Free Practice Questions Azure Administrator Associate 60 Questions with Answers Free Practice Questions Azure Administrator Associate 60 Questions with Answers
FREE QUESTIONS

Azure Administrator Associate
Practice Questions

60 free questions with correct answers and detailed explanations.

60 Free Questions
2 Free Exams
100% With Explanations

AZ-104 Practice Set-01

30 questions
Q1
Your company has acquired another organization. You need to allow users from the acquired company's Azure AD tenant to access resources in your Azure subscription without creating new accounts in your tenant. Which Azure AD feature should you use?
A Azure AD B2C
Azure AD B2B collaboration
C Azure AD Domain Services
D Azure AD Connect sync
Correct Answer
Azure AD B2B collaboration
Explanation
Azure AD B2B collaboration allows external users (guests) from another Azure AD tenant to be invited to your tenant and assigned access to resources. This avoids creating duplicate accounts. Azure AD B2C is for customer identity. Federation requires deeper integration. Learn more: https://learn.microsoft.com/en-us/entra/external-id/what-is-b2b
Q2
You need to assign Azure AD roles using a group-based approach. The security group 'IT-Admins' should receive the User Administrator role. However, Azure AD requires a specific license for group-based role assignment. Which license feature is required?
A Azure AD Free
Azure AD Premium P1
C Azure AD Premium P2
D Microsoft 365 E5 only
Correct Answer
Azure AD Premium P1
Explanation
Assigning Azure AD roles to groups (role-assignable groups) requires Azure AD Premium P1 license at minimum. The group must be created with the 'isAssignableToRole' property set to true. This property cannot be changed after group creation. Learn more: https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/groups-concept
Q3
An organization needs Azure Policy to automatically add missing tags to existing non-compliant resources AND prevent new resources from being created without required tags. Which two policy effects should you use together? (Choose two.)
Deny - to block creation of resources without required tags
Modify - to add missing tags to existing resources with a remediation task
C Append - to add tags at creation time only
D Audit - to flag non-compliant resources
Correct Answers
Deny - to block creation of resources without required tags
Modify - to add missing tags to existing resources with a remediation task
Explanation
Deny prevents creation of non-compliant resources. Modify with a remediation task retroactively fixes existing resources by adding missing tags. Append only works at creation. Audit only reports. Learn more: https://learn.microsoft.com/en-us/azure/governance/policy/concepts/effects
Q4
You manage cost for multiple departments using Azure subscriptions. The Finance department must not exceed a monthly spend of $10000. You need an automated notification when spending reaches 80% of this budget. What should you configure?
A Azure Advisor cost recommendations
Azure Budget with an alert at 80% threshold
C Azure Monitor metric alert on billing data
D Cost Analysis with a scheduled report
Correct Answer
Azure Budget with an alert at 80% threshold
Explanation
Azure Budgets in Cost Management allow you to set spending thresholds and configure alerts at specified percentages. Action groups can trigger notifications via email, SMS, or automation. Cost Analysis shows current spending but does not alert. Learn more: https://learn.microsoft.com/en-us/azure/cost-management-billing/costs/tutorial-acm-create-budgets
Q5
A security audit reveals that several Azure AD accounts have not been used in over 90 days. You need to regularly identify and review inactive accounts. Which two Azure AD features should you use together? (Choose two.)
Azure AD sign-in logs to identify inactive accounts
Azure AD Access Reviews to review and certify or remove access
C Azure AD Conditional Access to block inactive users
D Azure AD Identity Protection risk policies
E Azure Advisor recommendations
Correct Answers
Azure AD sign-in logs to identify inactive accounts
Azure AD Access Reviews to review and certify or remove access
Explanation
Azure AD sign-in logs track user sign-in activity, allowing you to identify accounts that have not signed in within 90 days. Access Reviews enable periodic review of user access by managers or resource owners to certify or revoke inactive accounts. Learn more: https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-sign-ins
Q6
You create an Azure Blueprint that includes a policy assignment, a role assignment, and an ARM template. You assign the blueprint to a subscription. Later you need to prevent anyone from modifying the resources deployed by the blueprint. Which blueprint lock mode should you use?
A None
B DoNotDelete
ReadOnly
D CanNotModify
Correct Answer
ReadOnly
Explanation
Blueprint lock mode 'DoNotDelete' prevents deletion but allows modification. 'ReadOnly' prevents both modification and deletion of blueprint-deployed resources, even by subscription owners. 'None' applies no locks. There is no 'CanNotModify' lock mode. Learn more: https://learn.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking
Q7
Your organization has Azure AD Connect synchronizing identities from on-premises Active Directory. A user's on-premises account is disabled. What happens to the corresponding Azure AD account after the next sync cycle?
A The Azure AD account is immediately deleted
The Azure AD account sign-in is blocked
C The Azure AD account remains fully active
D The Azure AD account is moved to a deleted users container
Correct Answer
The Azure AD account sign-in is blocked
Explanation
When Azure AD Connect syncs a disabled on-premises AD account, the Azure AD account sign-in is also blocked (AccountEnabled is set to false). The account is not deleted; it remains in Azure AD but the user cannot sign in. Tokens already issued may remain valid until expiry. Learn more: https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/how-to-connect-sync-whatis
Q8
A developer needs to create and manage Azure App Services and deployment slots. They should NOT manage VNets or SQL databases. Which two configurations achieve least-privilege access? (Choose two.)
A Assign the Contributor role at the subscription level
Assign the Website Contributor role at the resource group scope containing the App Services
Verify the developer has no broader inherited roles from parent scopes
D Assign the Web Plan Contributor role
E Assign the Owner role on the App Service resource
Correct Answers
Assign the Website Contributor role at the resource group scope containing the App Services
Verify the developer has no broader inherited roles from parent scopes
Explanation
Website Contributor grants App Service management without access to linked resources. Scoping to the specific resource group and ensuring no broader inherited roles ensures least-privilege. Learn more: https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#website-contributor
Q9
Your company uses Azure Cost Management and needs to allocate shared infrastructure costs (like a hub VNet) across multiple department subscriptions based on usage. Which Cost Management feature helps accomplish this?
A Resource tagging with the CostCenter tag
Cost allocation rules
C Azure Reservations amortized view
D Custom budget alerts per department
Correct Answer
Cost allocation rules
Explanation
Cost allocation rules in Azure Cost Management allow you to redistribute shared costs from one subscription or resource group to others based on customizable rules. This enables chargeback and showback scenarios. Tags help categorize but do not redistribute. Learn more: https://learn.microsoft.com/en-us/azure/cost-management-billing/costs/allocate-costs
Q10
You need to configure Azure AD Conditional Access so that users accessing Azure portal from personal unmanaged devices must use a web browser session that times out after 4 hours and cannot persist cookies. Which session control should you configure?
A App enforced restrictions
Sign-in frequency set to 4 hours and persistent browser session set to Never
C Continuous access evaluation
D Cloud app session timeout policy
Correct Answer
Sign-in frequency set to 4 hours and persistent browser session set to Never
Explanation
Conditional Access session controls include Sign-in frequency (which controls how often users re-authenticate) and Persistent browser session (which controls whether sessions persist after browser close). Setting sign-in frequency to 4 hours and disabling persistent sessions achieves the requirement. Learn more: https://learn.microsoft.com/en-us/entra/identity/conditional-access/howto-conditional-access-session-lifetime
Q11
You have an Azure Active Directory (Azure AD) tenant named contoso.com. You have a CSV file that contains the names and email addresses of 500 external users. You need to create a guest user account in contoso.com for each of the 500 external users. Solution: From Azure AD in the Azure portal, you use the Bulk invite users operation. Does this meet the goal?
A Yes
No
Correct Answer
No
Explanation
Azure AD supports bulk user creation via a CSV file using the Azure portal's Bulk create feature or Microsoft Graph PowerShell. The CSV must follow a specific template with required fields like displayName, userPrincipalName, and passwordProfile. Reference: https://learn.microsoft.com/en-us/entra/identity/users/users-bulk-add
Q12
You have an Azure subscription that contains the resources shown in the following table. You need to assign User1 the Storage File Data SMB Share Contributor role for share1. What should you do first?
Enable identity-based data access for the file shares in storage1.
B Modify the security profile for the file shares in storage1.
C Select Default to Azure Active Directory authorization in the Azure portal for storage1.
D Configure Access control (IAM) for share1.
Correct Answer
Enable identity-based data access for the file shares in storage1.
Explanation
Azure Virtual Network (VNet) peering connects two VNets, allowing resources in different VNets to communicate privately. VNet peering is non-transitive by default; traffic between VNet A and VNet C does not flow through VNet B unless using a hub-spoke topology with route configuration. Reference: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peering-overview
Q13
You have a Microsoft Entra tenant configured as shown in the following exhibit. The tenant contains the identities shown in the following table. You purchase a Microsoft Fabric license. To which identities can you assign the license?
User1 only
B User1 and Group1 only
C User1 and Group2 only
D User1, Group1, and Group2
Correct Answer
User1 only
Explanation
Microsoft Entra ID (formerly Azure AD) provides identity and access management. Features like Privileged Identity Management (PIM) allow just-in-time role assignment. Tenant configuration including domain, MFA, SSPR, and licensing is managed from the Microsoft Entra admin center. Reference: https://learn.microsoft.com/en-us/entra/fundamentals/whatis
Q14
You have Azure subscription that includes data in following locations: You plan to export data by using Azure import/export job named Export1. You need to identify the data that can be exported by using Export1. Which data should you identify?
A DB1
container1
C share1
D Table1
Correct Answer
container1
Explanation
Azure Import/Export service enables transferring large amounts of data to and from Azure Blob Storage or Azure Files using physical disk drives. It supports data export from Azure to on-premises locations as well as import. AzCopy and Storage Explorer are tools for smaller online transfers. Reference: https://learn.microsoft.com/en-us/azure/import-export/storage-import-export-service
Q15
You have an Azure subscription that contains the storage accounts shown in the following table. You plan to manage the data stored in the accounts by using lifecycle management rules. To which storage accounts can you apply lifecycle management rules?
A storage1 only
B storage1 and storage2 only
C storage3 and storage4 only
storage1, storage2, and storage3 only
E storage1, storage2, storage3, and storage4
Correct Answer
storage1, storage2, and storage3 only
Explanation
Azure Storage account firewall and virtual network rules restrict access to storage accounts from specific VNets or IP ranges. Service endpoints enable traffic from a VNet to route directly to the storage service over the Azure backbone network. Reference: https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security
Q16
You have an Azure App Service app named App1 that contains two running instances. You have an autoscale rule configured as shown in the following exhibit. For the Instance limits scale condition setting, you set Maximum to 5. During a 30-minute period, App1 uses 80 percent of the available memory. What is the maximum number of instances for App1 during the 30-minute period?
A 2
B 3
C 4
5
Correct Answer
5
Explanation
Azure App Service autoscale allows you to scale out or in based on metrics (CPU, memory, HTTP queue length) or a schedule. Autoscale rules define conditions and actions for scaling. The scale-out and scale-in cooldown periods prevent rapid fluctuations. Reference: https://learn.microsoft.com/en-us/azure/app-service/manage-scale-up
Q17
You have an Azure subscription that contains a container group named Group1. Group1 contains two Azure container instances as shown in the following table. You need to ensure that container2 can use CPU resources without negatively affecting container1. What should you do?
A Increase the resource limit of container1 to three CPUs.
B Increase the resource limit of container2 to six CPUs.
Remove the resource limit for both containers.
D Decrease the resource limit of container2 to two CPUs.
Correct Answer
Remove the resource limit for both containers.
Explanation
Azure Container Instances (ACI) support container groups which host multiple containers on the same host machine sharing CPU, memory, and network. Containers in a group share a lifecycle, local network, and storage volumes. This is similar to Kubernetes pods. Reference: https://learn.microsoft.com/en-us/azure/container-instances/container-instances-container-groups
Q18
You have the Azure virtual networks shown in the following table. To which virtual networks can you establish a peering connection from VNet1?
A VNet2 andVNet3 only
B VNet2 only
VNet3 and VNet4 only
D VNet2, VNet3, and VNet4
Correct Answer
VNet3 and VNet4 only
Explanation
Azure VNet peering requires non-overlapping address spaces. You can peer VNets in the same region (local peering) or across regions (global peering). Peered VNets must not have overlapping CIDR ranges. Reference: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-manage-peering
Q19
You have an Azure subscription that contains a virtual network named VNet1. VNet1 contains four subnets named Gateway, Perimeter, NVA, and Production. The NVA subnet contains two network virtual appliances (NVAs) that will perform network traffic inspection between the Perimeter subnet and the Production subnet. You need to implement an Azure load balancer for the NVAs. The solution must meet the following requirements: ✑ The NVAs must run in an active-active configuration that uses automatic failover. ✑ The load balancer must load balance traffic to two services on the Production subnet. The services have different IP addresses. Which three actions should you perform?
A Deploy a basic load balancer
Deploy a standard load balancer
Add two load balancing rules that have HA Ports and Floating IP enabled
D Add two load balancing rules that have HA Ports enabled and Floating IP disabled
E Add a frontend IP configuration, a backend pool, and a health probe
Add a frontend IP configuration, two backend pools, and a health probe
Correct Answers
Deploy a standard load balancer
Add two load balancing rules that have HA Ports and Floating IP enabled
Add a frontend IP configuration, two backend pools, and a health probe
Explanation
Azure Network Security Groups (NSGs) contain inbound and outbound security rules that filter network traffic to/from Azure resources in a VNet. NSGs can be associated with subnets or individual network interfaces. Rules are evaluated by priority (lowest number = highest priority). Reference: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
Q20
You have an Azure subscription named Subscription1 that contains two Azure virtual networks named VNet1 and VNet2. VNet1 contains a VPN gateway named VPNGW1 that uses static routing. There is a site-to-site VPN connection between your on-premises network and VNet1. On a computer named Client1 that runs Windows 10, you configure a point-to-site VPN connection to VNet1. You configure virtual network peering between VNet1 and VNet2. You verify that you can connect to VNet2 from the on-premises network. Client1 is unable to connect to VNet2. You need to ensure that you can connect Client1 to VNet2. What should you do?
Download and re-install the VPN client configuration package on Client1.
B Select Allow gateway transit on VNet1.
C Select Allow gateway transit on VNet2.
D Enable BGP on VPNGW1
Correct Answer
Download and re-install the VPN client configuration package on Client1.
Explanation
Azure VPN Gateway connects on-premises networks to Azure VNets using Site-to-Site (S2S) VPN or connects VNets to each other using VNet-to-VNet connections. VNet peering is another option for connecting VNets within Azure, offering lower latency and higher bandwidth. Reference: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpngateways
Q21
You have two Azure virtual networks named VNet1 and VNet2. VNet1 contains an Azure virtual machine named VM1. VNet2 contains an Azure virtual machine named VM2. VM1 hosts a frontend application that connects to VM2 to retrieve data. Users report that the frontend application is slower than usual. You need to view the average round-trip time (RTT) of the packets from VM1 to VM2. Which Azure Network Watcher feature should you use?
A IP flow verify
B Connection troubleshoot
Connection monitor
D NSG flow logs
Correct Answer
Connection monitor
Explanation
Azure VNet peering (local or global) allows VMs in different VNets to communicate using private IP addresses. Once VNet peering is established, traffic routes directly via the Microsoft backbone without going through the internet. Reference: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peering-overview
Q22
You have an Azure subscription that contains 20 virtual machines, a network security group (NSG) named NSG1, and two virtual networks named VNET1 and VNET2 that are peered. You plan to deploy an Azure Bastion Basic SKU host named Bastion1 to VNET1. You need to configure NSG1 to allow inbound access to the virtual machines via Bastion1. Which port should you configure for the inbound security rule?
A 22
443
C 389
D 8080
Correct Answer
443
Explanation
Azure Network Security Groups (NSGs) can be associated with subnets and network interfaces to control inbound and outbound traffic. A single NSG can be applied to multiple subnets and NICs across a subscription. Rules are evaluated based on priority. Reference: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
Q23
You have an on-premises network. You have an Azure subscription that contains three virtual networks named VNET1. VNET2. and VNET3. The virtual networks are peered and connected to the on-premises network. The subscription contains the virtual machines shown in the following table. You need to monitor connectivity between the virtual machines and the on-premises network by using Connection Monitor. What is the minimum number of connection monitors you should deploy?
A 1
2
C 3
D 4
Correct Answer
2
Explanation
Azure Virtual WAN (vWAN) provides an optimized hub-and-spoke architecture for connecting on-premises networks and multiple VNets. Azure VPN Gateway (S2S) and Azure ExpressRoute are options for connecting an on-premises datacenter to Azure virtual networks. Reference: https://learn.microsoft.com/en-us/azure/vpn-gateway/tutorial-site-to-site-portal
Q24
You are configuring an Azure Standard Load Balancer health probe. The backend pool contains VMs running a web application on port 8080. The application has a dedicated health endpoint at /health that returns HTTP 200 when healthy. Which health probe configuration is MOST appropriate?
A TCP probe on port 8080
HTTP probe on port 8080 with path /health
C HTTPS probe on port 443 with path /
D TCP probe on port 80
E HTTP probe on port 80 with path /health
Correct Answer
HTTP probe on port 8080 with path /health
Explanation
An HTTP health probe on port 8080 with path /health provides application-level health checking. It verifies the application is actually responding correctly, not just that the port is open (TCP probe). Custom health endpoints are more reliable than basic port checks. Learn more: https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-custom-probe-overview
Q25
You need to implement a solution that distributes traffic across Azure regions based on geographic location of the client. Users in Europe should be directed to the West Europe deployment, and users in Asia should be directed to the Southeast Asia deployment. Which Azure service should you use?
A Azure Load Balancer with frontend IP per region
Azure Traffic Manager with Geographic routing method
C Azure Application Gateway with URL path-based routing
D Azure CDN with geo-filtering
Correct Answer
Azure Traffic Manager with Geographic routing method
Explanation
Azure Traffic Manager with the Geographic routing method routes users based on their geographic location to specific endpoints. This is a DNS-based load balancer that works at the global level. Azure Front Door provides similar capability but also adds CDN and WAF. Load Balancer is regional only. Learn more: https://learn.microsoft.com/en-us/azure/traffic-manager/traffic-manager-routing-methods#geographic-traffic-routing-method
Q26
You deploy a NAT Gateway and associate it with Subnet-App (10.0.1.0/24). VMs in Subnet-App currently have public IPs assigned. After NAT Gateway deployment, which public IP is used for outbound internet traffic from these VMs?
A Each VM continues to use its own instance-level public IP
All VMs use the NAT Gateway public IP for outbound traffic
C Traffic randomly alternates between VM public IPs and NAT Gateway IP
D The NAT Gateway only applies to VMs without instance-level public IPs
Correct Answer
All VMs use the NAT Gateway public IP for outbound traffic
Explanation
When a NAT Gateway is associated with a subnet, it takes precedence over all other outbound connectivity methods including instance-level public IPs and load balancer outbound rules. All outbound traffic uses the NAT Gateway's public IP. This is a key behavior to understand. Learn more: https://learn.microsoft.com/en-us/azure/nat-gateway/nat-gateway-resource
Q27
You have an NSG rule that allows inbound HTTPS (port 443) from the internet (priority 100). You add another rule to deny all inbound traffic from the internet (priority 200). A third rule allows inbound SSH (port 22) from the internet (priority 150). Which ports are accessible from the internet?
A Only port 443
B Only port 22
Both port 443 and port 22
D No ports because the deny rule blocks everything
Correct Answer
Both port 443 and port 22
Explanation
NSG rules are processed in priority order (lowest number = highest priority). Rule at priority 100 allows HTTPS (matched first for port 443). Rule at priority 150 allows SSH (matched for port 22 before the deny rule). Rule at priority 200 denies everything else. Both 443 and 22 are accessible. Learn more: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-group-how-it-works
Q28
You are configuring Azure Private Endpoint for an Azure SQL Database. After creating the private endpoint, users can still access the database via its public FQDN from the internet. What additional step must you take to block public access?
A Delete the private endpoint and recreate it with force tunnel mode
Set 'Deny public network access' to Yes on the Azure SQL Server
C Add an NSG rule on the private endpoint subnet blocking port 1433
D Configure the SQL Server firewall to remove all IP rules only
Correct Answer
Set 'Deny public network access' to Yes on the Azure SQL Server
Explanation
Creating a private endpoint does not automatically disable public access. You must explicitly set 'Deny public network access' on the Azure SQL Server to block public access. The private endpoint only provides a private path; both can coexist by default. Learn more: https://learn.microsoft.com/en-us/azure/azure-sql/database/connectivity-architecture#connection-policy
Q29
You deploy Azure Monitor and need to collect custom performance metrics from a Linux VM that are not captured by default. Which Azure Monitor component must be installed on the VM?
A Log Analytics agent (legacy)
Azure Monitor Agent with data collection rules
C Azure Diagnostics Extension
D Dependency Agent only
Correct Answer
Azure Monitor Agent with data collection rules
Explanation
The Azure Monitor Agent (AMA) is the modern unified agent for collecting telemetry data from VMs. It replaces the legacy Log Analytics agent and Telegraf agent. AMA supports data collection rules (DCR) for custom metrics collection from Linux and Windows VMs. Learn more: https://learn.microsoft.com/en-us/azure/azure-monitor/agents/agents-overview
Q30
You need to create an Azure Monitor alert that fires when the total number of failed requests across all your App Services exceeds 50 within any 5-minute window. The alert should automatically resolve when failures drop below the threshold. Which alert type should you use?
A Log alert with KQL query against AppServiceHTTPLogs
Metric alert with static threshold on the Failed Requests metric
C Activity log alert for App Service errors
D Smart detection alert in Application Insights
Correct Answer
Metric alert with static threshold on the Failed Requests metric
Explanation
A metric alert with dynamic or static threshold on the Http5xx or failed requests metric with a 5-minute aggregation window detects spikes in failures. Metric alerts automatically resolve when the condition no longer holds. Log alerts require explicit auto-resolution configuration. Learn more: https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/alerts-metric-overview

AZ-104 Practice Set-02

30 questions
Q1
Your company has an Azure AD tenant with 500 users. You need to allow a specific group of 20 users to manage password resets for non-admin users only. Which Azure AD role should you assign to these users?
A User Administrator
Helpdesk Administrator
C Password Administrator
D Global Administrator
Correct Answer
Helpdesk Administrator
Explanation
The Helpdesk Administrator role can reset passwords for non-administrators and other Helpdesk Administrators. It does not have broader administrative privileges. The Password Administrator role can also reset passwords but has slightly different scope. The User Administrator can do more than just password resets. Learn more: https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#helpdesk-administrator
Q2
You are managing multiple Azure subscriptions under a single Azure AD tenant. You need to apply a policy that prevents the creation of resources in regions outside of West Europe and North Europe across ALL subscriptions. At which scope should you assign the Azure Policy?
A Individual subscription level
B Resource group level
Management group level
D Azure AD tenant level
Correct Answer
Management group level
Explanation
Assigning the policy at the Management Group level ensures it applies to all subscriptions underneath. Assigning at the subscription level would require repeating the policy for each subscription. Resource group scope is too narrow. Tenant root group is a management group but is the highest level. Learn more: https://learn.microsoft.com/en-us/azure/governance/policy/overview
Q3
A company requires that all Azure resources must have a 'CostCenter' tag. If a resource is created without this tag, the deployment must be denied. Which Azure Policy effect should you use?
A Audit
Deny
C Append
D DeployIfNotExists
Correct Answer
Deny
Explanation
The Deny effect prevents resource creation or modification that does not comply with policy rules. Audit would only flag non-compliance without blocking. Append adds properties but does not enforce tagging. DeployIfNotExists is used for deploying additional resources. Learn more: https://learn.microsoft.com/en-us/azure/governance/policy/concepts/effects
Q4
You have an Azure subscription with several resource groups. A new team member needs to deploy and manage virtual machines ONLY in the 'Development' resource group. Which two configurations should you apply? (Choose two.)
A Assign the Virtual Machine Contributor role at the subscription level
Assign the Virtual Machine Contributor role scoped to the Development resource group
Verify the user does NOT have inherited roles at the subscription level granting broader access
D Create a custom role with subscription-level scope
E Assign the Owner role at the Development resource group scope
Correct Answers
Assign the Virtual Machine Contributor role scoped to the Development resource group
Verify the user does NOT have inherited roles at the subscription level granting broader access
Explanation
Azure RBAC allows role assignments at resource group scope. Assigning VM Contributor at the Development RG gives access only there. You must also verify no inherited subscription-level roles grant broader access. Learn more: https://learn.microsoft.com/en-us/azure/role-based-access-control/overview
Q5
Your organization has three departments: Finance, HR, and Engineering. Each department has its own Azure subscription. You need to ensure that the Engineering subscription cannot create any public IP addresses. Which approach should you use?
A Apply a ReadOnly resource lock on the Engineering subscription
Assign an Azure Policy with a Deny effect for the Microsoft.Network/publicIPAddresses resource type to the Engineering subscription
C Create a Network Security Group that blocks all inbound traffic
D Remove the Network Contributor role from all users in the Engineering subscription
Correct Answer
Assign an Azure Policy with a Deny effect for the Microsoft.Network/publicIPAddresses resource type to the Engineering subscription
Explanation
An Azure Policy with a Deny effect assigned to the Engineering subscription can prevent the creation of public IP address resources. Resource locks prevent deletion or modification of existing resources, not creation of new resource types. NSGs filter traffic but do not prevent resource creation. Learn more: https://learn.microsoft.com/en-us/azure/governance/policy/overview
Q6
You need to create a custom RBAC role that allows users to restart virtual machines but not delete or create them. Which three actions should you include in the role definition? (Choose three.)
Microsoft.Compute/virtualMachines/restart/action
Microsoft.Compute/virtualMachines/read
C Microsoft.Compute/virtualMachines/delete
Microsoft.Compute/virtualMachines/start/action
E Microsoft.Compute/virtualMachines/write
Correct Answers
Microsoft.Compute/virtualMachines/restart/action
Microsoft.Compute/virtualMachines/read
Microsoft.Compute/virtualMachines/start/action
Explanation
To restart a VM the user needs Microsoft.Compute/virtualMachines/restart/action and also read access to see the VMs. The start action is typically paired with restart operations. Delete and write actions are not needed. Learn more: https://learn.microsoft.com/en-us/azure/role-based-access-control/custom-roles
Q7
Your company is implementing Azure AD Conditional Access. You need to require multi-factor authentication for all users accessing Azure portal from outside the corporate network. Which two conditions should you configure in the Conditional Access policy? (Choose two.)
Cloud apps - select Microsoft Azure Management
Named locations - exclude the corporate IP ranges
C Device state - require compliant device
D User risk - set to High
E Sign-in frequency - set to 1 hour
Correct Answers
Cloud apps - select Microsoft Azure Management
Named locations - exclude the corporate IP ranges
Explanation
Conditional Access policies can target specific cloud apps (Azure Management) and use named locations to define trusted/untrusted networks. Device state and user risk are separate conditions that do not specifically address network location. Learn more: https://learn.microsoft.com/en-us/entra/identity/conditional-access/overview
Q8
You have an Azure Storage account with blob versioning enabled. A developer accidentally overwrites a critical blob. You need to restore the previous version. Which two actions should you perform? (Choose two.)
List the blob versions to identify the correct previous version
Copy the previous version over the current blob to promote it
C Restore the blob from the soft-delete recycle bin
D Contact Microsoft Support to restore the blob
E Submit a geo-failover request
Correct Answers
List the blob versions to identify the correct previous version
Copy the previous version over the current blob to promote it
Explanation
With blob versioning enabled, previous versions are automatically preserved. You can list all versions of a blob and then promote a previous version by copying it over the current base blob using the Copy Blob operation. Learn more: https://learn.microsoft.com/en-us/azure/storage/blobs/versioning-overview
Q9
A storage account named stgfinance must allow access ONLY from a specific virtual network subnet and a trusted Azure service. All other public access must be blocked. Which two configurations should you apply? (Choose two.)
Configure a virtual network rule for the specific subnet and set default action to Deny
Enable 'Allow trusted Microsoft services to access this storage account'
C Set 'Allow Blob public access' to Enabled
D Configure a private endpoint for the storage account
E Enable Azure DDoS Protection on the VNet
Correct Answers
Configure a virtual network rule for the specific subnet and set default action to Deny
Enable 'Allow trusted Microsoft services to access this storage account'
Explanation
Storage account firewall rules allow you to restrict access to specific VNet subnets using service endpoints. Enabling 'Allow trusted Microsoft services' ensures Azure services like Backup and Monitor can still access the account. Learn more: https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security
Q10
You need to synchronize files between an on-premises Windows file server and an Azure file share. The on-premises server must act as a local cache for frequently accessed files. Which Azure service should you use?
A AzCopy scheduled tasks
Azure File Sync with cloud tiering enabled
C Azure Data Box Gateway
D Robocopy with Azure file share mapping
Correct Answer
Azure File Sync with cloud tiering enabled
Explanation
Azure File Sync enables synchronization between on-premises Windows file servers and Azure file shares with cloud tiering capability. Cloud tiering keeps frequently accessed files locally while tiering infrequently used files to Azure. Robocopy is a one-time copy tool. Learn more: https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-introduction
Q11
You are migrating an application from on-premises to Azure. The application uses a REST API to store and retrieve data using key-value pairs with partition keys and row keys. Which Azure Storage service should you use?
A Azure Blob Storage
B Azure Queue Storage
Azure Table Storage
D Azure File Storage
E Azure Cosmos DB SQL API
Correct Answer
Azure Table Storage
Explanation
Azure Table Storage provides a NoSQL key-value store that uses partition keys and row keys for data organization and retrieval via REST API. Azure Cosmos DB Table API is also compatible but Table Storage is the direct migration path. Blob Storage is for unstructured data. Learn more: https://learn.microsoft.com/en-us/azure/storage/tables/table-storage-overview
Q12
You deploy an Azure Virtual Machine running Windows Server 2022. After deployment you need to install IIS and additional software components automatically without logging into the VM. Which feature should you use?
A Azure Bastion
Custom Script Extension
C VM Run Command
D Azure Automation Desired State Configuration
Correct Answer
Custom Script Extension
Explanation
The Custom Script Extension for Azure VMs allows you to download and execute scripts on VMs post-deployment. It can install roles, features, and software without RDP access. Run Command is for ad-hoc commands. Desired State Configuration is more complex. Learn more: https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/custom-script-windows
Q13
Your company needs to deploy 100 identical VMs for a batch processing workload. The VMs should automatically scale based on CPU usage and distribute evenly across fault domains. Which Azure resource should you use?
A Availability Set with a load balancer
Virtual Machine Scale Set
C Multiple VMs with Azure Automation
D Azure Batch with dedicated pools
Correct Answer
Virtual Machine Scale Set
Explanation
Virtual Machine Scale Sets (VMSS) allow deployment of a group of identical, auto-scaling VMs. VMSS automatically distributes VM instances across fault domains and update domains. Availability Sets are for manually managed VMs. Load balancers distribute traffic but don't manage VM deployment. Learn more: https://learn.microsoft.com/en-us/azure/virtual-machine-scale-sets/overview
Q14
You have a Virtual Machine Scale Set with 5 instances. You need to update the OS image on all instances without causing downtime. Which upgrade policy should the VMSS use?
A Manual
B Automatic
Rolling
D Blue-green
Correct Answer
Rolling
Explanation
Rolling upgrade policy updates VM instances in batches, ensuring a configured number of instances remain available during the upgrade. Manual requires you to update each instance. Automatic updates all at once which may cause downtime. Learn more: https://learn.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-upgrade-policy
Q15
You need to deploy a containerized web application to Azure without managing any underlying infrastructure. The application receives sporadic traffic with periods of zero requests. You want to minimize costs. Which service should you use?
A Azure Kubernetes Service (AKS)
Azure Container Instances (ACI)
C Azure App Service with Linux containers
D Azure Functions with container support
Correct Answer
Azure Container Instances (ACI)
Explanation
Azure Container Instances (ACI) provides serverless container execution with per-second billing and no cluster management overhead. For sporadic workloads with idle periods, ACI is more cost-effective than AKS which runs continuously. App Service always has a plan running. Learn more: https://learn.microsoft.com/en-us/azure/container-instances/container-instances-overview
Q16
You have an Azure VM that runs a critical production database. The VM uses a Standard SSD for the OS disk and Premium SSD for data. You need to ensure the VM can be restored to a specific point in time if data corruption occurs. What should you configure?
A Create manual disk snapshots daily
Configure Azure Backup with a backup policy
C Enable Azure Site Recovery
D Enable geo-redundant storage on the disks
Correct Answer
Configure Azure Backup with a backup policy
Explanation
Azure Backup for VMs provides application-consistent snapshots at scheduled intervals with configurable retention. It supports point-in-time restore for the entire VM. Disk snapshots are manual and do not provide automated scheduling. ASR is for disaster recovery, not point-in-time restore. Learn more: https://learn.microsoft.com/en-us/azure/backup/backup-azure-vms-introduction
Q17
You develop the following Azure Resource Manager (ARM) template to create a resource group and deploy an Azure Storage account to the resource group. Which cmdlet should you run to deploy the template?
A New-AzResource
B New-AzResourceGroupDeployment
C New-AzTenantDeployment
New-AzDeployment
Correct Answer
New-AzDeployment
Explanation
ARM templates can include nested or linked templates using 'Microsoft.Resources/deployments' to create resource groups and deploy resources in a single deployment. The 'location' and 'scope' properties define where resources are deployed. Templates support conditional deployments using the 'condition' element. Reference: https://learn.microsoft.com/en-us/azure/azure-resource-manager/templates/deploy-to-subscription
Q18
You have an Azure subscription that contains three virtual machines named VM1, VM2, and VM3. All the virtual machines are in an availability set named AVSet1. You need to scale up VM1 to a new virtual machine size, but the intended size is unavailable. What should you do first?
A Create a proximity placement group.
Deallocate VM1.
C Convert AvSet1 into a managed availability set.
D Shut down VM3 and VM3.
Correct Answer
Deallocate VM1.
Explanation
Azure Network Watcher provides network diagnostic tools including IP flow verify, next hop, connection troubleshoot, and packet capture. It can determine if network traffic to or from a VM is allowed or denied by NSG rules. Reference: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview
Q19
You have an Azure subscription that has the public IP addresses shown in the following table. You plan to deploy an Instance of Azure Firewall Premium named FW1. Which IP addresses can you use?
A IP2 only
IP1 and IP2 only
C IP1, IP2, and IP5 only
D IP1, IP2, IP4, and IP5 only
Correct Answer
IP1 and IP2 only
Explanation
Azure Public IP addresses can be Standard or Basic SKU. Standard SKU public IPs are zone-redundant by default, support availability zones, and are required for Standard Load Balancer. Basic SKU is being retired. Public IPs can be associated with VMs, Load Balancers, Application Gateways, and VPN Gateways. Reference: https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/public-ip-addresses
Q20
You have an Azure AD tenant named contoso.com. You have an Azure subscription that contains an Azure App Service web app named App1 and an Azure key vault named KV1. KV1 contains a wildcard certificate for contoso.com. You have a user named user1@contoso.com that is assigned the Owner role for App1 and KV1. You need to configure App1 to use the wildcard certificate of KV1. What should you do first?
A Create an access policy for KV1 and assign the Microsoft Azure App Service principal to the policy.
Assign a managed user identity to App1.
C Configure KV1 to use the role-based access control (RBAC) authorization system.
D Create an access policy for KV1 and assign the policy to User1.
Correct Answer
Assign a managed user identity to App1.
Explanation
Azure Storage account access can be controlled using Azure AD authentication (RBAC), shared access signatures (SAS), or storage account keys. Azure Files supports identity-based authentication via Azure AD DS or on-premises AD DS for SMB access. Reference: https://learn.microsoft.com/en-us/azure/storage/files/storage-files-identity-auth-hybrid-identities-enable
Q21
You have an Azure subscription that contains an Azure container registry named ContReg1. You enable the Admin user for ContReg1. Which username can you use to sign in to ContReg1?
A root
B admin
C administrator
ContReg1
Correct Answer
ContReg1
Explanation
Azure Container Registry (ACR) geo-replication enables a single registry to serve multiple Azure regions with local, network-close image data. When geo-replication is enabled, the registry replicates images to configured regions automatically. Clients pull from the nearest replica. Reference: https://learn.microsoft.com/en-us/azure/container-registry/container-registry-geo-replication
Q22
Case study - This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study - To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. If the case study has an All Information tab, note that the information displayed is identical to the information displayed on the subsequent tabs. When you are ready to answer a question, click the Question button to return to the question. Overview - ADatum Corporation is consulting firm that has a main office in Montreal and branch offices in Seattle and New York. Existing Environment - Azure Environment - ADatum has an Azure subscription that contains three resource groups named RG1, RG2, and RG3. The subscription contains the storage accounts shown in the following table. The subscription contains the virtual machines shown in the following table. The subscription has an Azure container registry that contains the images shown in the following table. The subscription contains the resources shown in the following table. Azure Key Vault - The subscription contains an Azure key vault named Vault1. Vault1 contains the certificates shown in the following table. Vault1 contains the keys shown in the following table. Microsoft Entra Environment - ADatum has a Microsoft Entra tenant named adatum.com that is linked to the Azure subscription and contains the users shown in the following table. The tenant contains the groups shown in the following table. The adatum.com tenant has a custom security attribute named Attribute1. Planned Changes - ADatum plans to implement the following changes: • Configure a data collection rule (DCR) named DCR1 to collect only system events that have an event ID of 4648 from VM2 and VM4. • In storage1, create a new container named cont2 that has the following access policies: o Three stored access policies named Stored1, Stored2, and Stored3 o A legal hold for immutable blob storage • Whenever possible, use directories to organize storage account content. • Grant User1 the permissions required to link Zone1 to VNet1. • Assign Attribute1 to supported adatum.com resources. • In storage2, create an encryption scope named Scope1. • Deploy new containers by using Image1 or Image2. Technical Requirements - ADatum must meet the following technical requirements: • Use TLS for WebApp1. • Follow the principle of least privilege. • Grant permissions at the required scope only. • Ensure that Scope1 is used to encrypt storage services. • Use Azure Backup to back up cont1 and share1 as frequently as possible. • Whenever possible, use Azure Disk Encryption and a key encryption key (KEK) to encrypt the virtual machines. You need to configure WebApp1 to meet the technical requirements. Which certificate can you use from Vault1?
A Cert1 only
Cert1 or Cert2 only
C Cert1 or Cert3 only
D Cert3 or Cert4 only
E Cert1, Cert2 Cert3, or Cert4
Correct Answer
Cert1 or Cert2 only
Explanation
This case study scenario covers multiple AZ-104 domains. Key areas include Azure AD identity management, RBAC assignments, Azure Policy, resource governance, and subscription management. Carefully read the requirements to map to specific Azure services and configurations. Reference: https://learn.microsoft.com/en-us/azure/governance/policy/overview
Q23
You have an Azure subscription that contains the resources shown in the following table. LB1 is configured as shown in the following table. You plan to create new inbound NAT rules that meet the following requirements: ✑ Provide Remote Desktop access to VM1 from the internet by using port 3389. ✑ Provide Remote Desktop access to VM2 from the internet by using port 3389. What should you create on LB1 before you can create the new inbound NAT rules?
a frontend IP address
B a load balancing rule
C a health probe
D a backend pool
Correct Answer
a frontend IP address
Explanation
Azure Load Balancer distributes incoming network traffic across backend VMs. The Standard SKU supports outbound rules, HA ports, and availability zones. Backend pool members communicate using private IP addresses. Load balancing rules match frontend IP and port to backend pool and port. Reference: https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-overview
Q24
You have an Azure subscription that contains the following resources: ✑ A virtual network that has a subnet named Subnet1 ✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1 ✑ A virtual machine named VM1 that has the required Windows Server configurations to allow Remote Desktop connections NSG-Subnet1 has the default inbound security rules only. NSG-VM1 has the default inbound security rules and the following custom inbound security rule: ✑ Priority: 100 ✑ Source: Any ✑ Source port range: * ✑ Destination: * ✑ Destination port range: 3389 Protocol: UDP - ✑ Action: Allow VM1 has a public IP address and is connected to Subnet1. NSG-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1. You need to be able to establish Remote Desktop connections from the internet to VM1. Solution: You add an inbound security rule to NSG-Subnet1 that allows connections from the internet source to the VirtualNetwork destination for port range 3389 and uses the UDP protocol. Does this meet the goal?
A Yes
No
Correct Answer
No
Explanation
Azure network resources have dependencies that affect deletion order. For example, a public IP cannot be deleted while it is associated with a NIC or load balancer. A NIC cannot be deleted while attached to a VM. VNets cannot be deleted while they contain subnets with resources. Reference: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-network-interface
Q25
You have an Azure subscription that contains the following resources: ✑ A virtual network that has a subnet named Subnet1 ✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1 ✑ A virtual machine named VM1 that has the required Windows Server configurations to allow Remote Desktop connections NSG-Subnet1 has the default inbound security rules only. NSG-VM1 has the default inbound security rules and the following custom inbound security rule: ✑ Priority: 100 ✑ Source: Any ✑ Source port range: * ✑ Destination: * ✑ Destination port range: 3389 ✑ Protocol: UDP ✑ Action: Allow VM1 has a public IP address and is connected to Subnet1. NSG-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1. You need to be able to establish Remote Desktop connections from the internet to VM1. Solution: You add an inbound security rule to NSG-Subnet1 and NSG-VM1 that allows connections from the internet source to the VirtualNetwork destination for port range 3389 and uses the TCP protocol. Does this meet the goal?
Yes
B No
Correct Answer
Yes
Explanation
When resources in an Azure VNet have dependencies on each other (VMs using NICs, NICs using public IPs, subnets in VNets), you must delete resources in the correct order: VM > NIC > Public IP > VNet. Alternatively, deleting a resource group removes all resources simultaneously regardless of dependencies. Reference: https://learn.microsoft.com/en-us/azure/virtual-network/delete-virtual-network
Q26
Your company has an Azure subscription named Subscription1. The company also has two on-premises servers named Server1 and Server2 that run Windows Server 2016. Server1 is configured as a DNS server that has a primary DNS zone named adatum.com. Adatum.com contains 1,000 DNS records. You manage Server1 and Subscription1 from Server2. Server2 has the following tools installed: ✑ The DNS Manager console ✑ Azure PowerShell ✑ Azure CLI 2.0 You need to move the adatum.com zone to an Azure DNS zone in Subscription1. The solution must minimize administrative effort. What should you use?
Azure CLI
B Azure PowerShell
C the Azure portal
D the DNS Manager console
Correct Answer
Azure CLI
Explanation
Azure Site-to-Site VPN connects on-premises networks to Azure VNets using IPsec/IKE VPN tunnels over the internet. For higher reliability and bandwidth, Azure ExpressRoute provides a private, dedicated circuit. Both require a VPN or ExpressRoute gateway in Azure. Reference: https://learn.microsoft.com/en-us/azure/vpn-gateway/tutorial-site-to-site-portal
Q27
You have an Azure subscription named Subscription1 that contains an Azure virtual network named VNet1. VNet1 connects to your on-premises network by using Azure ExpressRoute. You plan to prepare the environment for automatic failover in case of ExpressRoute failure. You need to connect VNet1 to the on-premises network by using a site-to-site VPN. The solution must minimize cost. Which three actions should you perform?
Create a connection
Create a local site VPN gateway
Create a VPN gateway that uses the VpnGw1 SKU
D Create a gateway subnet
E Create a VPN gateway that uses the Basic SKU
Correct Answers
Create a connection
Create a local site VPN gateway
Create a VPN gateway that uses the VpnGw1 SKU
Explanation
Azure Private Endpoints create a private connection between your VNet and an Azure PaaS service (like Storage, SQL, Key Vault) using a private IP address from your VNet address space. This eliminates exposure over the public internet and is secured via NSG and Private DNS zones. Reference: https://learn.microsoft.com/en-us/azure/private-link/private-endpoint-overview
Q28
You have an Azure subscription that contains two virtual machines named VM1 and VM2. You create an Azure load balancer. You plan to create a load balancing rule that will load balance HTTPS traffic between VM1 and VM2. Which two additional load balancer resources should you create before you can create the load balancing rule?
A a frontend IP address
B an inbound NAT rule
C a virtual network
a backend pool
a health probe
Correct Answers
a backend pool
a health probe
Explanation
Azure Monitor action groups define who is notified and what actions are taken when an alert fires. Notification options include email, SMS, push notification, and voice call. Actions include Azure Function, Logic App, Webhook, ITSM, and Automation Runbook. Reference: https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/action-groups
Q29
You have two Azure subscriptions named Sub1 and Sub2 that are linked to separate Microsoft Entra tenants. You have the virtual networks shown in the following table. Which virtual networks can you peer with VNet1?
A VNet2 only
B VNet2 and VNet3 only
C VNet2 and VNet4 only
D VNet2, VNet3, and VNet4 only
VNet2, VNet3, VNet4, and VNet5
Correct Answer
VNet2, VNet3, VNet4, and VNet5
Explanation
Azure subscriptions can be linked to different Microsoft Entra (Azure AD) tenants. RBAC role assignments are scoped to a single subscription's tenant. Moving a subscription to a different tenant requires the subscription owner to transfer it, and all existing RBAC assignments are removed. Reference: https://learn.microsoft.com/en-us/azure/role-based-access-control/transfer-subscription
Q30
You have an Azure subscription named Subscription1 that contains an Azure Log Analytics workspace named Workspace1. You need to view the error events from a table named Event. Which query should you run in Workspace1?
search in (Event) "error"
B Event | where EventType is "error"
C select * from Event where EventType == "error"
D Get-Event Event | where {$_.EventType == "error"}
Correct Answer
search in (Event) "error"
Explanation
Azure Log Analytics workspaces can receive data from multiple sources including Azure Monitor Agent, Microsoft Defender for Cloud, and Azure Automation. The workspace stores data in tables queryable with KQL. Workspace-level access control determines who can query the data. Reference: https://learn.microsoft.com/en-us/azure/azure-monitor/logs/log-analytics-workspace-overview

Want More Practice?

These are just the free questions. Unlock the full Azure Administrator Associate exam library with hundreds of additional questions, timed practice mode, and progress tracking.

← Back to Azure Administrator Associate Exams