Unit 3 - Practice Quiz

INT327 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary goal of cloud compliance?

Overview of Cloud Compliance Easy
A. To ensure cloud services adhere to legal, regulatory, and corporate standards
B. To reduce the cost of cloud storage
C. To market cloud products more effectively
D. To increase the speed of cloud servers

2 In the context of cloud computing, what does the "shared responsibility model" refer to?

Overview of Cloud Compliance Easy
A. The customer is solely responsible for all aspects of compliance
B. All customers share the same physical server
C. The responsibility for compliance is shared between different government agencies
D. The cloud provider and the customer share responsibility for security and compliance

3 Why is it important to adhere to regional data residency requirements in the cloud?

Overview of Cloud Compliance Easy
A. To use a specific programming language
B. To comply with local laws that mandate where data must be stored
C. To make a website load faster for local users
D. To get a discount on cloud services

4 The Digital Personal Data Protection (DPDP) Act is a data privacy law enacted by which country?

Digital Personal Data Protection Act Easy
A. Canada
B. Australia
C. India
D. United States

5 What is the primary purpose of the Digital Personal Data Protection (DPDP) Act?

Digital Personal Data Protection Act Easy
A. To prevent all forms of cyberattacks
B. To protect the digital personal data of individuals
C. To set standards for hardware manufacturing
D. To regulate the price of internet services

6 What does the acronym HIPAA stand for?

HIPAA Easy
A. Health Insurance Portability and Accountability Act
B. Health Information Privacy and Access Act
C. Healthy Individual Privacy and Assurance Act
D. High-tech Information Portability and Authorization Act

7 HIPAA regulations are primarily designed to protect what type of information?

HIPAA Easy
A. Corporate trade secrets
B. Protected Health Information (PHI)
C. Financial transaction data
D. Academic records

8 Which of the following industries is most directly impacted by HIPAA compliance requirements?

HIPAA Easy
A. Retail
B. Healthcare
C. Transportation
D. Manufacturing

9 The General Data Protection Regulation (GDPR) is a regulation in which region's law on data protection and privacy?

GDPR Easy
A. Asia
B. European Union (EU)
C. North America
D. Australia

10 What does the acronym GDPR stand for?

GDPR Easy
A. General Digital Privacy Regulation
B. Global Data Privacy Rules
C. Government Data Protection Registry
D. General Data Protection Regulation

11 Which of the following is a key right granted to individuals under GDPR?

GDPR Easy
A. The right to sell their data without restrictions
B. The right to be forgotten (erasure)
C. The right to access any company's data
D. The right to unlimited data storage

12 Which Microsoft service provides a unified portal for managing an organization's data governance, risk, and compliance?

Microsoft Compliance Easy
A. Microsoft Word
B. Microsoft Windows
C. Microsoft Outlook
D. Microsoft Purview

13 What can organizations find in the Microsoft Service Trust Portal?

Microsoft Compliance Easy
A. A marketplace for third-party applications
B. Compliance reports, audit reports, and security assessments for Microsoft cloud services
C. Free software downloads
D. Technical support for Microsoft Office

14 What does a higher "Compliance Score" in Microsoft Purview generally indicate?

Microsoft Compliance Easy
A. The organization has a better posture for meeting data protection standards
B. The organization's network is faster
C. The organization is spending more money on Microsoft products
D. The organization has more users

15 What is the primary function of Azure Policy?

Introduction to Azure Policy: Understand its purpose and functionality. Easy
A. To manage user identities and access
B. To enforce organizational standards and assess compliance at-scale
C. To automatically back up data
D. To monitor the performance of virtual machines

16 How does Azure Policy help in maintaining compliance?

Introduction to Azure Policy: Understand its purpose and functionality. Easy
A. By deleting all old resources automatically
B. By providing discounts on compliant resources
C. By sending marketing emails to users
D. By evaluating and preventing the creation of non-compliant resources

17 In Azure Policy, what is a "policy definition"?

Introduction to Azure Policy: Understand its purpose and functionality. Easy
A. A group of virtual machines
B. A user's permission level
C. A rule or set of rules that defines what is allowed or denied
D. A bill for Azure services

18 A key benefit of using Microsoft Purview for compliance automation is that it can...?

Compliance Automation and Audit Reporting using Microsoft Purview Easy
A. Order new server hardware
B. Design company logos
C. Manually create spreadsheets
D. Automatically apply sensitivity and retention labels to data

19 Which feature in Microsoft Purview is essential for providing evidence to auditors?

Compliance Automation and Audit Reporting using Microsoft Purview Easy
A. The spell checker
B. Audit logging and reporting
C. Video conferencing
D. The web browser

20 Microsoft Purview helps organizations with data governance, risk management, and which other key area?

Compliance Automation and Audit Reporting using Microsoft Purview Easy
A. Compliance
B. Hardware sales
C. Social media marketing
D. Employee payroll

21 A financial firm is migrating its services to a public cloud provider. They are concerned about compliance with regulations like PCI DSS. According to the shared responsibility model, which of the following is typically the cloud provider's responsibility?

Overview of Cloud Compliance Medium
A. Encrypting the firm's data stored in a cloud database.
B. Securing the physical data centers and the underlying network fabric.
C. Managing user access and permissions to the firm's applications.
D. Configuring network firewalls and access controls for the firm's virtual machines.

22 A cloud administrator wants to enforce a rule that all newly created Azure Storage Accounts must have secure transfer (HTTPS) enabled. If a user tries to create a storage account without this setting, the creation process should fail. Which Azure Policy effect should the administrator use?

Introduction to Azure Policy Medium
A. Disabled
B. Audit
C. Append
D. Deny

23 A global e-commerce company, hosted on a major cloud platform, processes orders for customers in the European Union. A customer from Germany exercises their 'right to be forgotten'. What is the most significant implication of this request for the company?

GDPR Medium
A. The company must immediately delete all of the customer's personal data from all production and backup systems without exception.
B. The company must erase the customer's personal data unless there is a compelling legal reason to retain it, such as for tax or warranty purposes.
C. The company must stop sending marketing emails to the customer but can retain their purchase history.
D. The company only needs to anonymize the customer's data in their primary CRM system.

24 A US-based healthcare startup is developing a mobile app that stores patient health information (ePHI) in a cloud database. To be HIPAA compliant, what is the most crucial agreement that must be established between the startup and the cloud service provider?

HIPAA Medium
A. A Data Processing Addendum (DPA)
B. A Business Associate Agreement (BAA)
C. A Non-Disclosure Agreement (NDA)
D. A Service Level Agreement (SLA)

25 A legal team needs to investigate a potential data leak. They want to find all documents and emails across Microsoft 365 containing a specific project codename, place a hold on them to prevent deletion, and review them in a secure environment. Which Microsoft Purview solution is specifically designed for this end-to-end workflow?

Compliance Automation and Audit Reporting using Microsoft Purview Medium
A. Microsoft Purview Audit (Premium)
B. Microsoft Purview Data Loss Prevention (DLP)
C. Microsoft Purview Information Protection
D. Microsoft Purview eDiscovery (Premium)

26 An Indian ed-tech company uses a cloud service provider to host its platform and process student data. Under the Digital Personal Data Protection Act (DPDPA), what are the respective roles of the ed-tech company and the cloud provider?

Digital Personal Data Protection Act Medium
A. Company: Data Processor; Cloud Provider: Data Fiduciary
B. Company: Data Principal; Cloud Provider: Data Fiduciary
C. Both are considered Data Fiduciaries
D. Company: Data Fiduciary; Cloud Provider: Data Processor

27 An organization has hundreds of existing Azure resources. A new Azure Policy is assigned with the Audit effect to check for a mandatory 'department' tag. What is the outcome for the existing resources that are missing this tag?

Introduction to Azure Policy Medium
A. The policy will fail to apply because existing resources are non-compliant.
B. An alert will be sent to the subscription owner, but the resource will be marked as compliant.
C. The resources will be automatically deleted.
D. The resources will be flagged as 'Non-compliant' in the Azure Policy compliance dashboard.

28 A company is preparing for a SOC 2 audit for its services running on Microsoft Azure. Where can the compliance team find Microsoft's own SOC 2 attestation reports to demonstrate that the underlying cloud infrastructure is compliant?

Microsoft Compliance Medium
A. The Microsoft Service Trust Portal
B. The Azure Portal's billing section
C. The Azure Quickstart Templates gallery
D. The Microsoft Learn documentation site

29 A company is designing a new cloud-based application that will serve users in the EU. To adhere to the GDPR principle of 'Data Protection by Design and by Default', what should the engineering team prioritize?

GDPR Medium
A. Making all user profiles public by default for better social engagement.
B. Storing all user data indefinitely in case it's needed for legal purposes later.
C. Collecting the maximum amount of user data possible for future feature development.
D. Implementing the strictest privacy settings by default and only collecting data essential for the service to function.

30 A hospital's IT team configures a cloud storage bucket to hold patient x-ray images (ePHI). Which of the following configurations would represent a clear violation of the HIPAA Security Rule's technical safeguards?

HIPAA Medium
A. Enforcing multi-factor authentication for all administrator access.
B. Maintaining detailed audit logs of who accessed the files and when.
C. Configuring the storage bucket to be publicly accessible on the internet.
D. Storing the images in an encrypted format using AES-256.

31 An administrator wants to prevent users from accidentally sharing documents containing EU passport numbers via Microsoft Teams chats with external users. Which Microsoft Purview feature should be configured to automatically block such messages?

Compliance Automation and Audit Reporting using Microsoft Purview Medium
A. Communication Compliance
B. eDiscovery (Standard)
C. Information Barriers
D. Data Loss Prevention (DLP) policies

32 To simplify the management of compliance requirements, a cloud governance team needs to assign a group of 20 related Azure Policies for data residency and logging to multiple subscriptions. What is the most efficient Azure Policy feature to use for this task?

Introduction to Azure Policy Medium
A. An initiative (also called a policy set)
B. A policy exemption
C. A management group
D. A resource group

33 According to the Digital Personal Data Protection Act (DPDPA), when must a Data Fiduciary report a personal data breach to the Data Protection Board of India and affected individuals?

Digital Personal Data Protection Act Medium
A. Within 72 hours of becoming aware of the breach.
B. The Act does not mandate reporting breaches, only protecting data.
C. The DPDPA does not specify a timeline, leaving it to the Fiduciary's discretion.
D. Only if the breach affects more than 500 individuals.

34 A company is choosing a cloud provider and wants to ensure the provider adheres to international standards for information security management. Which certification would be most relevant for them to verify?

Overview of Cloud Compliance Medium
A. ISO/IEC 27001
B. GDPR
C. HIPAA
D. PCI DSS

35 What is the primary function of Compliance Manager within the Microsoft Purview compliance portal?

Microsoft Compliance Medium
A. To automatically block non-compliant actions by users in real-time.
B. To directly manage firewall rules and network security groups in Azure.
C. To store and analyze security event logs from virtual machines.
D. To provide a continuous assessment of an organization's compliance posture against various regulations and standards.

36 A data controller, subject to GDPR, uses a third-party cloud analytics service (a data processor) to analyze customer behavior. A data breach occurs within the analytics service's systems. Who is ultimately responsible for notifying the supervisory authorities and the affected data subjects?

GDPR Medium
A. The data controller, as they have the primary relationship with the data subjects.
B. The cloud analytics service (processor), as the breach occurred on their systems.
C. Neither, as long as the data was encrypted.
D. Both the controller and the processor share equal responsibility for notification.

37 A hospital IT administrator is reviewing audit logs from their cloud environment. They are specifically looking for events related to the creation, modification, and deletion of user accounts with access to ePHI. This activity is a direct requirement of which part of the HIPAA Security Rule?

HIPAA Medium
A. The Physical Safeguards concerning facility access controls.
B. The Administrative Safeguards concerning security management process.
C. The Technical Safeguards concerning audit controls.
D. The Privacy Rule concerning patient consent.

38 A financial company needs to discover, classify, and apply a 'Confidential - Finance' sensitivity label to all Excel spreadsheets in SharePoint and OneDrive that contain specific financial reporting codes. Which Microsoft Purview capability is best suited for this automated discovery and classification task?

Compliance Automation and Audit Reporting using Microsoft Purview Medium
A. Microsoft Purview eDiscovery
B. Microsoft Purview Information Protection (MIP) auto-labeling policies
C. Microsoft Defender for Cloud
D. Microsoft Sentinel

39 An administrator wants to automatically add a 'last_reviewed_by: admin' tag to any resource group that is created without it. However, if the tag already exists with a different value, it should not be overwritten. Which Azure Policy effect is designed for this specific 'add if not present' scenario?

Introduction to Azure Policy Medium
A. Audit
B. Deny
C. Append
D. Modify

40 A key principle of the Indian Digital Personal Data Protection Act (DPDPA) is 'consent'. A company wants to collect user data for both processing orders and for marketing. What is the correct way to obtain consent under DPDPA?

Digital Personal Data Protection Act Medium
A. Assume consent is given when the user creates an account.
B. Provide a clear, plain language notice and obtain separate, specific consent for order processing and for marketing.
C. Bundle both consents into a single checkbox within the terms and conditions.
D. Obtain consent for order processing and then use the data for marketing under legitimate interest.

41 A multinational financial institution is deploying a hybrid cloud environment using Azure Stack Hub on-premises, connected to a sovereign Azure cloud region (e.g., in Germany or China) to meet strict data residency requirements. In this specific scenario, how does the shared responsibility model for a compliance standard like PCI DSS get re-contextualized compared to a standard public cloud deployment?

Overview of Cloud Compliance Hard
A. The shared responsibility model remains identical to a standard public cloud deployment, as Azure Stack Hub is merely an extension of Azure, and sovereign regions offer the same compliance attestations.
B. The cloud provider's responsibility is limited to the physical security of the sovereign region's data centers, while the customer is responsible for the Azure Stack Hub and all software layers in both environments.
C. The model becomes tripartite: the customer, Microsoft (for the sovereign public cloud fabric), and a local, state-mandated data trustee who has control over access to customer data in the sovereign region. The customer is ultimately responsible for ensuring all three parties' controls collectively meet PCI DSS requirements.
D. The customer assumes full responsibility for all PCI DSS requirements, as the hardware is on-premises and the cloud is sovereign, making the cloud provider an infrastructure vendor only.

42 An e-commerce company operates in both the EU (subject to GDPR) and California (subject to CCPA). They use a single cloud provider whose data centers are SOC 2 Type 2 attested. A GDPR audit requires proof of data processing limitations, while a CCPA audit requires proof of consumer data deletion capabilities. How should the company's compliance officer interpret the cloud provider's SOC 2 report in relation to these specific regulatory demands?

Overview of Cloud Compliance Hard
A. The company can request a custom SOC 2 report from the provider that includes specific criteria mapping to GDPR and CCPA articles, which is the only valid way to use it for regulatory audits.
B. The SOC 2 report is irrelevant for GDPR and CCPA, which require their own specific certifications.
C. The SOC 2 report directly satisfies both GDPR and CCPA requirements, as the Trust Services Criteria (Security, Availability, Confidentiality) are broader and cover these specific controls.
D. The SOC 2 report should be used to validate the provider's baseline security and operational controls (e.g., access control, change management), but it does not specifically attest to GDPR Article 5 (processing limitations) or CCPA's 'Right to Delete'. The company must use the report as a foundation and build their own application-level controls and processes to meet the specific regulatory requirements, which they are then responsible for demonstrating.

43 A large social media company is classified as a 'Significant Data Fiduciary' (SDF) under India's Digital Personal Data Protection Act (DPDPA). The company processes data in a multi-region cloud setup, including in India and Europe. For which of the following activities would the SDF be required to seek explicit and specific consent from the user, even if the processing could arguably fall under 'legitimate uses' for a non-SDF?

Digital Personal Data Protection Act Hard
A. Periodically scanning user-uploaded images to detect and prevent the spread of child sexual abuse material (CSAM).
B. Processing user data to serve targeted advertisements based on their in-app activity.
C. Processing user location data to provide a 'find nearby friends' feature.
D. Sharing anonymized, aggregated user engagement metrics with third-party analytics firms.

44 Under India's DPDPA, a company processes employee data for payroll and performance reviews. The company now wants to use this same data to feed a new AI model that predicts employee attrition risk. The company's legal team argues this falls under 'deemed consent' for the purpose of employment. Which of the following presents the strongest counter-argument to this claim?

Digital Personal Data Protection Act Hard
A. Deemed consent is not a valid legal basis under DPDPA; only explicit consent is allowed.
B. The purpose of predicting attrition risk is not reasonably expected by the employee when providing data for payroll and performance reviews, thus failing the 'reasonable expectation' test for deemed consent.
C. Using an AI model for processing constitutes automated decision-making which is strictly prohibited for employee data under DPDPA.
D. Deemed consent for employment only applies to data voluntarily provided by the employee in their job application.

45 An Indian company, acting as a Data Fiduciary under the DPDPA, uses a multi-tenant database hosted on a major cloud provider to store user data. When a user exercises their 'Right to Erasure', which of the following represents the most technically robust and legally defensible strategy for the company to implement, considering the challenges of data remanence in a cloud environment?

Digital Personal Data Protection Act Hard
A. Perform a cryptographic erasure (crypto-shredding) by encrypting each user's data with a unique key, and then securely deleting only that specific key upon an erasure request, rendering the data irrecoverable.
B. Execute a standard DELETE SQL command on the user's records in the primary database, relying on the cloud provider's standard data wiping procedures for the underlying physical media.
C. Mark the user's data with a 'deleted' flag in the application layer, which prevents it from being displayed but keeps the data in the database for potential recovery.
D. Migrate all other users' data to a new database instance and then decommission the entire old database instance containing the requesting user's data.

46 A healthcare tech startup is building a serverless application using AWS Lambda and Azure Functions to process Protected Health Information (PHI) from wearable devices. The functions are short-lived and triggered by events. Which of the following presents the MOST significant challenge for demonstrating HIPAA Security Rule compliance in this architecture?

HIPAA Hard
A. Establishing a robust and correlated audit trail, because the ephemeral nature of functions makes it difficult to trace a single PHI transaction across multiple, independently executing functions and services.
B. Ensuring encryption of PHI at rest, as serverless platforms lack storage.
C. Implementing user authentication, as there are no traditional user accounts for functions.
D. Conducting regular risk assessments, as the infrastructure is managed by the cloud provider.

47 A small dental clinic (Covered Entity) uses a cloud-based SaaS Electronic Health Record (EHR) system. The EHR provider signs a Business Associate Agreement (BAA). The HIPAA Security Rule's specification for 'Encryption and Decryption' of ePHI (§ 164.312(a)(2)(iv)) is 'Addressable'. The clinic's security officer decides not to implement client-side encryption for data before it is sent to the EHR. What is the MINIMUM requirement for the clinic to be compliant in this situation?

HIPAA Hard
A. They are automatically compliant because encryption is 'Addressable', not 'Required'.
B. They must formally document their risk analysis, concluding that the risk of data interception in transit is low (e.g., due to mandatory TLS 1.2) and that the existing server-side encryption provided by the BA is a reasonable and appropriate alternative. They must also document why implementing client-side encryption was not reasonable.
C. They must get a written waiver from the EHR provider stating that the provider's server-side encryption is sufficient.
D. They must implement an alternative control of equal or greater strength, such as a dedicated VPN tunnel from the clinic to the EHR provider's data center.

48 A research hospital wants to release a dataset for a public study. They choose to de-identify the data using the HIPAA Privacy Rule's 'Safe Harbor' method. The original dataset contains patient records with 5-digit ZIP codes and full dates of birth. To comply with Safe Harbor, what is the most precise transformation they must apply to these two specific fields?

HIPAA Hard
A. Aggregate all ZIP codes to the first 3 digits. If the 3-digit ZIP code area contains fewer than 20,000 people, change it to '000'. All elements of dates (except year) must be removed.
B. Remove the ZIP code entirely and aggregate all ages into 10-year bands.
C. Remove the last two digits of the ZIP code and remove the day and month of birth, leaving only the year.
D. Remove all geographic subdivisions smaller than a state and remove all elements of dates indicative of an age over 89.

49 A US-based company provides a B2B SaaS platform hosted entirely on AWS in the us-east-1 region. They sign an EU-based customer, which means they will be processing the personal data of EU residents. To comply with GDPR's cross-border data transfer requirements post-Schrems II, what is the most critical and non-negotiable sequence of actions they must take?

GDPR Hard
A. Obtain explicit consent from every single data subject in the EU for their data to be transferred to the US.
B. Migrate all EU customer data to an AWS region within the EU, as this is the only compliant method.
C. Rely on their AWS Business Associate Addendum (BAA) and SOC 2 report as sufficient proof of GDPR compliance for data transfers.
D. Incorporate the latest Standard Contractual Clauses (SCCs) into their Data Processing Addendum (DPA), conduct and document a Transfer Impact Assessment (TIA) that evaluates US surveillance laws, and implement supplementary measures (e.g., encryption with customer-held keys) if the TIA indicates risk.

50 A data subject submits a request under GDPR's Article 20, 'Right to data portability,' to an online streaming service. The service has used the user's viewing history (which the user provided by watching content) to train a collaborative filtering model, which has generated a complex vector representation of the user's cinematic tastes. Under a strict interpretation of Article 20, what is the service obligated to provide to the data subject in a 'structured, commonly used and machine-readable format'?

GDPR Hard
A. The raw viewing history data only, as this is the personal data the user 'provided' to the controller.
B. The raw viewing history, the vector representation, and a copy of the machine learning model itself.
C. The raw viewing history and the generated vector representation, as the vector is derived directly from the user's data.
D. Only a human-readable summary of their inferred tastes, as the vector and model are trade secrets.

51 A cloud company offers both an IaaS platform (where customers are Controllers) and a SaaS accounting application (where the company itself is the Controller). The company appoints a single Data Protection Officer (DPO) for the entire organization. Which of the following scenarios represents the most significant conflict of interest for the DPO that must be managed according to GDPR Article 38?

GDPR Hard
A. The DPO is also the Head of SaaS Product Development, responsible for determining the purposes and means of processing for the accounting application.
B. The DPO also manages the company's response to data breaches for both the IaaS and SaaS businesses.
C. The DPO reports directly to the Chief Legal Officer instead of the CEO.
D. The DPO holds stock options in the company.

52 A French government agency plans to migrate a highly sensitive citizen database to the cloud. They require not only that the data resides within France (data residency) but also that all data processing, including metadata and support operations, occurs within the EU. Furthermore, they mandate that under specific, audited circumstances, they must be able to restrict even Microsoft engineers' access to their data. Which Microsoft offering is specifically designed to address this complex set of sovereignty requirements?

Microsoft Compliance Hard
A. Azure France regions with Availability Zones and Azure Policy for data residency.
B. Azure Government (US).
C. Microsoft Cloud for Sovereignty.
D. Microsoft 365 with Multi-Geo Capabilities.

53 A German financial services company wants to use Azure to process sensitive customer data. They need to provide evidence to their auditors that they are technically enforcing Microsoft's EU Data Boundary commitment. Which combination of Azure services provides the strongest, verifiable technical enforcement of this commitment?

Microsoft Compliance Hard
A. Deploying all resources to a German Azure region and using Azure Firewall to block all non-EU IP addresses.
B. Deploying virtual machines within an Azure Confidential Computing environment using Intel SGX or AMD SEV-SNP enabled VMs, combined with Azure Policy to enforce location, and Customer Lockbox to audit support access.
C. Using Azure Policy to restrict resource deployment to EU regions and enabling Customer Lockbox for all subscriptions.
D. Storing data in Azure Blobs with geo-redundant storage (GRS) configured between two EU regions.

54 You are creating an Azure Policy with a deployIfNotExists effect to ensure all Azure SQL Servers have Microsoft Defender for Cloud enabled. The policy needs to check for the existence of a child resource of type Microsoft.Security/pricings with the name 'SqlServers'. What is the correct structure for the then.details.existenceCondition in the policy definition to ensure it doesn't trigger a deployment if Defender is already enabled?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A.
{
"count": {
"field": "Microsoft.Security/pricings[]",
"where": {
"allOf": [
{
"field": "Microsoft.Security/pricings[
].name",
"equals": "SqlServers"
},
{
"field": "Microsoft.Security/pricings[*].properties.pricingTier",
"equals": "Standard"
}
]
}
},
"greater": 0
}
B.
{
"field": "Microsoft.Security/pricings/pricingTier",
"equals": "Standard"
}
C.
{
"field": "Microsoft.Security/pricings/name",
"equals": "SqlServers"
}
D.
{
"allOf": [
{
"field": "type",
"equals": "Microsoft.Security/pricings"
},
{
"field": "name",
"equals": "SqlServers"
},
{
"field": "properties.pricingTier",
"equals": "Standard"
}
]
}

55 An Azure Policy initiative is assigned to a subscription with the effect Deny for creating public IP addresses. A developer with 'Contributor' rights on a resource group within that subscription tries to deploy a Virtual Machine with a new public IP. The deployment fails as expected. The developer then creates a Policy Exemption for their specific resource group from this assignment. Immediately after, they try to deploy the VM with a public IP again. The deployment fails again. What is the most likely reason for the second failure?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A. The developer, having only 'Contributor' rights, lacks the necessary RBAC permissions (Microsoft.Authorization/policyExemptions/write) to create a valid policy exemption, so the exemption was created but is ineffective.
B. Policy exemptions can take up to 24 hours to propagate across Azure.
C. There is another, more specific Deny policy assigned at the resource group level which is taking precedence over the subscription-level exemption.
D. Policy exemptions only apply to pre-existing resources, not new deployments.

56 You are designing an Azure Policy with a modify effect. The goal is to enforce a specific set of IP rules on all new and updated Azure Storage Accounts, adding a corporate firewall rule while preserving any existing IP rules that may have been configured on the storage account. Which JSON structure within the details block of the modify effect correctly achieves this?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "audit",
"operations": [
{
"operation": "add",
"field": "properties.networkAcls.ipRules[*]",
"value": {"value": "203.0.113.42", "action": "Allow"}
}
]
}
B.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "deny",
"operations": [
{
"operation": "addOrReplace",
"field": "properties.networkAcls.ipRules",
"value": [{"value": "203.0.113.42", "action": "Allow"}]
}
]
}
C.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "deny",
"operations": [
{
"operation": "remove",
"field": "properties.networkAcls.ipRules"
},
{
"operation": "add",
"field": "properties.networkAcls.ipRules[*]",
"value": {"value": "203.0.113.42", "action": "Allow"}
}
]
}
D.
{
"roleDefinitionIds": ["/providers/microsoft.authorization/roleDefinitions/storageAccountContributor"],
"conflictEffect": "deny",
"operations": [
{
"operation": "AddOrReplace",
"field": "properties.networkAcls.ipRules",
"value": {"value": "203.0.113.42", "action": "Allow"}
}
]
}

57 A compliance team has applied an Azure Policy to audit virtual machines that are not using Managed Disks. The policy has been in place for several weeks. A legacy VM, created a year ago with an unmanaged disk, still exists in the environment. The compliance scan runs every 24 hours. Under which of the following circumstances will this existing, non-compliant VM's compliance state be re-evaluated and updated outside of the regular 24-hour cycle?

Introduction to Azure Policy: Understand its purpose and functionality. Hard
A. When a tag on the VM's Network Interface Card (NIC) is updated.
B. When the VM is stopped and deallocated.
C. When a new Data Disk is attached to the VM.
D. When a new policy is assigned to the VM's scope.

58 In Microsoft Purview, an organization is using Adaptive Protection to dynamically adjust Data Loss Prevention (DLP) policies. An analyst, initially at a 'Minor' risk level, begins to download an unusually large volume of files from a sensitive SharePoint site and attempts to share them via a personal cloud storage app. How does Adaptive Protection integrate with the DLP policy to handle this specific evolving threat?

Compliance Automation and Audit Reporting using Microsoft Purview Hard
A. It uses machine learning to generate a report on the anomalous activity but does not change the enforcement of existing DLP policies.
B. It temporarily blocks the user's account access to all Microsoft 365 resources until an administrator reviews the activity.
C. It automatically elevates the user's risk level to 'Elevated' or 'Severe', which causes a more restrictive DLP policy condition (previously configured for high-risk users) to take effect in near real-time, potentially changing the action from 'Audit' to 'Block with override' or 'Block'.
D. It sends an alert to an administrator, who must then manually apply a more restrictive DLP policy to the user.

59 A company is using Microsoft Purview Compliance Manager to track its GDPR compliance. They have implemented 50 technical controls in Azure that map to GDPR articles. They have also documented 20 procedural controls (e.g., employee training, incident response plan). The Compliance Manager score is currently 75%. An auditor asks for proof that the company is effectively managing its compliance program, not just implementing controls. Which feature within Compliance Manager would provide the strongest evidence of this ongoing management and diligence?

Compliance Automation and Audit Reporting using Microsoft Purview Hard
A. The detailed audit trail for a single improvement action, showing that it was assigned to an owner, implemented on a specific date, and then passed an automated test, with evidence (e.g., test scripts, screenshots) uploaded as documentation.
B. A dashboard showing the 75% score, broken down by GDPR article.
C. The list of 'Your Improvement Actions' showing a status of 'Implemented' for all 50 technical controls.
D. An export of the control mapping that shows the relationship between the company's internal controls and the GDPR requirements.

60 A legal team is using Microsoft Purview eDiscovery (Premium) for an investigation. They need to collect all communications related to 'Project Fusion' which occurred within a specific Microsoft Teams shared channel. This shared channel is used by members from three different internal teams ('Team A', 'Team B', 'Team C') and one external partner organization. What is the most precise and defensible way to define the data source scope for the collection in the eDiscovery case to capture all relevant channel conversations and files without over-collecting from the parent teams?

Compliance Automation and Audit Reporting using Microsoft Purview Hard
A. Add the mailboxes and SharePoint sites of 'Team A', 'Team B', and 'Team C' to the collection.
B. Identify the specific Microsoft 365 Group associated with the shared channel and add it as the sole data source.
C. Identify the dedicated SharePoint site created specifically for the shared channel and add it as a location. For conversations, add the mailboxes of the parent teams ('Team A', 'Team B', 'Team C') as sources and then use KQL to filter by the channel ID.
D. Use keyword queries (KQL) to search all mailboxes and SharePoint sites in the tenant for 'Project Fusion'.