitivity label to all Excel spreadsheets in SharePoint and OneDrive that contain specific financial reporting codes. Which Microsoft Purview capability is best suited for this automated discovery and classification task?

Compliance Automation and Audit Reporting using Microsoft Purview Medium
A. Microsoft Sentinel
B. Microsoft Purview eDiscovery
C. Microsoft Defender for Cloud
D. Microsoft Purview Information Protection (MIP) auto-labeling policies

39 An administrator wants to automatically add a 'last_reviewed_by: admin' tag to any resource group that is created without it. However, if the tag already exists with a different value, it should not be overwritten. Which Azure Policy effect is designed for this specific 'add if not present' scenario?

Introduction to Azure Policy Medium
A. Modify
B. Audit
C. Deny
D. Append

40 A key principle of the Indian Digital Personal Data Protection Act (DPDPA) is 'consent'. A company wants to collect user data for both processing orders and for marketing. What is the correct way to obtain consent under DPDPA?

Digital Personal Data Protection Act Medium
A. Bundle both consents into a single checkbox within the terms and conditions.
B. Provide a clear, plain language notice and obtain separate, specific consent for order processing and for marketing.
C. Assume consent is given when the user creates an account.
D. Obtain consent for order processing and then use the data for marketing under legitimate interest.

41 A multinational financial institution is deploying a hybrid cloud environment using Azure Stack Hub on-premises, connected to a sovereign Azure cloud region (e.g., in Germany or China) to meet strict data residency requirements. In this specific scenario, how does the shared responsibility model for a compliance standard like PCI DSS get re-contextualized compared to a standard public cloud deployment?

Overview of Cloud Compliance Hard
A. The cloud provider's responsibility is limited to the physical security of the sovereign region's data centers, while the customer is responsible for the Azure Stack Hub and all software layers in both environments.
B. The model becomes tripartite: the customer, Microsoft (for the sovereign public cloud fabric), and a local, state-mandated data trustee who has control over access to customer data in the sovereign region. The customer is ultimately responsible for ensuring all three parties' controls collectively meet PCI DSS requirements.
C. The customer assumes full responsibility for all PCI DSS requirements, as the hardware is on-premises and the cloud is sovereign, making the cloud provider an infrastructure vendor only.
D. The shared responsibility model remains identical to a standard public cloud deployment, as Azure Stack Hub is merely an extension of Azure, and sovereign regions offer the same compliance attestations.

42 An e-commerce company operates in both the EU (subject to GDPR) and California (subject to CCPA). They use a single cloud provider whose data centers are SOC 2 Type 2 attested. A GDPR audit requires proof of data processing limitations, while a CCPA audit requires proof of consumer data deletion capabilities. How should the company's compliance officer interpret the cloud provider's SOC 2 report in relation to these specific regulatory demands?

Overview of Cloud Compliance Hard
A. The company can request a custom SOC 2 report from the provider that includes specific criteria mapping to GDPR and CCPA articles, which is the only valid way to use it for regulatory audits.
B. The SOC 2 report should be used to validate the provider's baseline security and operational controls (e.g., access control, change management), but it does not specifically attest to GDPR Article 5 (processing limitations) or CCPA's 'Right to Delete'. The company must use the report as a foundation and build their own application-level controls and processes to meet the specific regulatory requirements, which they are then responsible for demonstrating.
C. The SOC 2 report is irrelevant for GDPR and CCPA, which require their own specific certifications.
D. The SOC 2 report directly satisfies both GDPR and CCPA requirements, as the Trust Services Criteria (Security, Availability, Confidentiality) are broader and cover these specific controls.

43 A large social media company is classified as a 'Significant Data Fiduciary' (SDF) under India's Digital Personal Data Protection Act (DPDPA). The company processes data in a multi-region cloud setup, including in India and Europe. For which of the following activities would the SDF be required to seek explicit and specific consent from the user, even if the processing could arguably fall under 'legitimate uses' for a non-SDF?

Digital Personal Data Protection Act Hard
A. Sharing anonymized, aggregated user engagement metrics with third-party analytics firms.
B. Processing user data to serve targeted advertisements based on their in-app activity.
C. Processing user location data to provide a 'find nearby friends' feature.
D. Periodically scanning user-uploaded images to detect and prevent the spread of child sexual abuse material (CSAM).

44 Under India's DPDPA, a company processes employee data for payroll and performance reviews. The company now wants to use this same data to feed a new AI model that predicts employee attrition risk. The company's legal team argues this falls under 'deemed consent' for the purpose of employment. Which of the following presents the strongest counter-argument to this claim?

Digital Personal Data Protection Act Hard
A. Using an AI model for processing constitutes automated decision-making which is strictly prohibited for employee data under DPDPA.
B. Deemed consent for employment only applies to data voluntarily provided by the employee in their job application.
C. The purpose of predicting attrition risk is not reasonably expected by the employee when providing data for payroll and performance reviews, thus failing the 'reasonable expectation' test for deemed consent.
D. Deemed consent is not a valid legal basis under DPDPA; only explicit consent is allowed.

45 An Indian company, acting as a Data Fiduciary under the DPDPA, uses a multi-tenant database hosted on a major cloud provider to store user data. When a user exercises their 'Right to Erasure', which of the following represents the most technically robust and legally defensible strategy for the company to implement, considering the challenges of data remanence in a cloud environment?

Digital Personal Data Protection Act Hard
A. Execute a standard DELETE SQL command on the user's records in the primary database, relying on the cloud provider's standard data wiping procedures for the underlying physical media.
B. Perform a cryptographic erasure (crypto-shredding) by encrypting each user's data with a unique key, and then securely deleting only that specific key upon an erasure request, rendering the data irrecoverable.
C. Mark the user's data with a 'deleted' flag in the application layer, which prevents it from being displayed but keeps the data in the database for potential recovery.
D. Migrate all other users' data to a new database instance and then decommission the entire old database instance containing the requesting user's data.

46 A healthcare tech startup is building a serverless application using AWS Lambda and Azure Functions to process Protected Health Information (PHI) from wearable devices. The functions are short-lived and triggered by events. Which of the following presents the MOST significant challenge for demonstrating HIPAA Security Rule compliance in this architecture?

HIPAA Hard
A. Establishing a robust and correlated audit trail, because the ephemeral nature of functions makes it difficult to trace a single PHI transaction across multiple, independently executing functions and services.
B. Ensuring encryption of PHI at rest, as serverless platforms lack storage.
C. Conducting regular risk assessments, as the infrastructure is managed by the cloud provider.
D. Implementing user authentication, as there are no traditional user accounts for functions.

47 A small dental clinic (Covered Entity) uses a cloud-based SaaS Electronic Health Record (EHR) system. The EHR provider signs a Business Associate Agreement (BAA). The HIPAA Security Rule's specification for 'Encryption and Decryption' of ePHI (§ 164.312(a)(2)(iv)) is 'Addressable'. The clinic's security officer decides not to implement client-side encryption for data before it is sent to the EHR. What is the MINIMUM requirement for the clinic to be compliant in this situation?

HIPAA Hard
A. They must get a written waiver from the EHR provider stating that the provider's server-side encryption is sufficient.
B. They are automatically compliant because encryption is 'Addressable', not 'Required'.
C. They must formally document their risk analysis, concluding that the risk of data interception in transit is low (e.g., due to mandatory TLS 1.2) and that the existing server-side encryption provided by the BA is a reasonable and appropriate alternative. They must also document why implementing client-side encryption was not reasonable.
D. They must implement an alternative control of equal or greater strength, such as a dedicated VPN tunnel from the clinic to the EHR provider's data center.

48 A research hospital wants to release a dataset for a public study. They choose to de-identify the data using the HIPAA Privacy Rule's 'Safe Harbor' method. The original dataset contains patient records with 5-digit ZIP codes and full dates of birth. To comply with Safe Harbor, what is the most precise transformation they must apply to these two specific fields?

HIPAA Hard
A. Remove all geographic subdivisions smaller than a state and remove all elements of dates indicative of an age over 89.
B. Remove the last two digits of the ZIP code and remove the day and month of birth, leaving only the year.
C. Remove the ZIP code entirely and aggregate all ages into 10-year bands.
D. Aggregate all ZIP codes to the first 3 digits. If the 3-digit ZIP code area contains fewer than 20,000 people, change it to '000'. All elements of dates (except year) must be removed.

49 A US-based company provides a B2B SaaS platform hosted entirely on AWS in the us-east-1 region. They sign an EU-based customer, which means they will be processing the personal data of EU residents. To comply with GDPR's cross-border data transfer requirements post-Schrems II, what is the most critical and non-negotiable sequence of actions they must take?

GDPR Hard
A. Migrate all EU customer data to an AWS region within the EU, as this is the only compliant method.
B. Incorporate the latest Standard Contractual Clauses (SCCs) into their Data Processing Addendum (DPA), conduct and document a Transfer Impact Assessment (TIA) that evaluates US surveillance laws, and implement supplementary measures (e.g., encryption with customer-held keys) if the TIA indicates risk.
C. Obtain explicit consent from every single data subject in the EU for their data to be transferred to the US.
D. Rely on their AWS Business Associate Addendum (BAA) and SOC 2 report as sufficient proof of GDPR compliance for data transfers.

50 A data subject submits a request under GDPR's Article 20, 'Right to data portability,' to an online streaming service. The service has used the user's viewing history (which the user provided by watching content) to train a collaborative filtering model, which has generated a complex vector representation of the user's cinematic tastes. Under a strict interpretation of Article 20, what is the service obligated to provide to the data subject in a 'structured, commonly used and machine-readable format'?

GDPR Hard
A. Only a human-readable summary of their inferred tastes, as the vector and model are trade secrets.
B. The raw viewing history data only, as this is the personal data the user 'provided' to the controller.
C. The raw viewing history and the generated vector representation, as the vector is derived directly from the user's data.
D. The raw viewing history, the vector representation, and a copy of the machine learning model itself.

51 A cloud company offers both an IaaS platform (where customers are Controllers) and a SaaS accounting application (where the company itself is the Controller). The company appoints a single Data Protection Officer (DPO) for the entire organization. Which of the following scenarios represents the most significant conflict of interest for the DPO that must be managed according to GDPR Article 38?

GDPR Hard
A. The DPO reports directly to the Chief Legal Officer instead of the CEO.
B. The DPO also manages the company's response to data breaches for both the IaaS and SaaS businesses.
C. The DPO is also the Head of SaaS Product Development, responsible for determining the purposes and means of processing for the accounting application.
D. The DPO holds stock options in the company.

52 A French government agency plans to migrate a highly sensitive citizen database to the cloud. They require not only that the data resides within France (data residency) but also that all data processing, including metadata and support operations, occurs within the EU. Furthermore, they mandate that under specific, audited circumstances, they must be able to restrict even Microsoft engineers' access to their data. Which Microsoft offering is specifically designed to address this complex set of sovereignty requirements?

Microsoft Compliance Hard
A. Microsoft 365 with Multi-Geo Capabilities.
B. Microsoft Cloud for Sovereignty.
C. Azure France regions with Availability Zones and Azure Policy for data residency.
D. Azure Government (US).

53 A German financial services company wants to use Azure to process sensitive customer data. They need to provide evidence to their auditors that they are technically enforcing Microsoft's EU Data Boundary commitment. Which combination of Azure services provides the strongest, verifiable technical enforcement of this commitment?

Microsoft Compliance Hard
A. Deploying virtual machines within an Azure Confidential Computing environment using Intel SGX or AMD SEV-SNP enabled VMs, combined with Azure Policy to enforce location, and Customer Lockbox to audit support access.
B. Using Azure Policy to restrict resource deployment to EU regions and enabling Customer Lockbox for all subscriptions.
C. Deploying all resources to a German Azure region and using Azure Firewall to block all non-EU IP addresses.
D. Storing data in Azure Blobs with geo-redundant storage (GRS) configured between two EU regions.

54 You are creating an Azure Policy with a deployIfNotExists effect to ensure all Azure SQL Servers have Microsoft Defender for Cloud enabled. The policy needs to check for the existence of a child resource of type Microsoft.Security/pricings with the name 'SqlServers'. What is the correct structure for the then.details.existenceCondition in the policy definition to ensure it doesn't trigger a deployment if Defender is already enabled?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A.
{
"count": {
"field": "Microsoft.Security/pricings[]",
"where": {
"allOf": [
{
"field": "Microsoft.Security/pricings[
].name",
"equals": "SqlServers"
},
{
"field": "Microsoft.Security/pricings[*].properties.pricingTier",
"equals": "Standard"
}
]
}
},
"greater": 0
}
B.
{
"field": "Microsoft.Security/pricings/pricingTier",
"equals": "Standard"
}
C.
{
"field": "Microsoft.Security/pricings/name",
"equals": "SqlServers"
}
D.
{
"allOf": [
{
"field": "type",
"equals": "Microsoft.Security/pricings"
},
{
"field": "name",
"equals": "SqlServers"
},
{
"field": "properties.pricingTier",
"equals": "Standard"
}
]
}

55 An Azure Policy initiative is assigned to a subscription with the effect Deny for creating public IP addresses. A developer with 'Contributor' rights on a resource group within that subscription tries to deploy a Virtual Machine with a new public IP. The deployment fails as expected. The developer then creates a Policy Exemption for their specific resource group from this assignment. Immediately after, they try to deploy the VM with a public IP again. The deployment fails again. What is the most likely reason for the second failure?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A. There is another, more specific Deny policy assigned at the resource group level which is taking precedence over the subscription-level exemption.
B. Policy exemptions can take up to 24 hours to propagate across Azure.
C. Policy exemptions only apply to pre-existing resources, not new deployments.
D. The developer, having only 'Contributor' rights, lacks the necessary RBAC permissions (Microsoft.Authorization/policyExemptions/write) to create a valid policy exemption, so the exemption was created but is ineffective.

56 You are designing an Azure Policy with a modify effect. The goal is to enforce a specific set of IP rules on all new and updated Azure Storage Accounts, adding a corporate firewall rule while preserving any existing IP rules that may have been configured on the storage account. Which JSON structure within the details block of the modify effect correctly achieves this?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "deny",
"operations": [
{
"operation": "AddOrReplace",
"field": "properties.networkAcls.ipRules",
"value": {"value": "203.0.113.42", "action": "Allow"}
}
]
}
B.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "deny",
"operations": [
{
"operation": "addOrReplace",
"field": "properties.networkAcls.ipRules",
"value": [{"value": "203.0.113.42", "action": "Allow"}]
}
]
}
C.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "deny",
"operations": [
{
"operation": "remove",
"field": "properties.networkAcls.ipRules"
},
{
"operation": "add",
"field": "properties.networkAcls.ipRules[*]",
"value": {"value": "203.0.113.42", "action": "Allow"}
}
]
}
D.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "audit",
"operations": [
{
"operation": "add",
"field": "properties.networkAcls.ipRules[*]",
"value": {"value": "203.0.113.42", "action": "Allow"}
}
]
}

57 A compliance team has applied an Azure Policy to audit virtual machines that are not using Managed Disks. The policy has been in place for several weeks. A legacy VM, created a year ago with an unmanaged disk, still exists in the environment. The compliance scan runs every 24 hours. Under which of the following circumstances will this existing, non-compliant VM's compliance state be re-evaluated and updated outside of the regular 24-hour cycle?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A. When a tag on the VM's Network Interface Card (NIC) is updated.
B. When a new policy is assigned to the VM's scope.
C. When the VM is stopped and deallocated.
D. When a new Data Disk is attached to the VM.

58 In Microsoft Purview, an organization is using Adaptive Protection to dynamically adjust Data Loss Prevention (DLP) policies. An analyst, initially at a 'Minor' risk level, begins to download an unusually large volume of files from a sensitive SharePoint site and attempts to share them via a personal cloud storage app. How does Adaptive Protection integrate with the DLP policy to handle this specific evolving threat?

Compliance Automation and Audit Reporting using Microsoft Purview Hard
A. It sends an alert to an administrator, who must then manually apply a more restrictive DLP policy to the user.
B. It temporarily blocks the user's account access to all Microsoft 365 resources until an administrator reviews the activity.
C. It uses machine learning to generate a report on the anomalous activity but does not change the enforcement of existing DLP policies.
D. It automatically elevates the user's risk level to 'Elevated' or 'Severe', which causes a more restrictive DLP policy condition (previously configured for high-risk users) to take effect in near real-time, potentially changing the action from 'Audit' to 'Block with override' or 'Block'.

59 A company is using Microsoft Purview Compliance Manager to track its GDPR compliance. They have implemented 50 technical controls in Azure that map to GDPR articles. They have also documented 20 procedural controls (e.g., employee training, incident response plan). The Compliance Manager score is currently 75%. An auditor asks for proof that the company is effectively managing its compliance program, not just implementing controls. Which feature within Compliance Manager would provide the strongest evidence of this ongoing management and diligence?

Compliance Automation and Audit Reporting using Microsoft Purview Hard
A. The list of 'Your Improvement Actions' showing a status of 'Implemented' for all 50 technical controls.
B. An export of the control mapping that shows the relationship between the company's internal controls and the GDPR requirements.
C. A dashboard showing the 75% score, broken down by GDPR article.
D. The detailed audit trail for a single improvement action, showing that it was assigned to an owner, implemented on a specific date, and then passed an automated test, with evidence (e.g., test scripts, screenshots) uploaded as documentation.

60 A legal team is using Microsoft Purview eDiscovery (Premium) for an investigation. They need to collect all communications related to 'Project Fusion' which occurred within a specific Microsoft Teams shared channel. This shared channel is used by members from three different internal teams ('Team A', 'Team B', 'Team C') and one external partner organization. What is the most precise and defensible way to define the data source scope for the collection in the eDiscovery case to capture all relevant channel conversations and files without over-collecting from the parent teams?

Compliance Automation and Audit Reporting using Microsoft Purview Hard
A. Add the mailboxes and SharePoint sites of 'Team A', 'Team B', and 'Team C' to the collection.
B. Identify the specific Microsoft 365 Group associated with the shared channel and add it as the sole data source.
C. Identify the dedicated SharePoint site created specifically for the shared channel and add it as a location. For conversations, add the mailboxes of the parent teams ('Team A', 'Team B', 'Team C') as sources and then use KQL to filter by the channel ID.
D. Use keyword queries (KQL) to search all mailboxes and SharePoint sites in the tenant for 'Project Fusion'.