Microsoft Azure Administrator Associate Practice Test (AZ-104)
Use the form below to configure your Microsoft Azure Administrator Associate Practice Test (AZ-104). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Azure Administrator Associate AZ-104 Information
As a candidate for this certification, you should have subject matter expertise in implementing, managing, and monitoring an organization’s Azure environment, including:
- Virtual networks
- Storage
- Compute
- Identity
- Security
- Governance
As an Azure administrator, you often serve as part of a larger team dedicated to implementing an organization's cloud infrastructure. You also coordinate with other roles to deliver Azure networking, security, database, application development, and DevOps solutions.
You should be familiar with:
- Operating systems
- Networking
- Servers
- Virtualization
In addition, you should have experience with:
- PowerShell
- Azure CLI
- The Azure portal
- Azure Resource Manager templates
- Microsoft Entra ID
Skills measured
- Manage Azure identities and governance
- Implement and manage storage
- Deploy and manage Azure compute resources
- Implement and manage virtual networking
- Monitor and maintain Azure resources
Scroll down to see your responses and detailed results
Free Microsoft Azure Administrator Associate AZ-104 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:Manage Azure identities and governanceImplement and manage storageDeploy and manage Azure compute resourcesConfigure and manage virtual networkingMonitor and maintain Azure resources
You are an Azure administrator for your organization. You need to ensure that devices running Windows 10 are automatically registered in Azure Entra ID when users sign in with their corporate credentials. Which device identity feature should you configure?
- You selected this option
Configure Hybrid Azure AD Join
- You selected this option
Configure Windows Hello for Business
- You selected this option
Configure Azure Entra ID Join
- You selected this option
Configure Azure Entra ID registered devices
Answer Description
To automatically register Windows 10 devices in Azure Entra ID when users sign in with their corporate credentials, you should configure Azure AD Join. Azure AD Join allows devices to be joined directly to Azure AD, enabling centralized management and access to resources. This is suitable for corporate-owned devices and simplifies the sign-in experience for users. Azure AD registered devices are typically used for personally owned devices (BYOD) and do not provide the same level of management. Windows Hello for Business is a sign-in method that enhances authentication security but does not handle device registration. Hybrid Azure AD Join is intended for devices joined to an on-premises Active Directory domain that are also registered with Azure AD; since there is no mention of on-premises Active Directory in this scenario, Azure AD Join is the appropriate choice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure AD Join and how does it work?
What are the benefits of using Azure AD Join for device registration?
How does Azure AD Join differ from Hybrid Azure AD Join?
When setting up backups for an Azure App Service, which destination is used to store the backup data?
- You selected this option
Local storage on the App Service
- You selected this option
A connected GitHub repository
- You selected this option
An Azure SQL Database
- You selected this option
An Azure Blob Storage account
Answer Description
Azure App Service backups are stored in an Azure Blob Storage account. This storage account provides the necessary capacity and accessibility for the backup files. Other options like local storage or databases are not suitable for storing App Service backups.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Blob Storage?
Why can't I use local storage on the App Service for backups?
What are the benefits of using Azure Blob Storage for backups?
You are an Azure administrator for a company. There is a virtual machine named VM1 that hosts a web application that must be accessible from the internet over port 80. The company's security policy states that virtual machines should not be assigned public addresses directly. What should you implement to meet these requirements?
- You selected this option
Assign a public address to the virtual network subnet containing VM1
- You selected this option
Set up an Azure Load Balancer to forward port 80 to VM1
- You selected this option
Configure an Azure Virtual Network NAT gateway
- You selected this option
Enable Azure Traffic Manager to route traffic to VM1
Answer Description
To allow internet users to access VM1 over port 80 without assigning a public address directly to the VM, you should set up an Azure Load Balancer with a public frontend. The load balancer forwards incoming traffic on port 80 to VM1's private address, complying with the security policy. Assigning a public address to a subnet is not possible and does not enable inbound traffic to the VM. A NAT gateway provides outbound connectivity for VMs without public addresses but does not support inbound connections. Azure Traffic Manager is used for DNS-based traffic load balancing across multiple endpoints and does not facilitate direct inbound access to a single VM.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Azure Load Balancer and how does it work?
What are the implications of not assigning public IP addresses to virtual machines?
How does Azure Traffic Manager differ from Azure Load Balancer?
You are an Azure Administrator for Contoso Ltd. A user named John Doe has recently changed his last name to Smith after getting married. You need to update his username and email address in Azure Entra ID to reflect his new name, while ensuring he retains access to all existing resources and group memberships. Which action should you take to accomplish this?
- You selected this option
Remove John Doe from all groups, create a new account for John Smith, and reassign group memberships.
- You selected this option
Delete John Doe's user account and create a new account for John Smith with the updated information.
- You selected this option
Edit John Doe's user properties in Azure Entra ID to change his name, username, and email address.
- You selected this option
Use the Azure AD Connect tool to synchronize changes from on-premises Active Directory.
Answer Description
To update a user's name and email address while preserving their access and group memberships, you should edit the user's properties directly in Azure Entra ID. This allows you to change the display name, username (User Principal Name), and email address without affecting the user's object ID, which maintains all associated permissions and memberships. Deleting and recreating the user account would result in loss of access to resources and require reassigning permissions. Similarly, removing the user from groups and creating a new account complicates the process unnecessarily. Using Azure AD Connect is only relevant if syncing from an on-premises Active Directory, which is not specified in this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Entra ID?
What is User Principal Name (UPN) and why is it important?
What are the implications of deleting a user account in Azure Entra ID?
When creating an Azure Storage account, which configuration setting enhances security by requiring encryption for data in transit?
- You selected this option
Enabling Secure Transfer Required
- You selected this option
Configuring Shared Access Signature Tokens
- You selected this option
Enabling Soft Delete
- You selected this option
Setting Access Tier to Cool
Answer Description
Enabling Secure Transfer Required ensures that all requests to the storage account are made over secure connections using HTTPS. This helps protect data by encrypting it during transit between the client and the storage account. Other options like enabling Soft Delete or configuring Shared Access Signature (SAS) tokens pertain to data protection and access management but do not enforce encryption for data in transit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is HTTPS and why is it important for data security?
What are the other benefits of enabling Secure Transfer Required for an Azure Storage account?
What are Shared Access Signatures (SAS) and how do they relate to Azure Storage security?
An organization requires control over the encryption keys used to encrypt data in their Azure Storage account. Which configuration should you implement?
- You selected this option
Disable storage encryption to manage encryption externally.
- You selected this option
Implement Advanced Threat Protection on the storage account.
- You selected this option
Enable storage encryption with customer-managed keys stored in Azure Key Vault.
- You selected this option
Enable storage encryption with Microsoft-managed keys.
Answer Description
To have control over the encryption keys used for data at rest in Azure Storage, you need to use customer-managed keys stored in Azure Key Vault. This allows the organization to manage the encryption keys, including key rotation and revocation, providing greater control over data security. Using Microsoft-managed keys does not provide this level of control, as the keys are managed by Azure. Disabling storage encryption is not advisable and would not meet the security requirements. Implementing Advanced Threat Protection enhances security but does not affect encryption key management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are customer-managed keys in Azure?
What is Azure Key Vault and how does it work?
What is the difference between customer-managed keys and Microsoft-managed keys?
A company wants each department to receive its own invoice for Azure services consumed. What is the best way to achieve this?
- You selected this option
Use Azure Cost Management to allocate costs per department
- You selected this option
Create separate resource groups for each department
- You selected this option
Create separate subscriptions for each department
- You selected this option
Assign resource tags to categorize each department's resources
Answer Description
Creating separate subscriptions for each department ensures that each receives individual invoices and billing statements. Each subscription is billed independently, allowing the company to track and manage costs per department effectively. While resource groups and tags help organize resources, they do not provide separate billing. Azure Cost Management offers cost analysis but does not separate invoices for departments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do separate subscriptions ensure individual invoices?
Can you explain what resource groups and resource tags are?
How does Azure Cost Management help in tracking costs?
You are tasked with implementing disaster recovery for virtual machines in Azure by replicating them to a secondary region. Before initiating replication, which resource must be created to facilitate this process?
- You selected this option
A Recovery Services vault
- You selected this option
A Network Security Group
- You selected this option
An Azure Storage account
- You selected this option
A Load Balancer
Answer Description
To replicate Azure virtual machines to another region using Azure Site Recovery, you must first create a Recovery Services vault. The Recovery Services vault stores configuration and replication information and orchestrates the replication process. An Azure Storage account is not required because Site Recovery uses managed disks for VM replication. A Load Balancer distributes network traffic and is not involved in replication. A Network Security Group controls network traffic but does not facilitate replication or disaster recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Recovery Services vault in Azure?
Why isn't an Azure Storage account required for VM replication?
What role does Azure Site Recovery play in disaster recovery?
You are an Azure administrator for your organization. You need to create a group in Azure Entra ID that can be used to assign licenses to users. Which type of group should you create?
- You selected this option
Create an Administrative unit
- You selected this option
Create a Distribution list
- You selected this option
Create a Security group
- You selected this option
Create an Office 365 group
Answer Description
To assign licenses to users via a group in Azure Entra ID, you should create a Security group. Security groups are used to manage member and computer access to shared resources for a group of users, including license assignments. Office 365 groups are primarily for collaboration and include shared resources like mailboxes and calendars but are not ideal for license assignments. Distribution lists are used for email distribution and cannot be used to assign licenses. Administrative units are scopes for delegating administrative permissions and do not function as groups for license assignments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Entra ID?
What are the differences between Security groups and Office 365 groups?
What is a Distribution list and how does it differ from a Security group?
As an Azure Administrator, you need to diagnose connectivity issues between two virtual machines, VM1 and VM2, within the same virtual network. To troubleshoot the problem, you want to gather low-level network data between these VMs. Which Azure tool should you use to accomplish this task?
- You selected this option
Azure Network Watcher Packet Capture
- You selected this option
Azure Network Security Group
- You selected this option
Azure Traffic Analytics
- You selected this option
Azure Monitor Logs
Answer Description
Azure Network Watcher Packet Capture allows you to collect network packets to and from virtual machines, providing detailed network data for troubleshooting connectivity issues. By using Packet Capture, you can gather the necessary low-level data between VM1 and VM2 to diagnose the problem. Azure Monitor Logs collects and analyzes log data but does not capture network packets. Azure Traffic Analytics provides insights into network traffic flow patterns, not packet-level data. Azure Network Security Group controls network traffic but does not provide tools for capturing network packets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Network Watcher?
How does Packet Capture work in Azure Network Watcher?
What kind of data can I analyze from Packet Capture?
You need to provide a group of users with read access to data stored in an Azure Storage account using their existing credentials. Which action should you take to achieve this?
- You selected this option
Generate a storage account access key and share it with the users.
- You selected this option
Create a Shared Access Signature (SAS) token and distribute it to the users.
- You selected this option
Enable the 'Allow Blob public access' setting on the storage account.
- You selected this option
Assign the 'Storage Blob Data Reader' role to the users at the storage account level.
Answer Description
Assigning the 'Storage Blob Data Reader' role to the users at the storage account level enables them to authenticate using their Azure Active Directory (Azure AD) credentials and grants them read access to the data. Distributing a Shared Access Signature (SAS) token or access keys involves sharing sensitive secrets and does not leverage Azure AD authentication. Enabling public access would expose the data to unauthorized users, compromising security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Active Directory (Azure AD)?
What are roles in Azure, specifically the 'Storage Blob Data Reader' role?
What is a Shared Access Signature (SAS) in Azure Storage?
Initiating an unplanned failover to a secondary region using Azure Site Recovery requires the primary site to be online.
- You selected this option
True
- You selected this option
False
Answer Description
This statement is false. An unplanned failover in Azure Site Recovery is performed when the primary site is offline or has experienced a failure. Since the primary site is unavailable, the failover is initiated from the recovery site without requiring the primary site to be online. Unplanned failover assumes that the primary site cannot participate in the failover process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Site Recovery?
What is the difference between planned and unplanned failover?
Why is it important that the primary site be offline for unplanned failover?
You are an Azure administrator responsible for monitoring several web applications hosted in Azure. Your organization requires that when the average page load time of any web application exceeds 2 seconds over a 10-minute period, an email notification is sent to the development team. The solution should be cost-effective and require minimal effort to maintain. Which monitoring solution should you implement?
- You selected this option
Install a third-party monitoring tool to track page load times and send notifications.
- You selected this option
Enable Application Insights for the web apps and configure an alert based on the page load time.
- You selected this option
Enable Azure Monitor metrics for the web apps and create an alert rule based on CPU utilization.
- You selected this option
Deploy a Function App to monitor the web apps and send emails when thresholds are breached.
Answer Description
Enabling Application Insights for the web apps and configuring an alert based on the page load time meets the requirements. Application Insights provides in-depth monitoring of web applications, including performance metrics like page load times. It is cost-effective and requires minimal maintenance compared to custom solutions or third-party tools. Azure Monitor metrics and alerts based on CPU utilization do not address the specific need to monitor page load times. Deploying a Function App or installing third-party tools would require more effort to develop and maintain, making them less suitable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Application Insights?
How do alerts work in Application Insights?
What are the benefits of using Azure Monitor alongside Application Insights?
You manage virtual machines (VMs) in Azure that reside within a private virtual network and are not accessible from the internet. Administrators need to connect to these VMs remotely for maintenance purposes. You need to provide secure, seamless remote connectivity to these VMs without exposing them to the internet or requiring a virtual private network connection.
What should you implement?
- You selected this option
Assign public addresses to the VMs and restrict access using Network Security Groups (NSGs)
- You selected this option
Set up a site-to-site connection for administrators to access the VMs
- You selected this option
Deploy an Azure Bastion host in the virtual network
- You selected this option
Implement Azure Firewall to permit remote management traffic
Answer Description
You should deploy an Azure Bastion host in the virtual network. Azure Bastion provides secure remote connectivity to all VMs within the virtual network over SSL using the Azure portal. It allows administrators to access the VMs through the Azure portal without exposing the VMs to the public internet or requiring a VPN connection. This ensures that your VMs remain private while still allowing necessary remote management.
Option A is incorrect because setting up a site-to-site connection involves configuring VPN connections, which adds complexity and requires additional infrastructure. Option C is not recommended because assigning public addresses to the VMs exposes them to the internet, increasing security risks, even if Network Security Groups (NSGs) are used to restrict access. Option D is incorrect because Azure Firewall is designed for filtering and controlling network traffic, but it does not facilitate remote connectivity solutions for managing VMs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Bastion and how does it work?
What are the advantages of using Azure Bastion over a traditional VPN?
What are Network Security Groups (NSGs) and how do they relate to Azure Bastion?
You are an Azure administrator managing resources for the finance department within a resource group. The finance team needs the ability to modify the resources, but you need to prevent accidental deletion of these resources. What should you do?
- You selected this option
Apply a ReadOnly lock to all resources.
- You selected this option
Apply a ReadOnly lock at the resource group level.
- You selected this option
Apply a Delete lock at the resource group level.
- You selected this option
Remove delete permissions from the finance team.
Answer Description
Applying a Delete lock at the resource group level will prevent the deletion of the resource group and its contained resources while still allowing modifications. This ensures that the finance team can continue to modify resources without the risk of accidentally deleting them. A ReadOnly lock would prevent both deletion and modification, which does not meet the requirement. Changing permissions to read-only would restrict the finance team's ability to modify resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Delete lock in Azure?
What is the difference between a Delete lock and a ReadOnly lock?
How do I apply a Delete lock to a resource group in Azure?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.