Microsoft Azure Administrator Associate Practice Test (AZ-104)
Use the form below to configure your Microsoft Azure Administrator Associate Practice Test (AZ-104). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Azure Administrator Associate AZ-104 Information
As a candidate for this certification, you should have subject matter expertise in implementing, managing, and monitoring an organization’s Azure environment, including:
- Virtual networks
- Storage
- Compute
- Identity
- Security
- Governance
As an Azure administrator, you often serve as part of a larger team dedicated to implementing an organization's cloud infrastructure. You also coordinate with other roles to deliver Azure networking, security, database, application development, and DevOps solutions.
You should be familiar with:
- Operating systems
- Networking
- Servers
- Virtualization
In addition, you should have experience with:
- PowerShell
- Azure CLI
- The Azure portal
- Azure Resource Manager templates
- Microsoft Entra ID
Skills measured
- Manage Azure identities and governance
- Implement and manage storage
- Deploy and manage Azure compute resources
- Implement and manage virtual networking
- Monitor and maintain Azure resources

Free Microsoft Azure Administrator Associate AZ-104 Practice Test
- 20 Questions
- Unlimited
- Manage Azure identities and governanceImplement and manage storageDeploy and manage Azure compute resourcesConfigure and manage virtual networkingMonitor and maintain Azure resources
You need to transfer several terabytes of data from an on-premises server to an Azure Storage account. Your internet connection is reliable and sufficiently fast. You require a tool that can efficiently transfer data and can be automated via scripts. Which tool should you use?
AzCopy
Azure Import/Export service
Azure Portal
Azure Storage Explorer
Answer Description
AzCopy is a command-line tool that allows for efficient data transfer to and from Azure Storage accounts. It supports scripting and automation, making it ideal for transferring large datasets. Azure Storage Explorer is a graphical tool better suited for manual operations and smaller data transfers. The Azure Import/Export service involves shipping physical disks to Microsoft data centers, which is unnecessary given the reliable internet connection. The Azure Portal is not designed for transferring large amounts of data or for automation through scripts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does AzCopy ensure efficient data transfer?
Can AzCopy handle different types of Azure Storage accounts?
What are some common use cases for scripting AzCopy commands?
You are an Azure administrator responsible for backing up critical data. Management has requested detailed reporting on backup activities, including job status, success rates, and restore operations across all your backup solutions. The solution must offer unified and comprehensive reporting across multiple environments and regions. What should you implement to meet these requirements?
Configure Azure Monitor to collect data from backups and use a Log Analytics workspace for reporting
Implement Azure Policy to audit backup configurations and use policy compliance reports
Utilize Azure Advisor's recommendations and insights for backup reporting
Use the built-in monitoring capabilities of each backup vault for reporting
Answer Description
By configuring Azure Monitor to collect data from your backups and using a Log Analytics workspace for reporting, you can centralize backup data from multiple environments and regions into a single location. This setup enables unified and comprehensive reporting with rich visualization and analytics capabilities for your backup data.
Using the built-in monitoring capabilities of each backup vault limits reporting to individual vaults and doesn't provide a unified view across environments or regions.
Implementing Azure Policy helps in auditing and enforcing backup configurations but doesn't offer detailed operational reports on backup jobs and restore activities.
Azure Advisor provides recommendations for optimizing resources but doesn't supply detailed backup reporting.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Monitor and how does it work for backup reporting?
What is a Log Analytics workspace, and why is it important for Azure Monitor?
How does Azure Policy differ from Azure Monitor for backup reporting?
Your company has several departments, each utilizing multiple Azure resources. Management wants to ensure that resources are organized to simplify administrative tasks, such as applying settings, monitoring costs, and controlling access specific to each department. What is the BEST way to configure resources to meet these requirements?
Allocate separate subscriptions to each department
Use tags to label resources according to their department
Organize resources into separate resource groups for each department
Place all resources in one resource group and manage department access through policies
Answer Description
Organizing resources into separate resource groups for each department allows for effective management of access control, policy application, and cost tracking at the resource group level. This approach simplifies administration by grouping resources logically according to departmental needs. Using tags (Option B) aids in metadata management but does not inherently provide structured access control or policy enforcement. Placing all resources in one group (Option C) complicates department-specific management. Allocating separate subscriptions (Option D) may be excessive unless departments require complete isolation and can introduce additional complexity in subscription management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Azure Resource Groups?
How do Resource Groups differ from Tags in Azure?
When would separate subscriptions be necessary instead of using Resource Groups?
An Azure administrator needs to automate the process of moving blobs to cooler storage tiers based on their last modification date and delete old blobs after a specified period. Which feature in Azure Storage allows them to define rules to automate these actions?
Azure Blob Snapshots
Azure Blob Lifecycle Management
Azure Blob Soft Delete
Azure Blob Versioning
Answer Description
Azure Blob Lifecycle Management enables administrators to define rules that automate moving blobs between access tiers (Hot, Cool, Archive) based on conditions like age or last modification date. It also allows for automatic deletion of blobs when they meet specified criteria. This helps optimize storage costs by efficiently managing the data lifecycle without manual intervention.
Azure Blob Versioning maintains previous versions of blobs but doesn't automate tiering or deletion based on rules. Azure Blob Soft Delete protects blobs from accidental deletion but doesn't move blobs between tiers or delete them automatically after a period. Azure Blob Snapshots create read-only versions of blobs at a point in time but don't offer automated management based on lifecycle policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different storage tiers in Azure Blob Storage?
How does Azure Blob Lifecycle Management improve cost efficiency?
What is the difference between Blob Lifecycle Management and Soft Delete?
An organization has compliance requirements that prohibit the deployment of virtual machines in certain regions. What is the BEST method to ensure that users cannot deploy virtual machines in the prohibited regions?
Notify users about the compliance requirements and rely on them to comply.
Set up a resource lock to prevent deployment of virtual machines in those regions.
Implement a policy that denies the creation of virtual machines in the specified regions.
Remove user permissions to create virtual machines in the prohibited regions.
Answer Description
Implementing a policy that denies the creation of virtual machines in specified regions is the most effective method. Azure Policy allows you to define and enforce rules that govern resource properties during deployment and for already existing resources. This ensures compliance by automatically preventing non-compliant resources from being created. Removing user permissions may not be practical or efficient, as it requires managing permissions for each user. Setting up resource locks does not prevent deployment but rather protects resources from accidental deletion or modification. Relying on users to comply without enforcement does not guarantee adherence to compliance requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Policy and how does it work?
Why is removing user permissions not the best way to enforce compliance?
What is the difference between Azure Policy and resource locks?
You need to enable internal name resolution for your virtual machines within an Azure virtual network, ensuring that the name records are not accessible from the public internet. Which Azure service should you use?
Azure ExpressRoute
Azure Traffic Manager
Azure Public DNS zone
Azure Private DNS zone
Answer Description
Azure Private DNS zones allow you to manage and resolve domain names within a virtual network without exposing the records to the public internet. This ensures secure internal communication using domain names. Azure Public DNS zones publish DNS records to the internet, which is not suitable in this scenario. Azure Traffic Manager is a traffic load balancer and does not provide internal name resolution. Azure ExpressRoute provides private connections between Azure and on-premises networks but does not address internal name resolution.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Azure Private DNS Zone?
How does Azure Private DNS differ from Azure Public DNS?
Can Azure Private DNS zones work across multiple virtual networks?
A company manages several Azure virtual machines that host their web application tier. They want to efficiently manage the network access policies for these VMs without assigning policies directly to each network interface or subnet. Which Azure feature can they use to group these VMs for easier management of network access rules?
Use Resource Groups to organize the VMs and apply network policies to the Resource Group
Create a Virtual Machine Scale Set for the VMs
Create an Application Security Group and associate the VMs with it
Tag the VMs with a common tag and configure network policies based on tags
Answer Description
Application Security Groups (ASGs) allow you to group virtual machines based on application or workload, enabling the creation of network security rules that reference these groups. By associating the VMs with an ASG, administrators can apply and manage network access policies more efficiently through Network Security Groups (NSGs) that target the ASG. Resource Groups are used for organizing Azure resources but cannot have network policies applied directly to them. Virtual Machine Scale Sets (VMSS) facilitate deployment and management of identical VMs but are not intended for grouping VMs for network access rule management. Tags are metadata labels for categorizing resources and cannot be directly referenced in network security rules.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Application Security Group (ASG) in Azure?
How does an ASG differ from a Resource Group in Azure?
What is the relationship between an NSG and an ASG in Azure?
Your organization wants to centrally manage corporate-owned Windows 10 devices. Users need to sign in to these devices using their organizational accounts, and the devices must be managed and secured using policies defined in Microsoft Intune. What should you do to meet these requirements?
Enroll the devices in Mobile Device Management for Office 365
Register the devices with your organization's cloud directory
Join the devices to your organization's cloud directory
Join the devices to a local Active Directory domain
Answer Description
Joining the devices to your organization's cloud directory allows users to sign in with their organizational accounts and enables centralized management and policy enforcement through Microsoft Intune. This approach ensures that devices are properly managed and secured. Registering devices is typically used for personal or bring-your-own-device (BYOD) scenarios and does not provide the same level of management control. Joining devices to a local Active Directory domain does not meet the requirement for cloud-based sign-in and management. Enrolling devices in Mobile Device Management for Office 365 offers limited management capabilities compared to Microsoft Intune.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between joining devices to a cloud directory and registering devices?
Why is enrolling devices in Mobile Device Management (MDM) for Office 365 insufficient in this case?
How does managing devices through Microsoft Intune enhance security and control?
You are an Azure Administrator tasked with deploying a multi-container application consisting of a web frontend and a background processing service that need to communicate over localhost. How should you configure the deployment to meet these requirements using container instances?
Deploy both containers in a single container group.
Deploy the containers to a Kubernetes service to enable inter-container communication.
Use an App Service to host the containers and enable communication via service endpoints.
Deploy each container in separate container groups and connect them using a virtual network.
Answer Description
To enable the web frontend and background service to communicate over localhost, they must be deployed within the same container group in Azure Container Instances (ACI). A container group allows multiple containers to share the same network namespace and local IP address, facilitating inter-container communication via localhost. Deploying them in separate container groups or using different services would not allow localhost communication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Azure Container Group?
Why can't separate container groups communicate over localhost?
How does Azure Container Instances support multi-container applications?
You need to configure backups for your Azure virtual machines. Which Azure resource should you create to store and manage the backup data?
A Storage Account
A Resource Group
A Recovery Services vault
A Backup Policy
Answer Description
To configure backups for Azure virtual machines, you need to create a Recovery Services vault. A Recovery Services vault is an Azure resource that stores backup data and recovery points, and provides the interface to manage backups and restores. A Storage Account is used for general-purpose storage but is not designed specifically for backups. A Backup Policy defines the schedule and retention of backups but does not store the backup data itself. A Resource Group is a container used to manage multiple Azure resources but does not store backup data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Recovery Services vault in Azure?
How does a Backup Policy differ from a Recovery Services vault?
Can I use a Storage Account for Azure VM backups instead of a Recovery Services vault?
Which of the following can be used to perform file-level recovery from an Azure virtual machine backup?
Use Azure Backup's File Recovery feature
Use the Instant Restore feature of Azure Backup
Use Azure Site Recovery's Failover option
Use the Azure VM's Snapshot feature
Answer Description
Azure Backup's File Recovery feature allows administrators to browse and recover individual files and folders from an Azure VM backup without restoring the entire VM. This is useful when only specific files need to be restored. The other options either do not support file-level recovery or are used for different purposes, such as whole VM snapshots or disaster recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Backup's File Recovery feature?
How is Azure Backup's File Recovery different from a full VM restore?
Can Azure Site Recovery or VM Snapshots perform file-level recovery?
Which method allows you to use your own encryption keys to encrypt data at rest in an Azure Storage account?
Use client-side encryption with keys stored locally
Configure customer-managed keys stored in Azure Key Vault
Enable server-side encryption with Microsoft-managed keys
Store encryption keys in Azure Active Directory
Answer Description
To use your own encryption keys for encrypting data at rest in an Azure Storage account, you need to configure customer-managed keys stored in Azure Key Vault. This approach lets you control and manage the encryption keys, enhancing security compliance. Microsoft-managed keys are managed by Azure and do not allow the use of your own keys. Client-side encryption involves encryption performed by the client application and is not configured at the storage account level. Azure Active Directory does not store encryption keys for storage account encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are customer-managed keys in Azure Key Vault?
How does server-side encryption with customer-managed keys work?
Why is Azure Key Vault recommended for storing encryption keys?
An administrator has established a virtual network peering connection between two Azure virtual networks, VNet-A and VNet-B. How is the network traffic between virtual machines in these two virtual networks handled?
It is routed privately over the Microsoft Azure backbone.
It is directed through the nearest public Azure Load Balancer.
It is routed through a mandatory VPN Gateway.
It is sent over the public internet.
Answer Description
When virtual network peering is established, traffic between the peered networks is routed directly and privately over the Microsoft Azure backbone. It does not traverse the public internet, which provides significant security and performance benefits. A VPN Gateway is a different component used for other connectivity scenarios, like site-to-site connections or VNet-to-VNet connections that require encryption, but it is not part of the standard VNet peering path. Traffic is not sent over the public internet. An Azure Load Balancer is used to distribute traffic to a set of backend resources, not to route traffic between distinct virtual networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Azure backbone network?
How does VNet peering differ from using a VPN Gateway?
What are the security advantages of routing traffic over the Azure backbone?
Your company has several Azure virtual machines running critical applications. You are tasked with configuring Azure Monitor Logs to collect and analyze performance data from these virtual machines. You need to ensure that the logs are collected in a centralized location where you can run queries and create alerts based on the data. What should you configure to meet these requirements?
Create a Log Analytics workspace and configure the virtual machines to send logs to it.
Enable Azure Monitor metrics and set up alerts based on threshold values.
Enable Azure Advisor recommendations and implement the suggested actions.
Create a Storage Account and configure the virtual machines to send logs to it.
Answer Description
To collect and analyze performance data from Azure virtual machines using Azure Monitor Logs, you need to create a Log Analytics workspace and configure the virtual machines to send their logs to it. The Log Analytics workspace acts as a centralized repository for log data, allowing you to run queries, perform detailed analysis, and set up alerts based on specific conditions.
Enabling Azure Monitor metrics collects performance data but does not provide the ability to run detailed queries on log data or create custom alerts based on those logs. Configuring virtual machines to send logs to a Storage Account stores the data but does not offer built-in analysis or querying capabilities within Azure Monitor. Enabling Azure Advisor provides best practice recommendations but does not facilitate the collection or analysis of logs from virtual machines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Log Analytics workspace in Azure?
How do you configure a virtual machine to send logs to a Log Analytics workspace?
What is the difference between Azure Monitor Logs and Azure Monitor Metrics?
You are an Azure Administrator responsible for securing an Azure storage account that is accessed by multiple applications. You want to minimize the risk associated with storage account key exposure while allowing applications to access the storage resources. What should you do to achieve this?
Regenerate the storage account keys every week and distribute the new keys to applications.
Store the storage account keys in Azure Key Vault and configure applications to retrieve the keys from Key Vault.
Use Shared Access Signatures (SAS) for applications to access the storage account instead of using the account keys.
Disable one of the storage account keys to limit access to the storage account.
Answer Description
Using Shared Access Signatures (SAS) allows you to grant limited and specific access to storage account resources without exposing the account keys. SAS provides fine-grained control over permissions and duration of access, reducing the risk associated with key exposure and following security best practices. Storing account keys in Azure Key Vault and retrieving them in applications still involves using the account keys directly, which can increase risk if an application is compromised. Regularly regenerating keys and distributing them to applications can cause disruptions and does not eliminate the risk of key exposure. Disabling one of the keys reduces redundancy and can make key rotation difficult without addressing the underlying issue of key exposure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Shared Access Signatures (SAS) in Azure?
Can SAS tokens be used with specific permissions and time limits?
What is the difference between using SAS and storing keys in Azure Key Vault?
You are an Azure administrator managing a storage account that holds a large number of blobs. Data analysis shows that some blobs have not been accessed in over 180 days, and you need to reduce storage costs for these infrequently accessed blobs. What should you do?
Enable blob versioning
Configure a CDN to cache the blobs
Change the access tier of these blobs to Archive
Enable soft delete for blobs
Answer Description
To reduce storage costs for infrequently accessed blobs, you should change their access tier to Archive. The Archive tier offers the lowest storage costs but higher access costs and latency, making it suitable for data that is rarely accessed. Enabling blob versioning or soft delete helps with data protection and recovery but does not reduce storage costs. Configuring a CDN (Content Delivery Network) is used for reducing latency and improving content delivery performance, not for reducing storage costs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the differences between the Hot, Cool, and Archive access tiers in Azure Blob Storage?
What is the process to change the access tier of specific blobs in Azure Storage?
What are the trade-offs of moving blobs to the Archive access tier?
An organization wants to back up their Azure virtual machines with a specific retention policy: daily backups retained for 30 days, weekly backups retained for 12 weeks, monthly backups retained for 12 months, and yearly backups retained for 7 years. They want to automate this process with minimal administrative overhead. Which backup policy configuration option should they use?
Configure separate backup policies for daily, weekly, monthly, and yearly backups
Set up a backup policy using Azure Site Recovery with custom retention settings
Create a custom backup policy with multiple retention ranges for daily, weekly, monthly, and yearly backups
Use the default backup policy and adjust the retention to meet the requirements
Answer Description
Creating a custom backup policy with multiple retention ranges for daily, weekly, monthly, and yearly backups allows the organization to meet their complex retention requirements within a single policy. This approach minimizes administrative overhead by automating backups and retention without the need to manage multiple policies. Using the default backup policy would not meet the specific retention needs. Configuring separate backup policies increases administrative effort, contrary to the requirement of minimal overhead. Azure Site Recovery is designed for disaster recovery, not for meeting specific backup retention policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a custom backup policy in Azure?
How does Azure Site Recovery differ from Azure Backup?
Why is using a single custom backup policy better than multiple policies?
You need to set up a shared storage solution in Azure accessible via the SMB protocol from multiple locations. Which Azure service should you implement?
Azure Files
Azure Table Storage
Azure Queue Storage
Azure Blob Storage
Answer Description
Azure Files provides fully managed shared storage accessible via the Server Message Block (SMB) protocol, allowing multiple clients to read and write files simultaneously. Azure Blob Storage is optimized for storing unstructured object data and does not support SMB access. Azure Queue Storage is used for messaging between services, and Azure Table Storage is for storing structured NoSQL data. Therefore, Azure Files is the appropriate service for creating a network file share accessible via SMB.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SMB protocol and why is it important in Azure Files?
How does Azure Files differ from Azure Blob Storage?
How can data in Azure Files be secured during access?
As an Azure Administrator, you need to restrict access to a storage account so that it is accessible only from specific on-premises locations over the Internet, while blocking all other network traffic. What is the best method to achieve this?
Enable private endpoints on the storage account.
Activate Azure Active Directory authentication for the storage account.
Integrate the storage account with a virtual network created in Azure.
Set the storage account's firewall settings to permit access from the required external sources.
Answer Description
To achieve this, you should set the storage account's firewall settings to permit access from the required external sources. This involves configuring the firewall to allow traffic only from the specific public IP addresses associated with your on-premises locations. This approach effectively blocks all other network traffic over the Internet. Integrating the storage account with a virtual network in Azure won't help because on-premises networks aren't part of Azure's virtual networks. Enabling private endpoints restricts access to within Azure virtual networks or through private connections, not over the Internet from specific external locations. Activating Azure Active Directory authentication manages identity-based access but doesn't control network-level access based on source addresses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Azure Storage Account firewall settings?
How do I identify the public IP addresses of my on-premises network for Azure configurations?
What is the difference between private endpoints and firewall rules in Azure?
You are an Azure administrator for a company. There is a virtual machine named VM1 that hosts a web application that must be accessible from the internet over port 80. The company's security policy states that virtual machines should not be assigned public addresses directly. What should you implement to meet these requirements?
Set up an Azure Load Balancer to forward port 80 to VM1
Configure an Azure Virtual Network NAT gateway
Assign a public address to the virtual network subnet containing VM1
Enable Azure Traffic Manager to route traffic to VM1
Answer Description
To allow internet users to access VM1 over port 80 without assigning a public address directly to the VM, you should set up an Azure Load Balancer with a public frontend. The load balancer forwards incoming traffic on port 80 to VM1's private address, complying with the security policy. Assigning a public address to a subnet is not possible and does not enable inbound traffic to the VM. A NAT gateway provides outbound connectivity for VMs without public addresses but does not support inbound connections. Azure Traffic Manager is used for DNS-based traffic load balancing across multiple endpoints and does not facilitate direct inbound access to a single VM.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Azure Load Balancer, and how does it work?
Why would assigning a public IP to the virtual network subnet not work?
What is the difference between a NAT gateway and an Azure Load Balancer?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.