Certified Azure Administrator Associate Practice Exams

Microsoft AZ-104 Certification Exam Topics

If you want to get certified in the Microsoft Azure Administrator Associate (AZ-104) exam, you need to do more than just study. You need to practice by completing AZ-104 practice exams, reviewing Azure administration sample questions, and spending time with a reliable AZ-104 certification exam simulator.

In this quick AZ-104 practice test tutorial, we will help you get started by providing a carefully written set of AZ-104 exam questions and answers. These questions mirror the tone and difficulty of the actual AZ-104 exam, giving you a clear sense of how prepared you are for the test.

AZ-104 Administrator Practice Questions

Study thoroughly, practice consistently, and gain hands-on familiarity with Azure services, identity and governance, networking, storage, compute, and monitoring. With the right preparation, you will be ready to pass the AZ-104 certification exam with confidence.

Git, GitHub & GitHub Copilot Certification Made Easy

Want to get certified on the most popular AI, ML & DevOps technologies of the day? These five resources will help you get GitHub certified in a hurry.

Get certified in the latest AI, ML and DevOps technologies. Advance your career today.

AZ-104 Certification Exam Simulator Questions

Certification Practice Exam Questions

A regional retailer named BlueFinch Systems is moving an on-premises distributed application called ServiceAlpha into an Azure subscription. After the migration ServiceAlpha will run on eleven Azure virtual machines. You must guarantee that ServiceAlpha remains running on at least ten virtual machines during planned Azure maintenance. What should you create?

  • ❏ A. one virtual machine scale set that has 15 virtual machine instances

  • ❏ B. one virtual machine scale set that has 13 virtual machine instances

  • ❏ C. one Availability Set that has two fault domains and one update domain

  • ❏ D. one Availability Set that has twelve update domains and one fault domain

A software firm called FjordApps runs an Azure App Service named portalapp-prod. The environment includes a virtual network named corp-vnet and a virtual machine named db-server-02 that hosts a MySQL database. The virtual machine is connected to corp-vnet. You need to allow the app service to access the database on the virtual machine. What should you do?

  • ❏ A. Deploy an Azure Application Gateway

  • ❏ B. Enable Hybrid Connections for the app

  • ❏ C. Enable VNet integration for the app

  • ❏ D. Deploy an internal load balancer

Your firm Brightridge Technologies uses Azure Active Directory. You must apply a conditional access policy that forces members of the TenantAdmins group to use multi factor authentication and to connect from an Azure AD joined device when they access Azure AD from locations that are not trusted. The proposed action is to open the Azure portal and change the conditional access policy grant controls so they require both multi factor authentication and an Azure AD joined device. Does this action meet the requirement?

  • ❏ A. No

  • ❏ B. Yes

Review the Northwind Solutions case study by opening the following link in a new tab and use the case details to decide how many Recovery Services vaults you must configure to protect the SMB file shares and virtual machines in the deployment https://example.com/document/d/1zbu5BJdbWU4tryp9r6jwChOKh4OQeDKigz_-WlysB_c?

  • ❏ A. Two Recovery Services vaults

  • ❏ B. Four Recovery Services vaults

  • ❏ C. Three Recovery Services vaults

  • ❏ D. A Recovery Services vault per subscription

  • ❏ E. One Recovery Services vault

A RidgeTech Azure subscription hosts 12 virtual machines. You must trigger alerts when any virtual machine restarts stops or becomes deallocated. Notifications must be delivered to three administrators by email and through the Azure mobile app. You will define alert rules action groups and actions in the Azure portal. What is the minimum number of alert rules action groups and actions you must create?

  • ❏ A. Alert rules equal 1 and action groups equal 1 and actions equal 1

  • ❏ B. Alert rules equal 2 and action groups equal 3 and actions equal 1

  • ❏ C. Alert rules equal 3 and action groups equal 1 and actions equal 3

  • ❏ D. Alert rules equal 3 and action groups equal 1 and actions equal 1

Which PowerShell cmdlet should an administrator run to deploy a new Azure virtual machine scale set?

  • ❏ A. New-AzVM

  • ❏ B. Set-AzVmss

  • ❏ C. New-AzVmss

At Nimbus Systems example.com you are deploying an ARM template to provision an Azure virtual machine and you must not store the VM administrator password in plain text. You need to reference the administrator password in the template and ensure access to it is secured. What service should you use to store the password?

  • ❏ A. Azure Files share

  • ❏ B. Azure Automation credential asset

  • ❏ C. Azure Key Vault

SummitSoft runs multiple virtual machines inside a virtual network in its Azure subscription and several employees connect from remote locations. Those remote employees need secure access to the virtual machines that are on the virtual network. Which type of VPN connection should be set up?

  • ❏ A. Site to Site VPN

  • ❏ B. VNet to VNet

  • ❏ C. Point to Site VPN

Fabrikam maintains an Azure subscription with a storage account that hosts website content and static assets. You must make sure that incoming client requests enter the Microsoft network at the point of presence closest to each client. What setting should you change?

  • ❏ A. Private endpoints

  • ❏ B. Azure Load Balancer

  • ❏ C. Routing preference

  • ❏ D. Azure Front Door

You manage a subscription that contains 13 virtual networks and each virtual network is placed in a separate resource group. A colleague intends to create multiple network security groups in the subscription. You must ensure that any newly created network security group will automatically block TCP port 8080 for traffic between the virtual networks. The proposed solution is to open the Resource providers blade and unregister the Microsoft.ClassicNetwork provider. Will this approach meet the requirement?

  • ❏ A. Yes

  • ❏ B. No

Your cloud team manages several AKS clusters in an Azure subscription and the cluster autoscaler is enabled. You need to set the minimum and maximum node counts for a node pool by using Azure PowerShell. Which PowerShell cmdlet should you use?

  • ❏ A. Start-AzAksCluster

  • ❏ B. Update-AzAksCluster

  • ❏ C. Update-AzAksNodePool

  • ❏ D. Set-AzAksCluster

BlueHive runs two Azure virtual networks named CorpVNetA and CorpVNetB. CorpVNetA hosts a virtual machine called AppVM1 and CorpVNetB hosts a virtual machine called DataVM2. The frontend application on AppVM1 requests data from DataVM2 and the users are experiencing higher latency than normal. You need to determine the average round trip time of packets sent from AppVM1 to DataVM2. Which Azure Network Watcher feature should you use?

  • ❏ A. IP Flow Verify

  • ❏ B. Network Security Group flow logs

  • ❏ C. Network Performance Monitor

  • ❏ D. Connection Monitor

Your operations team exported an Azure Resource Manager template to provision several Linux virtual machines for a pilot at BlueHarbor Technologies. The template was captured from an existing VM and must be modified to reference an administrator password without persisting it as plain text. You are preparing to create the resources that will enable secure secret management and controlled access. What resources should you create to accomplish this? (Choose 2)

  • ❏ A. Azure Policy

  • ❏ B. Azure Key Vault

  • ❏ C. Access Policy

  • ❏ D. Entra ID Identity Protection

  • ❏ E. Azure Storage Account

  • ❏ F. Backup Policy

A regional online retailer is deploying a resilient Azure web front end and wants it reachable through a vanity domain while maintaining high availability across multiple virtual machines. What steps should be taken to accomplish this? (Choose 2)

  • ❏ A. Assign static public IP addresses to each virtual machine running the website

  • ❏ B. Register the vanity hostname in the Azure portal and configure the domain DNS to point to the load balancer front end IP

  • ❏ C. Configure an Azure public load balancer and add the virtual machines to its backend pool

  • ❏ D. Directly route the domain hostname to a single virtual machine for simplicity

You administer a file share for a regional retailer called Northvale Systems and you want to confirm network access by running a PowerShell test. You set $hostName = “northvalestorage.example.com” and then execute Test-NetConnection -ComputerName $hostName -Port _. Which port should you test to verify SMB file share connectivity?

  • ❏ A. 3389

  • ❏ B. 8080

  • ❏ C. 445

  • ❏ D. 2222

You manage a subscription that contains a resource group named AppRG02 and you plan to deploy a storage account called dataacct01 using a Bicep file named main.bicep. You must update main.bicep so that dataacct01 is provisioned into AppRG02. Which property do you need to change?

  • ❏ A. sku

  • ❏ B. kind

  • ❏ C. location

  • ❏ D. scope

You manage an Office 365 subscription and an Azure Active Directory tenant for a company named scrumtuous.com. You must grant three users named Alice Bob and Carol temporary access to a SharePoint document library named TempDocs. You need to create groups for the users and ensure the groups are deleted automatically after 120 days. Which two types of groups should you create? (Choose 2)

  • ❏ A. Security group with Dynamic Device membership

  • ❏ B. Security group with Dynamic User membership

  • ❏ C. Microsoft 365 group with Assigned membership

  • ❏ D. Security group with Assigned membership

  • ❏ E. Microsoft 365 group with Dynamic User membership

A company has an Azure virtual network named VNetProd that connects to its on premises datacenter by a site to site VPN. VNetProd includes a subnet named AppSubnet and that subnet is associated with a network security group named NSGApp. AppSubnet contains an internal load balancer named ILBProd and the backend pool has four Azure virtual machines. You need to collect information about the IP addresses that connect to ILBProd and you must be able to run interactive queries from the Azure portal against the collected data. On which resource should you enable diagnostics?

  • ❏ A. Internal Load Balancer

  • ❏ B. Network Watcher

  • ❏ C. Network security group

  • ❏ D. Azure virtual machines

You are administering virtual machines for Orion Tech and you notice that one backend virtual machine behind an Azure Load Balancer is not receiving any incoming requests. What should you check first to start troubleshooting?

  • ❏ A. Inspect the Network Security Group rules applied to the network interface or subnet

  • ❏ B. Verify the virtual machine is registered in the load balancer backend pool

  • ❏ C. Confirm the virtual machine OS firewall allows inbound traffic on the required ports

  • ❏ D. Check the load balancer health probe results and backend health status

You must configure an Azure file share for the accounting team at SolisTech and they need to keep file modifications and be able to recover deleted files for 15 days. Which file share feature should you enable?

  • ❏ A. Blob lifecycle management

  • ❏ B. Blob versioning

  • ❏ C. Azure File Share snapshots

  • ❏ D. Soft Delete for Azure Files

You are the Azure administrator for a global shipping company called Aurora Freight and you must grant a support team rights to manage virtual machines within an Azure subscription while preventing them from modifying network configurations. Which built in Azure role should you assign?

  • ❏ A. Contributor

  • ❏ B. Network Contributor

  • ❏ C. Reader

  • ❏ D. Virtual Machine Contributor

Edgeware Inc runs an Azure virtual machine called WebServer-02 and the cloud team received an immediate alert that the instance will undergo host level maintenance shortly. You must move WebServer-02 to a new physical host right away while preserving its configuration. The operator opens the Redeploy and reapply blade in the Azure portal and clicks Redeploy. Will this action accomplish the required relocation?

  • ❏ A. No

  • ❏ B. Yes

A subscription named SubAlpha contains a virtual network called VNetProd that is in a resource group named RGApps. The subscription has a user named Alice and Alice currently holds the Reader role and the Security Admin role and the Security Reader role. You need to allow Alice to assign the Reader role for VNetProd to other users. What should you do?

  • ❏ A. Assign Alice the Network Contributor role for VNetProd

  • ❏ B. Remove Alice from the Security Reader role and assign Alice the Contributor role for RGApps

  • ❏ C. Assign Alice the Owner role for VNetProd

  • ❏ D. Assign Alice the User Access Administrator role for VNetProd

A small services firm called Northwave operates an Azure storage account named acctstore2 and needs to let a user named JordanL list the account keys and regenerate them. You plan to assign the Storage Account Key Operator Service Role to JordanL. Will this satisfy the requirement?

  • ❏ A. No

  • ❏ B. Yes

These items are part of a scenario set that shares the same background and each item offers a different solution. After you answer this item you will not be able to return to it. TailwindAD is an Azure Active Directory tenant for a company named Tailwind and the subscription is named SubA. TailwindAD contains a group named AppBuilders and SubA contains a resource group named DevelopmentRG. You need to allow the AppBuilders group to create Azure Logic Apps within the DevelopmentRG resource group. The proposed solution is to assign the DevTest Labs User role at the subscription level to the AppBuilders group. Does this meet the requirement?

  • ❏ A. Yes

  • ❏ B. No

HarborTech Solutions wants to strengthen its security posture by removing direct internet exposure of SSH port 22 and RDP port 3389 on its Azure virtual machines while still allowing secure remote administration. Which Azure service can help them meet this requirement?

  • ❏ A. Azure Firewall

  • ❏ B. Network Security Group

  • ❏ C. Azure Bastion

  • ❏ D. Azure VPN Gateway

You were recently appointed as the Azure administrator at Meridian Software and you must add a team member to an existing tenant group. Which Azure service would you use to carry out this action?

  • ❏ A. Cloud Identity

  • ❏ B. Azure Resource Manager

  • ❏ C. Azure DevOps

  • ❏ D. Entra ID

An infrastructure team at NovaLedger wants to track the CPU load for a Linux virtual machine in Microsoft Azure by using the platform monitoring service. Which metric will most directly indicate the VM’s CPU usage?

  • ❏ A. Processor Queue Length

  • ❏ B. Network In Total

  • ❏ C. Percentage CPU

  • ❏ D. Processor Time

A regional charity plans to run its workloads on Microsoft Azure and wants each division to receive invoices only for the resources that they consume. The team proposes using Azure role based access control to separate billing by division. Will this strategy provide the required separation of charges?

  • ❏ A. Create separate subscriptions and group them with management groups for division level billing

  • ❏ B. Azure role based access control alone will not isolate department charges

  • ❏ C. Use resource tags together with Azure Cost Management to allocate expenses to divisions

  • ❏ D. Yes implementing Azure role based access control will allocate billing per division

A digital media company named BlueStream is provisioning an Azure Storage account and plans to add 12 blob containers. One container must use a different key for encrypting data at rest. What should you do before you create that specific container?

  • ❏ A. Rotate the storage account access keys

  • ❏ B. Create an encryption scope for the storage account

  • ❏ C. Assign a customer managed key to the entire storage account

  • ❏ D. Generate a shared access signature for the container

Your company uses an identity tenant called NovaID and you plan to import a large batch of user accounts while ensuring each imported account is automatically added to the proper group according to the user department attribute with minimal administrative overhead, what should you configure? (Choose 2)

  • ❏ A. Write a PowerShell script that parses the import file and applies group assignments

  • ❏ B. Create a CSV file that contains user attributes and department data

  • ❏ C. Create groups configured for Dynamic User membership

  • ❏ D. Create groups configured for Assigned membership

  • ❏ E. Create an XML file that contains user attributes and department data

  • ❏ F. Deploy an Azure Resource Manager template to provision identity resources

You manage two Azure subscriptions named SubAlpha and SubBeta. SubAlpha contains a virtual network named NetworkAlpha and a VPN gateway. SubBeta contains a virtual network named NetworkBeta. An on premises laptop named Laptop1 runs Windows and has a point to site VPN client installed. You configure virtual network peering between NetworkAlpha and NetworkBeta. You need to ensure that Laptop1 can access resources in NetworkBeta when the VPN session is established. What should you do?

  • ❏ A. Create a private endpoint in SubBeta

  • ❏ B. Deploy Azure Front Door in SubBeta

  • ❏ C. Download and reinstall the point to site VPN client on Laptop1

  • ❏ D. Use the New Self Signed Certificate cmdlet on Laptop1 to create a new client certificate

A team at Meridian Systems set up a new Azure subscription named SubAlpha and they deployed a virtual machine called AppServer1 into SubAlpha. AppServer1 is not yet configured for Azure Backup. The backups must run at 02:00 each day and be kept for 45 days. Which object should be used to configure protection for AppServer1?

  • ❏ A. Recovery plan

  • ❏ B. Recovery Services vault

  • ❏ C. Batch job

  • ❏ D. Backup policy

Your organization operates a production Azure AD tenant named mcnz.com and you provisioned a staging Azure AD tenant called staging.mcnz.com where you defined several custom administrative roles. You need to replicate those custom roles into the production tenant. What is the first action you should take?

  • ❏ A. Create an administrative unit in the production tenant

  • ❏ B. Export the custom administrative roles as a JSON file from the staging tenant

  • ❏ C. Create the equivalent custom roles directly in the production tenant

  • ❏ D. Run a tenant backup from the staging environment

While provisioning a Microsoft Azure virtual machine for a retail company named marketly, which of the following labels is not a recognized Azure VM size?

  • ❏ A. Standard_D2s_v3

  • ❏ B. Standard_Big

  • ❏ C. Standard_E2s_v4

  • ❏ D. Standard_F2s

Certification Practice Exam Questions Answered

A regional retailer named BlueFinch Systems is moving an on-premises distributed application called ServiceAlpha into an Azure subscription. After the migration ServiceAlpha will run on eleven Azure virtual machines. You must guarantee that ServiceAlpha remains running on at least ten virtual machines during planned Azure maintenance. What should you create?

  • ✓ B. one virtual machine scale set that has 13 virtual machine instances

The correct answer is one virtual machine scale set that has 13 virtual machine instances.

Virtual machine scale sets provide rolling upgrades and let you reason about how many instances might be affected during planned platform maintenance. Azure can update a portion of instances at the same time and you must size the set so that the total instances minus the maximum simultaneous updates remains at least ten. If Azure updates up to twenty percent of instances at once then you take the ceiling of twenty percent. For thirteen instances the ceiling of two point six is three and thirteen minus three equals ten so you still have at least ten running during maintenance.

one virtual machine scale set that has 15 virtual machine instances is incorrect because it is larger than necessary. Although fifteen instances would also keep at least ten running during maintenance it wastes capacity and does not represent the minimal correct configuration.

one Availability Set that has two fault domains and one update domain is incorrect because a single update domain means many or all VMs could be placed in the same update domain and they could be impacted at the same time during planned maintenance. That configuration would not guarantee that ten VMs remain running.

one Availability Set that has twelve update domains and one fault domain is incorrect because a single fault domain gives no protection against hardware failures and availability sets do not provide the same rolling upgrade control and automatic instance management that scale sets do. Availability sets also do not let you size for maintenance concurrency in the same way as a scale set.

When a question asks you to guarantee a minimum number of running instances during planned maintenance calculate the maximum concurrent updates as 20 percent of the set and then choose the smallest instance count that keeps you above the required threshold.

A software firm called FjordApps runs an Azure App Service named portalapp-prod. The environment includes a virtual network named corp-vnet and a virtual machine named db-server-02 that hosts a MySQL database. The virtual machine is connected to corp-vnet. You need to allow the app service to access the database on the virtual machine. What should you do?

  • ✓ C. Enable VNet integration for the app

The correct option is Enable VNet integration for the app.

Enabling Enable VNet integration for the app allows the App Service to make outbound calls into the virtual network and reach private IP addresses. This is the appropriate solution when an App Service needs to connect to a database running on a VM that is connected to the same virtual network because it provides direct network access without exposing the database to the public internet.

Deploy an Azure Application Gateway is focused on inbound traffic management and web application firewall capabilities for HTTP and HTTPS requests. It does not enable an App Service to initiate outbound connections to a private VM and would not be the right tool for giving the app access to the database.

Enable Hybrid Connections for the app uses a relay to reach TCP endpoints and can be useful for accessing on premises or otherwise isolated resources. It is not the simplest or most direct option when the database VM is already in the same Azure virtual network, and VNet integration is the recommended approach for Azure to Azure connectivity.

Deploy an internal load balancer provides internal load balancing for services inside a VNet but it does not by itself grant the App Service network access to the VNet. The app still needs VNet integration to reach the VM or the ILB address, so deploying an ILB alone does not solve the requirement.

When an App Service needs to reach a VM hosted database in Azure prefer VNet Integration for direct outbound access. Reserve Hybrid Connections for cross network or on premises scenarios where VNet Integration is not possible.

Your firm Brightridge Technologies uses Azure Active Directory. You must apply a conditional access policy that forces members of the TenantAdmins group to use multi factor authentication and to connect from an Azure AD joined device when they access Azure AD from locations that are not trusted. The proposed action is to open the Azure portal and change the conditional access policy grant controls so they require both multi factor authentication and an Azure AD joined device. Does this action meet the requirement?

  • ✓ B. Yes

The correct option is Yes.

Changing the Conditional Access policy grant controls so that the policy requires both multi factor authentication and an Azure AD joined device will meet the requirement when the policy is scoped to the TenantAdmins group and is applied only for sign ins from non trusted locations. Conditional Access grant controls allow you to require MFA and to require device join or compliance criteria so users are blocked unless both conditions are satisfied.

To implement this you should assign the policy to the TenantAdmins group and use the Named locations condition to identify trusted locations so the rule only applies when users sign in from untrusted places. Then configure the Grant controls to require multi factor authentication and a device requirement such as device compliance or Azure AD join so administrators must use MFA and connect from a joined device.

No is incorrect because making the described changes to the grant controls does fulfill the stated requirement when the policy assignments and location conditions are configured correctly.

When a question involves device and authentication controls check the Conditional Access Grant controls and the Named locations or Device state conditions to ensure both parts of the requirement are enforced.

Review the Northwind Solutions case study by opening the following link in a new tab and use the case details to decide how many Recovery Services vaults you must configure to protect the SMB file shares and virtual machines in the deployment https://example.com/document/d/1zbu5BJdbWU4tryp9r6jwChOKh4OQeDKigz_-WlysB_c?

  • ✓ C. Three Recovery Services vaults

The correct answer is Three Recovery Services vaults.

This choice is correct because Recovery Services vaults are regional resources and you must provision vaults to match the deployment boundaries described in the case study. The Northwind deployment places the virtual machines and SMB file shares into three distinct protection scopes so one vault per scope is required which results in Three Recovery Services vaults.

Two Recovery Services vaults is incorrect because two vaults would not cover all of the distinct regional or protection boundaries that the case study requires.

Four Recovery Services vaults is incorrect because it creates more vaults than necessary. Vaults can protect multiple VMs or file shares within the same region and subscription so you do not need one vault per resource if they share the same protection scope.

A Recovery Services vault per subscription is incorrect because vaults are scoped by region and resource boundaries rather than always requiring one per subscription. You only need separate vaults when resources span regions or have isolation requirements that prevent consolidation.

One Recovery Services vault is incorrect because a single vault cannot appropriately protect resources that live in multiple regional or protection scopes as described in the case study.

When you work with case studies, identify where resources are deployed and whether they cross regional or subscription boundaries. Remember that Recovery Services vaults are regional and you generally need separate vaults for resources in different regions or for distinct protection scopes.

A RidgeTech Azure subscription hosts 12 virtual machines. You must trigger alerts when any virtual machine restarts stops or becomes deallocated. Notifications must be delivered to three administrators by email and through the Azure mobile app. You will define alert rules action groups and actions in the Azure portal. What is the minimum number of alert rules action groups and actions you must create?

  • ✓ C. Alert rules equal 3 and action groups equal 1 and actions equal 3

The correct option is Alert rules equal 3 and action groups equal 1 and actions equal 3.

You need three alert rules because each VM lifecycle operation you must monitor is a distinct event type. Create one alert rule for restart one for stop and one for deallocate. You can scope each rule to all 12 virtual machines so you do not need a rule per VM and the three rules cover the three required events.

A single action group can be reused by all three alert rules so you do not need multiple action groups. Put the notification configuration into one action group and link that group to each alert rule to avoid duplication.

The action group must include separate notification receivers for the three administrators. Each administrator needs an email receiver and the Azure mobile app notifications are configured through the same action group, so counting receivers as actions results in a minimum of three actions to notify the three administrators.

Alert rules equal 1 and action groups equal 1 and actions equal 1 is incorrect because one alert rule cannot separately capture the three distinct VM operations you must monitor and one action would not reach three administrators.

Alert rules equal 2 and action groups equal 3 and actions equal 1 is incorrect because two alert rules cannot cover all three required operations and creating three action groups is unnecessary when a single reusable action group will suffice. A single action cannot deliver email to three administrators as separate receivers are required.

Alert rules equal 3 and action groups equal 1 and actions equal 1 is incorrect because although the number of alert rules is correct you need more than one action in the action group to notify three different administrators by email and mobile app.

When possible reuse a single action group and add separate receivers for each administrator to avoid duplication. Also scope alert rules to multiple resources so you do not need one rule per VM.

Which PowerShell cmdlet should an administrator run to deploy a new Azure virtual machine scale set?

  • ✓ C. New-AzVmss

The correct option is New-AzVmss.

New-AzVmss is the Azure PowerShell cmdlet that creates a new virtual machine scale set. It lets you specify the VM profile networking and autoscale settings and then deploy a set of identical VM instances in one operation.

New-AzVM creates a single virtual machine and not a scale set. That makes it unsuitable when the goal is to deploy a new VM scale set.

Set-AzVmss is used to modify or update an existing virtual machine scale set and it does not create a new scale set. That is why it is not the correct choice for deploying a new scale set.

Read the verb and the resource type in the cmdlet name and match them to the task. If the task is to create a scale set look for a cmdlet that starts with New and ends with Vmss.

At Nimbus Systems example.com you are deploying an ARM template to provision an Azure virtual machine and you must not store the VM administrator password in plain text. You need to reference the administrator password in the template and ensure access to it is secured. What service should you use to store the password?

  • ✓ C. Azure Key Vault

The correct option is Azure Key Vault.

Azure Key Vault is a purpose built secrets store that lets you securely store and manage passwords and other secrets and it integrates with Azure Resource Manager so templates can reference secrets without embedding plain text. You can grant the deployment a narrow set of rights by using a managed identity or Key Vault access policies and that gives you auditing and rotation capabilities separate from the template.

Azure Files share is a file storage service and it is intended for file data rather than secret management. It does not provide the secret lifecycle management or the fine grained access controls that Key Vault provides and it is not the recommended way to supply passwords to ARM templates.

Azure Automation credential asset stores credentials for Automation runbooks inside an Automation account and it is scoped to automation scenarios. It is not designed to be used as a general secret store for ARM template deployments and it lacks the same integration and access model that Key Vault provides for templates.

When deploying with ARM templates consider using Key Vault references and grant the deployment a managed identity so secrets do not appear in templates or deployment logs.

SummitSoft runs multiple virtual machines inside a virtual network in its Azure subscription and several employees connect from remote locations. Those remote employees need secure access to the virtual machines that are on the virtual network. Which type of VPN connection should be set up?

  • ✓ C. Point to Site VPN

The correct option is Point to Site VPN.

A Point to Site VPN allows individual remote users to establish secure VPN connections over the public internet directly to a virtual network so remote employees can access the virtual machines inside the VNet without requiring a VPN device at their location. It is designed for remote work scenarios and supports common VPN protocols such as SSTP, IKEv2, and OpenVPN.

Site to Site VPN is incorrect because it connects entire on premises networks to an Azure virtual network through VPN gateways. That topology is used when you need continuous connectivity between two networks rather than individual client access.

VNet to VNet is incorrect because it links two virtual networks together and is used to connect VNets across regions or subscriptions. It does not provide direct individual client VPN access for remote employees.

When the scenario describes individual remote users choose Point to Site VPN. When it describes linking entire networks choose Site to Site VPN or VNet to VNet.

Fabrikam maintains an Azure subscription with a storage account that hosts website content and static assets. You must make sure that incoming client requests enter the Microsoft network at the point of presence closest to each client. What setting should you change?

  • ✓ C. Routing preference

The correct option is Routing preference.

Routing preference on a storage account determines whether client traffic is brought onto the Microsoft network or routed over the public internet. Selecting Microsoft routing causes requests to enter the Microsoft backbone at the nearest point of presence and then travel over the Microsoft network to the storage account which meets the requirement to have clients enter at the closest PoP.

Private endpoints provide private connectivity to a storage account through Azure Private Link and a virtual network. This secures access from inside Azure and connected on prem networks but it does not control how public client requests enter the Microsoft network.

Azure Load Balancer is a regional layer four load balancer for virtual machines and services. It does not provide global anycast ingress or a storage account setting that forces traffic to the nearest Microsoft point of presence.

Azure Front Door is a global edge service that can route users to the nearest Microsoft edge and it can front storage. However it is a separate service rather than a storage account setting and the question asks which setting on the storage account to change so Azure Front Door is not the correct answer.

When a question asks about getting public traffic onto the Azure backbone at the nearest point of presence check resource level routing options such as Routing preference before selecting an additional networking service.

You manage a subscription that contains 13 virtual networks and each virtual network is placed in a separate resource group. A colleague intends to create multiple network security groups in the subscription. You must ensure that any newly created network security group will automatically block TCP port 8080 for traffic between the virtual networks. The proposed solution is to open the Resource providers blade and unregister the Microsoft.ClassicNetwork provider. Will this approach meet the requirement?

  • ✓ B. No

No is correct because unregistering the Microsoft.ClassicNetwork resource provider does not create network security groups or rules that block TCP port 8080 between virtual networks.

Unregistering the Microsoft.ClassicNetwork provider only affects the classic deployment model and prevents the creation and management of classic network resources. It does not modify Azure Resource Manager resources and it does not automatically deploy or configure Network Security Groups. To block traffic on TCP port 8080 you must apply an NSG rule or a centralized network appliance to the relevant subnets or network interfaces and ensure those rules are deployed across each virtual network.

To enforce the requirement automatically for newly created network security groups you can use Azure Policy to audit or to deploy a specific NSG rule that denies TCP port 8080. You can also use a centralized firewall or a policy driven deployment so the rule is present whenever a new NSG is created or when new subnets are provisioned.

Note that Microsoft.ClassicNetwork is associated with the classic service management model which is deprecated. That provider is not relevant for most Resource Manager based environments and it will not be the mechanism to enforce contemporary network security controls.

Yes is incorrect because simply unregistering the provider does not apply any deny rules or create NSGs. The action only prevents classic resource operations and does not meet the requirement to block TCP port 8080 across the virtual networks.

When a question asks about enforcing a security configuration across many resources think about using Azure Policy or a centralized network appliance because those approaches can automate deployment and ensure ongoing compliance.

Your cloud team manages several AKS clusters in an Azure subscription and the cluster autoscaler is enabled. You need to set the minimum and maximum node counts for a node pool by using Azure PowerShell. Which PowerShell cmdlet should you use?

  • ✓ C. Update-AzAksNodePool

The correct option is Update-AzAksNodePool.

The Update-AzAksNodePool cmdlet is used to modify properties of an existing AKS node pool and it supports changing autoscaler settings such as the minimum and maximum node counts. You use this command when you need to adjust node pool scaling limits through Azure PowerShell and you provide the appropriate parameters to set the min and max values.

Start-AzAksCluster is not correct because that cmdlet is intended to start a stopped managed cluster and it does not configure node pool autoscaler settings.

Update-AzAksCluster is not correct because that cmdlet updates cluster level properties rather than the specific node pool scaling parameters. Node pool min and max counts are managed at the node pool level.

Set-AzAksCluster is not correct because it is not the cmdlet used to change node pool autoscaler limits. It does not target individual node pool settings needed to set minimum and maximum node counts.

When you need to change node pool scaling limits in PowerShell remember to run Update-AzAksNodePool and confirm that the cluster autoscaler is enabled before you apply the new min and max values.

BlueHive runs two Azure virtual networks named CorpVNetA and CorpVNetB. CorpVNetA hosts a virtual machine called AppVM1 and CorpVNetB hosts a virtual machine called DataVM2. The frontend application on AppVM1 requests data from DataVM2 and the users are experiencing higher latency than normal. You need to determine the average round trip time of packets sent from AppVM1 to DataVM2. Which Azure Network Watcher feature should you use?

  • ✓ D. Connection Monitor

The correct option is Connection Monitor.

Connection Monitor is the Network Watcher feature that performs active monitoring between specified endpoints and reports connectivity metrics such as round trip time, latency, and packet loss. It can run tests from a virtual machine in one virtual network to a virtual machine in another virtual network and report average RTT over the test intervals.

Connection Monitor is the right choice for this scenario because you can configure AppVM1 as the source and DataVM2 as the destination and collect ongoing measurements of average round trip time. The feature provides timestamped metrics and logs that help you identify when latency increased and how large the delays were.

IP Flow Verify is incorrect because it only checks whether a specific flow is allowed or denied by network security rules at a point in time. It does not measure latency or provide average round trip time metrics.

Network Security Group flow logs are incorrect because they provide flow records for traffic that match NSG rules and are useful for auditing and traffic analysis. They do not perform active endpoint tests that yield round trip time measurements.

Network Performance Monitor is incorrect in this context because it is a broader monitoring solution for network health and topology and it typically relies on additional configuration or agents for complex scenarios. The direct, built in way to measure VM to VM round trip time in Azure Network Watcher is Connection Monitor.

When a question asks about measuring round trip time or latency between endpoints look for tools that perform active endpoint monitoring. Connection Monitor is often the right choice for VM to VM latency tests.

Your operations team exported an Azure Resource Manager template to provision several Linux virtual machines for a pilot at BlueHarbor Technologies. The template was captured from an existing VM and must be modified to reference an administrator password without persisting it as plain text. You are preparing to create the resources that will enable secure secret management and controlled access. What resources should you create to accomplish this? (Choose 2)

  • ✓ B. Azure Key Vault

  • ✓ C. Access Policy

Azure Key Vault and Access Policy are the correct resources to create to enable secure secret management and controlled access for the ARM template scenario.

Azure Key Vault is the managed service designed to store and serve secrets and keys so that sensitive values like administrator passwords are not persisted in plain text in templates or code. It integrates with Azure Resource Manager so templates can reference secrets at deployment time rather than embedding credentials.

Access Policy is the mechanism used to grant precise secret and key permissions to principals so the deployment or a specific identity can retrieve the administrator password when provisioning the VMs. Access policies live on the Key Vault and control who can get or list secrets and perform other operations.

Azure Policy is a governance tool that enforces rules and resource configurations across subscriptions and it does not provide secret storage or direct runtime secret retrieval for deployments.

Entra ID Identity Protection focuses on detecting and mitigating identity risks and risky sign in activity and it is not a service for storing or serving secrets to templates.

Azure Storage Account is general purpose storage for blobs, files, queues, and tables and it is not intended to be used as a secrets store without additional custom encryption and access controls.

Backup Policy defines backup schedules and retention for protected resources and it does not manage secrets or provide controlled secret access for provisioning workflows.

When an exam question asks about storing and supplying secrets to deployments, choose a dedicated secrets service such as Azure Key Vault and then consider how access is granted, because access control is as important as secure storage.

A regional online retailer is deploying a resilient Azure web front end and wants it reachable through a vanity domain while maintaining high availability across multiple virtual machines. What steps should be taken to accomplish this? (Choose 2)

  • ✓ B. Register the vanity hostname in the Azure portal and configure the domain DNS to point to the load balancer front end IP

  • ✓ C. Configure an Azure public load balancer and add the virtual machines to its backend pool

The correct answers are Register the vanity hostname in the Azure portal and configure the domain DNS to point to the load balancer front end IP and Configure an Azure public load balancer and add the virtual machines to its backend pool.

Registering the vanity hostname and updating the domain DNS to point to the load balancer front end IP ensures that your public name resolves to a single stable address that represents the load balanced service. You create an A record that points to the load balancer public IP or use the appropriate DNS record type and that keeps the vanity name reachable even if individual VMs change.

Configuring an Azure public load balancer and adding the virtual machines to its backend pool provides distribution of traffic across multiple VMs and enables health probes to detect and remove unhealthy instances. The load balancer uses a front end IP that you reference in DNS and it preserves high availability while allowing you to scale or replace backend VMs without changing the vanity domain configuration.

Assign static public IP addresses to each virtual machine running the website is incorrect because assigning separate public IPs to each VM does not provide built in load balancing or health monitoring. Pointing DNS at multiple VM IPs is more complex to manage and it still leaves you without the centralized health aware routing that a load balancer provides.

Directly route the domain hostname to a single virtual machine for simplicity is incorrect because that creates a single point of failure and it does not meet the requirement for high availability across multiple virtual machines. A single VM cannot provide the resilience that a load balancer with a backend pool provides.

When mapping a vanity domain to a multi VM backend remember to point DNS at the load balancer front end IP and verify the load balancer has a static public IP and working health probes. Use A records for IP based front ends and test failover after making changes.

You administer a file share for a regional retailer called Northvale Systems and you want to confirm network access by running a PowerShell test. You set $hostName = “northvalestorage.example.com” and then execute Test-NetConnection -ComputerName $hostName -Port _. Which port should you test to verify SMB file share connectivity?

  • ✓ C. 445

The correct option is 445.

Port 445 is used by the Server Message Block protocol for direct hosted file sharing on modern Windows systems and verifying that TCP port 445 is reachable confirms SMB connectivity to the file share.

Running Test-NetConnection with the Port parameter set to 445 checks TCP connectivity and will show TcpTestSucceeded true when the SMB service is reachable and packets can traverse the network to the storage host.

3389 is incorrect because that port is reserved for Remote Desktop Protocol and it will not test SMB file share access.

8080 is incorrect because that port is commonly used for HTTP or web services and it does not correspond to SMB.

2222 is incorrect because it is commonly an alternative SSH port and it is not used for Windows file sharing.

When a question asks about a service use common port mappings to guide your choice and when possible run Test-NetConnection to verify TCP port reachability.

You manage a subscription that contains a resource group named AppRG02 and you plan to deploy a storage account called dataacct01 using a Bicep file named main.bicep. You must update main.bicep so that dataacct01 is provisioned into AppRG02. Which property do you need to change?

  • ✓ D. scope

The correct option is scope.

The scope property in Bicep directs the deployment to a specific deployment scope so you can provision resources into an existing resource group such as AppRG02. You set the scope on a resource or module or use the resourceGroup function to target the exact resource group where the storage account should be created.

sku is incorrect because sku only defines the storage account performance and redundancy tier and it does not control which resource group the resource is deployed into.

kind is incorrect because kind specifies the storage account type such as StorageV2 or BlobStorage and it does not affect placement into a resource group.

location is incorrect because location sets the Azure region for the resource and it does not determine the resource group that will contain the resource.

When a question asks about where a Bicep resource will be deployed focus on the scope or targetScope keywords and the resourceGroup function as these control the target resource group.

You manage an Office 365 subscription and an Azure Active Directory tenant for a company named scrumtuous.com. You must grant three users named Alice Bob and Carol temporary access to a SharePoint document library named TempDocs. You need to create groups for the users and ensure the groups are deleted automatically after 120 days. Which two types of groups should you create? (Choose 2)

  • ✓ C. Microsoft 365 group with Assigned membership

  • ✓ D. Security group with Assigned membership

The correct options are Microsoft 365 group with Assigned membership and Security group with Assigned membership.

The Microsoft 365 group with Assigned membership is correct because Microsoft 365 groups integrate directly with SharePoint and are designed to grant collaborative access to resources such as a document library. Assigned membership lets you add the three specific users explicitly and an Azure AD group expiration policy can remove or delete the group after the 120 day period.

The Security group with Assigned membership is also correct because security groups can be used to assign permissions to SharePoint resources and assigned membership lets you add Alice Bob and Carol directly. Security groups are supported by Azure AD group lifecycle and expiration policies so the group can be automatically removed after 120 days.

Security group with Dynamic Device membership is wrong because device-based dynamic membership targets devices rather than user accounts and it is not appropriate when you need to grant temporary access to specific user identities.

Security group with Dynamic User membership is wrong because dynamic user groups are evaluated by rule and are meant for automated membership based on attributes rather than for granting temporary access to a small set of named users. Dynamic groups do not fit a requirement to explicitly add just three users for a short period.

Microsoft 365 group with Dynamic User membership is wrong for the same reason because dynamic Microsoft 365 groups determine membership by rules and attributes instead of manual assignment. That makes them unsuitable when you need to grant specific individuals temporary access and then delete the group on a fixed schedule.

When a question asks for temporary access for specific people think assigned membership and verify whether a group expiration or lifecycle policy can enforce the automatic deletion.

A company has an Azure virtual network named VNetProd that connects to its on premises datacenter by a site to site VPN. VNetProd includes a subnet named AppSubnet and that subnet is associated with a network security group named NSGApp. AppSubnet contains an internal load balancer named ILBProd and the backend pool has four Azure virtual machines. You need to collect information about the IP addresses that connect to ILBProd and you must be able to run interactive queries from the Azure portal against the collected data. On which resource should you enable diagnostics?

  • ✓ C. Network security group

The correct option is Network security group.

You enable diagnostics on the Network security group because NSG flow logs record source and destination IP addresses ports protocol and traffic direction and you can send those logs to a Log Analytics workspace for interactive Kusto queries in the Azure portal.

The Internal Load Balancer is incorrect because the load balancer provides metrics and certain logs but it does not produce the centralized flow level records of client source IPs for backend VM traffic in the way that NSG flow logs do.

The Network Watcher option is incorrect because Network Watcher is a collection of network monitoring tools rather than the resource where you enable flow log diagnostics. You use Network Watcher features to analyze data but you enable flow logging on the NSG itself.

The Azure virtual machines option is incorrect because collecting per VM network connection logs would require guest level logging and aggregation on each VM. That approach is more complex and does not provide the centralized NSG flow logs that are designed for querying connection IPs from the portal.

Remember to look for resources that produce flow level logs. Enable diagnostics on the NSG and send the logs to a Log Analytics workspace so you can run interactive queries in the Azure portal.

You are administering virtual machines for Orion Tech and you notice that one backend virtual machine behind an Azure Load Balancer is not receiving any incoming requests. What should you check first to start troubleshooting?

  • ✓ C. Confirm the virtual machine OS firewall allows inbound traffic on the required ports

The correct option is Confirm the virtual machine OS firewall allows inbound traffic on the required ports.

Check the VM operating system firewall first because the Azure Load Balancer forwards traffic to the VM network interface but the guest OS can still block the connection. If the OS firewall blocks the service port then no incoming requests will reach the application even when networking and load balancer settings are correct. Also verify that the application is listening on the expected port and that the firewall rule permits the correct protocol and scope.

Inspect the Network Security Group rules applied to the network interface or subnet is useful but it is not the first thing to check because many cases where a backend receives no requests are caused by the guest OS firewall. You should still review NSGs if the OS firewall and service are configured correctly.

Verify the virtual machine is registered in the load balancer backend pool matters because an unregistered VM will not receive load balanced traffic. However this is not the quickest diagnostic step and you can often confirm registration from the load balancer console after you rule out the OS firewall and service listening issues.

Check the load balancer health probe results and backend health status is important for diagnosing why a VM is not receiving traffic because a failed probe will mark the VM as unhealthy. Many probe failures are caused by the VM firewall or the service not listening so checking the OS firewall first helps identify the common root cause quickly.

When a backend VM is not receiving traffic check the VM OS firewall and whether the application is listening first because these are common and quick causes to verify.

You must configure an Azure file share for the accounting team at SolisTech and they need to keep file modifications and be able to recover deleted files for 15 days. Which file share feature should you enable?

  • ✓ D. Soft Delete for Azure Files

The correct option is Soft Delete for Azure Files.

Soft Delete for Azure Files preserves deleted files and directories for a configurable retention period and lets you restore them within that window, so it meets the requirement to recover deleted files for 15 days.

Azure File Share snapshots create point in time copies of a file share but they must be created before a deletion and they do not provide an automatic retention window for deleted items, so they do not directly satisfy a 15 day automatic recovery requirement.

Blob versioning applies to blob storage and tracks versions of blobs, so it does not apply to Azure Files and cannot be used to recover deleted files in a file share.

Blob lifecycle management is used to automate tiering and deletion policies for blobs and it does not provide file share deletion recovery nor does it apply to Azure Files.

When a question asks to recover deleted files for a set number of days look for features that explicitly mention soft delete or a configurable retention window for the service in question.

You are the Azure administrator for a global shipping company called Aurora Freight and you must grant a support team rights to manage virtual machines within an Azure subscription while preventing them from modifying network configurations. Which built in Azure role should you assign?

  • ✓ D. Virtual Machine Contributor

The correct answer is Virtual Machine Contributor.

The Virtual Machine Contributor role allows users to create and manage virtual machines and associated compute resources while it does not permit changes to virtual network or network security configurations. It includes permissions to start stop restart and manage disks and extensions which lets the support team perform VM operations without granting rights to modify networking.

Contributor is too permissive because it grants full management of all resources in the scope including network settings which you want to prevent.

Network Contributor is incorrect because it grants permissions to manage networking resources but it does not allow the level of virtual machine management that the support team needs.

Reader is incorrect because it only provides read only access and does not allow creation or management of virtual machines.

Match roles to the specific resource type you need to manage and avoid broad roles that include network permissions when networking must be restricted. Virtual Machine Contributor is a common choice for VM management without network change rights.

Edgeware Inc runs an Azure virtual machine called WebServer-02 and the cloud team received an immediate alert that the instance will undergo host level maintenance shortly. You must move WebServer-02 to a new physical host right away while preserving its configuration. The operator opens the Redeploy and reapply blade in the Azure portal and clicks Redeploy. Will this action accomplish the required relocation?

  • ✓ B. Yes

The correct answer is Yes.

Using the Redeploy action will move the virtual machine to a new physical host while preserving its configuration and attached managed disks and network settings. Redeploy provisions the VM on a different Azure host and restarts it so the machine comes up on the new node with the same OS disk, network interfaces, and VM metadata intact.

Note that the temporary or ephemeral disk that is tied to the original physical host is not preserved during a redeploy and any data on that drive will be lost. Extensions and VM agent state are typically reinstalled or reinitialized as the VM comes up on the new host.

No is incorrect because the Redeploy operation is explicitly intended to relocate a VM to a new host while keeping its configuration, which is exactly what the question requires.

When you see host level maintenance in an exam scenario think of the Redeploy action to move the VM to a new host and keep in mind that the temporary disk will not persist.

A subscription named SubAlpha contains a virtual network called VNetProd that is in a resource group named RGApps. The subscription has a user named Alice and Alice currently holds the Reader role and the Security Admin role and the Security Reader role. You need to allow Alice to assign the Reader role for VNetProd to other users. What should you do?

  • ✓ C. Assign Alice the Owner role for VNetProd

The correct answer is Assign Alice the Owner role for VNetProd.

The Assign Alice the Owner role for VNetProd option is correct because the Owner role at the resource scope grants full management rights including the ability to create and modify role assignments. Assigning Owner on VNetProd gives Alice the Microsoft.Authorization/roleAssignments/write permission that she needs to assign the Reader role to other users for that virtual network.

Assign Alice the Network Contributor role for VNetProd is incorrect because the Network Contributor role allows management of networking resources but it does not include permissions to manage access or assign roles.

Remove Alice from the Security Reader role and assign Alice the Contributor role for RGApps is incorrect because the Contributor role grants resource management but it does not permit managing role assignments. Removing Security Reader is unnecessary and giving Contributor at the resource group scope still would not let Alice assign RBAC roles.

Assign Alice the User Access Administrator role for VNetProd is incorrect in this scenario because the exam answer expects a role that unambiguously provides full control at the resource scope. The Owner role unambiguously includes both resource management and access management for VNetProd which ensures Alice can assign the Reader role to others.

When a question asks who can assign roles look for roles that grant role assignment permissions and make sure the role is given at the same scope as the resource.

A small services firm called Northwave operates an Azure storage account named acctstore2 and needs to let a user named JordanL list the account keys and regenerate them. You plan to assign the Storage Account Key Operator Service Role to JordanL. Will this satisfy the requirement?

  • ✓ B. Yes

The correct option is Yes.

The Yes option is correct because the built in Storage Account Key Operator Service Role grants the permissions needed to list and regenerate the access keys for a storage account. The role includes the specific actions that allow a user to retrieve key values and to perform key regeneration while it does not grant rights to read or write the storage data itself.

Assigning that role to JordanL therefore satisfies the requirement to let the user list the account keys and regenerate them without giving broader owner or contributor permissions.

No is incorrect because that response implies the role would not permit key listing or regeneration. The Storage Account Key Operator Service Role is explicitly designed to allow those key operations so answering No is wrong.

When a question asks about managing storage account keys look for the Storage Account Key Operator Service Role which allows listing and regenerating keys but does not grant data access.

These items are part of a scenario set that shares the same background and each item offers a different solution. After you answer this item you will not be able to return to it. TailwindAD is an Azure Active Directory tenant for a company named Tailwind and the subscription is named SubA. TailwindAD contains a group named AppBuilders and SubA contains a resource group named DevelopmentRG. You need to allow the AppBuilders group to create Azure Logic Apps within the DevelopmentRG resource group. The proposed solution is to assign the DevTest Labs User role at the subscription level to the AppBuilders group. Does this meet the requirement?

  • ✓ B. No

No is correct. Assigning the DevTest Labs User role at the subscription level to the AppBuilders group does not allow them to create Azure Logic Apps in the DevelopmentRG resource group.

The DevTest Labs User role is intended for managing DevTest Labs resources and it does not include the Microsoft.Logic write permissions required to create Logic Apps. To allow creation of Logic Apps you need a role that grants Logic Apps write actions, for example Logic App Contributor or the broader Contributor role. You should assign that role at the DevelopmentRG resource group scope to follow the principle of least privilege and to ensure the group can create Logic Apps only in that resource group.

Yes is incorrect because a subscription level assignment of the DevTest Labs User role does not provide the necessary permissions to create Logic Apps. The mismatch is both in the role capabilities and in expecting a DevTest Labs focused role to enable Logic Apps operations.

When you see questions about creating or managing a specific resource check both the role permissions and the assignment scope. Prefer assigning a resource specific built in role such as Logic App Contributor at the resource group when possible.

HarborTech Solutions wants to strengthen its security posture by removing direct internet exposure of SSH port 22 and RDP port 3389 on its Azure virtual machines while still allowing secure remote administration. Which Azure service can help them meet this requirement?

  • ✓ C. Azure Bastion

Azure Bastion is the correct option.

Azure Bastion provides secure RDP and SSH access to virtual machines directly through the Azure portal over TLS so you do not need to expose port 22 or 3389 on the VM public IPs. It is deployed inside the virtual network and lets administrators connect without assigning public IP addresses to the VMs which removes direct internet exposure while still allowing remote administration.

Azure Firewall is a managed network firewall that can filter and log traffic but it does not provide a managed browser based RDP and SSH solution that removes the need for VM public IPs. You would still need to design NAT or jump hosts to achieve the same seamless remote administration experience that Bastion provides.

Network Security Group can block or allow ports such as 22 and 3389 at the subnet or network interface level but it is a traffic filter and not a remote access mechanism. Using NSGs alone can restrict exposure but it will not provide the portal integrated, no public IP RDP and SSH access that Bastion offers.

Azure VPN Gateway can provide private connectivity for administrators and avoid public exposure when you use a client VPN or site to site VPN. However it requires VPN setup on the client side and additional networking configuration which is different from the managed, in portal remote management that Azure Bastion delivers.

When a question asks to remove public exposure of SSH and RDP while keeping easy admin access think of managed bastion style services that offer in portal or private access rather than only network filters or firewalls.

You were recently appointed as the Azure administrator at Meridian Software and you must add a team member to an existing tenant group. Which Azure service would you use to carry out this action?

  • ✓ D. Entra ID

The correct answer is Entra ID.

Entra ID is Microsofts identity and access management service for Azure tenants and directories. Administrators use it to create and manage users, groups, and roles and to control membership of tenant groups. To add a team member to an existing tenant group you perform the action in Entra ID because that is where directory users and group memberships are managed.

Entra ID is the current name for the service that was commonly called Azure Active Directory. You may still see the older name in study materials and in some portal references, but the function is the same and newer exams will refer to Entra ID.

Cloud Identity is a Google Cloud identity product and not the service used to manage Azure tenant users. It is not used to add members to an Azure tenant group.

Azure Resource Manager manages deployment and organization of Azure resources and templates and it does not manage directory users or group membership. Identity tasks such as adding users to groups are done in Entra ID.

Azure DevOps is focused on source control, pipelines, and project collaboration and it does not provide tenant wide identity management for adding users to groups. That responsibility belongs to Entra ID.

When a question asks about adding or managing users in an Azure tenant think identity and look for Entra ID or the older name Azure Active Directory.

An infrastructure team at NovaLedger wants to track the CPU load for a Linux virtual machine in Microsoft Azure by using the platform monitoring service. Which metric will most directly indicate the VM’s CPU usage?

  • ✓ C. Percentage CPU

Percentage CPU is the correct metric to most directly indicate the VM’s CPU usage.

That metric reports the percentage of CPU capacity used by the virtual machine across its cores and it is the standard Azure Monitor metric for CPU utilization so it directly reflects how busy the VM’s processors are.

Processor Queue Length measures the number of threads waiting for processor time and it can indicate contention but it does not directly show the proportion of CPU in use so it is not the best choice for reporting CPU usage.

Network In Total measures incoming network traffic in bytes and it has no direct relation to processor utilization so it will not tell you about CPU usage.

Processor Time is a Windows performance counter term that is similar in concept to CPU percentage but it is not the standard Azure Monitor metric name used for VM CPU usage and on Linux the platform metric provided for CPU utilization is Percentage CPU so Processor Time is not the right answer for this question.

When a question asks for CPU usage choose metrics that explicitly say percentage or utilization and avoid counters that measure queue length or network activity.

A regional charity plans to run its workloads on Microsoft Azure and wants each division to receive invoices only for the resources that they consume. The team proposes using Azure role based access control to separate billing by division. Will this strategy provide the required separation of charges?

  • ✓ B. Azure role based access control alone will not isolate department charges

The correct answer is Azure role based access control alone will not isolate department charges.

Azure role based access control alone will not isolate department charges is correct because RBAC controls who can view and manage resources and it does not change the billing boundary. Billing separation and the issuance of separate invoices are determined by subscription and billing account scopes so you must separate those scopes to get division specific invoices.

Create separate subscriptions and group them with management groups for division level billing is incorrect in the context of the proposed strategy because the team proposed using RBAC only rather than changing the subscription structure. Creating separate subscriptions is commonly used to enforce billing boundaries and to receive separate invoices for each division, but that approach is not what the question asked about.

Use resource tags together with Azure Cost Management to allocate expenses to divisions is incorrect because tags and Cost Management are useful for allocating and reporting costs but they do not create isolated billing scopes or separate invoices. Tags require strong governance and they provide allocation rather than true invoice separation.

Yes implementing Azure role based access control will allocate billing per division is incorrect because RBAC does not control billing or invoicing and it cannot prevent resources in a shared subscription from being billed to the same invoice.

When a question mentions invoices or separate charges think about billing boundaries such as subscriptions and billing accounts rather than access controls and remember that tags and cost reports help with allocation but do not create separate invoices.

A digital media company named BlueStream is provisioning an Azure Storage account and plans to add 12 blob containers. One container must use a different key for encrypting data at rest. What should you do before you create that specific container?

  • ✓ B. Create an encryption scope for the storage account

The correct answer is Create an encryption scope for the storage account.

A Create an encryption scope for the storage account lets you define a specific encryption key that containers can use for server side encryption. You create the encryption scope before you create the container so the container can reference that scope at creation time. Encryption scopes support using a customer managed key when you need one container to use a different key than the rest of the account.

Rotate the storage account access keys is not correct because rotating access keys affects authentication secrets and access, and it does not provision or assign a different encryption key for a specific container.

Assign a customer managed key to the entire storage account is not correct because assigning a single customer managed key at the account level applies that key to all containers and blobs. That approach does not allow one container to have a different key from the others.

Generate a shared access signature for the container is not correct because a shared access signature controls delegated access to storage resources and it does not set or change the encryption key used for data at rest.

When a question asks about using a different encryption key for a single container think of encryption scopes and remember you must create the scope before creating the container so it can reference the scope at creation time.

Your company uses an identity tenant called NovaID and you plan to import a large batch of user accounts while ensuring each imported account is automatically added to the proper group according to the user department attribute with minimal administrative overhead, what should you configure? (Choose 2)

  • ✓ B. Create a CSV file that contains user attributes and department data

  • ✓ C. Create groups configured for Dynamic User membership

The correct answers are Create a CSV file that contains user attributes and department data and Create groups configured for Dynamic User membership.

Create a CSV file that contains user attributes and department data allows you to bulk import many accounts at once and include the department attribute for each user so the directory contains the values needed to evaluate membership rules.

Create groups configured for Dynamic User membership lets you define rules that reference the department attribute so matching users are automatically added to the appropriate groups without manual changes.

Write a PowerShell script that parses the import file and applies group assignments is technically possible but it requires custom scripting and ongoing maintenance and therefore adds administrative overhead compared with using built in CSV import and dynamic group rules.

Create groups configured for Assigned membership requires administrators to add users to groups manually or through scripted assignments and it does not provide automatic, attribute based membership.

Create an XML file that contains user attributes and department data is not the supported format for Azure AD bulk user import which expects a CSV file and cannot be consumed directly for the bulk create operation.

Deploy an Azure Resource Manager template to provision identity resources is intended for provisioning resource objects and infrastructure and is not the mechanism to import user accounts or to apply dynamic group membership based on user attributes.

When a question emphasizes automation and minimal administrative overhead look for answers that use attribute driven imports together with dynamic group rules rather than options that require manual or custom scripted assignments.

You manage two Azure subscriptions named SubAlpha and SubBeta. SubAlpha contains a virtual network named NetworkAlpha and a VPN gateway. SubBeta contains a virtual network named NetworkBeta. An on premises laptop named Laptop1 runs Windows and has a point to site VPN client installed. You configure virtual network peering between NetworkAlpha and NetworkBeta. You need to ensure that Laptop1 can access resources in NetworkBeta when the VPN session is established. What should you do?

  • ✓ C. Download and reinstall the point to site VPN client on Laptop1

The correct option is Download and reinstall the point to site VPN client on Laptop1.

Reinstalling the point to site VPN client ensures the laptop receives the updated VPN profile and route information from the Azure VPN gateway. When you add peering or change gateway transit settings the gateway may generate a new client configuration that includes routes to the peered virtual network so the client must install that updated package to reach resources in NetworkBeta.

Create a private endpoint in SubBeta is incorrect because a private endpoint uses Private Link to expose a specific PaaS resource privately and it does not change VNet level routing for a point to site VPN client.

Deploy Azure Front Door in SubBeta is incorrect because Front Door is an application delivery and global load balancing service and it does not provide VPN connectivity or VNet peering routing.

Use the New Self Signed Certificate cmdlet on Laptop1 to create a new client certificate is incorrect because generating a certificate locally does not address missing routes and client certificates must be created and registered according to Azure requirements. The root cause is the client needs the updated VPN profile with the peered VNet routes rather than a new local certificate.

After you change peering or gateway settings remember to download and reinstall the point to site VPN client so the workstation receives the updated routes and configuration.

A team at Meridian Systems set up a new Azure subscription named SubAlpha and they deployed a virtual machine called AppServer1 into SubAlpha. AppServer1 is not yet configured for Azure Backup. The backups must run at 02:00 each day and be kept for 45 days. Which object should be used to configure protection for AppServer1?

  • ✓ D. Backup policy

Backup policy is correct. A Backup policy is the object where you define the backup schedule and retention rules that are applied to a protected machine.

To have AppServer1 backed up at 02:00 each day and retained for 45 days you create or edit a Backup policy with a daily schedule at 02:00 and a 45 day retention setting and then associate that policy with the VM’s backup item.

Recovery Services vault is incorrect because the vault is the storage container that holds backup data and records. You still need a Backup policy to define when and how long backups are kept even though the backups themselves are stored in the Recovery Services vault.

Recovery plan is incorrect because recovery plans are part of Azure Site Recovery and they orchestrate failover and recovery sequences for disaster recovery. They do not configure regular backup schedules or retention for Azure Backup.

Batch job is incorrect because Azure Batch is a service for running large scale parallel and high performance compute jobs. It has no role in defining or applying backup schedules or retention for virtual machines.

When the question asks about scheduling and retention think of a policy first and then confirm whether another object stores data or orchestrates recovery.

Your organization operates a production Azure AD tenant named mcnz.com and you provisioned a staging Azure AD tenant called staging.mcnz.com where you defined several custom administrative roles. You need to replicate those custom roles into the production tenant. What is the first action you should take?

  • ✓ B. Export the custom administrative roles as a JSON file from the staging tenant

The correct action is Export the custom administrative roles as a JSON file from the staging tenant.

Export the custom administrative roles as a JSON file from the staging tenant captures the role definitions exactly so you can import or apply them in the production tenant in a repeatable and auditable way. You can perform the export with Microsoft Graph or Azure AD PowerShell and the JSON contains the unified role definitions including permissions and settings.

Create an administrative unit in the production tenant is incorrect because administrative units are for scoping role assignments and do not provide a mechanism to copy or export role definitions between tenants.

Create the equivalent custom roles directly in the production tenant is not the best first step because manually recreating roles is error prone and time consuming. It is better to export the exact definitions and then import them so permissions and descriptions match exactly.

Run a tenant backup from the staging environment is incorrect because Azure AD does not provide a tenant backup and restore feature that transfers custom role definitions between tenants. Backing up the tenant is not the supported method for moving custom roles.

When you need to move custom roles between tenants think about exporting the role definitions first and then importing them so the exact permissions and settings are preserved.

While provisioning a Microsoft Azure virtual machine for a retail company named marketly, which of the following labels is not a recognized Azure VM size?

  • ✓ B. Standard_Big

The correct answer is Standard_Big because that label is not a recognized Azure VM size.

Azure VM sizes use a structured naming pattern that includes a series letter, a numeric size, and optional suffixes that indicate optimized features and generation. For example the D, E, and F series use names like Standard_D2s_v3 and Standard_E2s_v4. The label Standard_Big does not follow the documented pattern and it does not appear in the official sizes list.

Standard_D2s_v3 is a valid Azure VM size in the Dv3 series and it therefore is not the correct answer to this question.

Standard_E2s_v4 is a valid Azure VM size in the Ev4 series and it therefore is not the correct answer to this question.

Standard_F2s matches the naming pattern for the F series of VMs and it is a recognized size so it is not the correct answer.

When asked to identify an invalid VM size look for names that do not follow the series letter number and suffix pattern. Pay attention to the presence of s_ and vN_ suffixes which often indicate size features and generation.

Jira, Scrum & AI Certification

Want to get certified on the most popular software development technologies of the day? These resources will help you get Jira certified, Scrum certified and even AI Practitioner certified so your resume really stands out..

You can even get certified in the latest AI, ML and DevOps technologies. Advance your career today.

Cameron McKenzie Cameron McKenzie is an AWS Certified AI Practitioner, Machine Learning Engineer, Copilot Expert, Solutions Architect and author of many popular books in the software development and Cloud Computing space. His growing YouTube channel training devs in Java, Spring, AI and ML has well over 30,000 subscribers.