Microsoft Azure Administrator Associate Practice Test (AZ-104)
Use the form below to configure your Microsoft Azure Administrator Associate Practice Test (AZ-104). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Azure Administrator Associate AZ-104 Information
As a candidate for this certification, you should have subject matter expertise in implementing, managing, and monitoring an organization’s Azure environment, including:
- Virtual networks
- Storage
- Compute
- Identity
- Security
- Governance
As an Azure administrator, you often serve as part of a larger team dedicated to implementing an organization's cloud infrastructure. You also coordinate with other roles to deliver Azure networking, security, database, application development, and DevOps solutions.
You should be familiar with:
- Operating systems
- Networking
- Servers
- Virtualization
In addition, you should have experience with:
- PowerShell
- Azure CLI
- The Azure portal
- Azure Resource Manager templates
- Microsoft Entra ID
Skills measured
- Manage Azure identities and governance
- Implement and manage storage
- Deploy and manage Azure compute resources
- Implement and manage virtual networking
- Monitor and maintain Azure resources
Free Microsoft Azure Administrator Associate AZ-104 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:Manage Azure identities and governanceImplement and manage storageDeploy and manage Azure compute resourcesConfigure and manage virtual networkingMonitor and maintain Azure resources
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
As an Azure Administrator, you need to restrict access to a storage account so that it is accessible only from specific on-premises locations over the Internet, while blocking all other network traffic. What is the best method to achieve this?
Integrate the storage account with a virtual network created in Azure.
Activate Azure Active Directory authentication for the storage account.
Enable private endpoints on the storage account.
Set the storage account's firewall settings to permit access from the required external sources.
Answer Description
To achieve this, you should set the storage account's firewall settings to permit access from the required external sources. This involves configuring the firewall to allow traffic only from the specific public IP addresses associated with your on-premises locations. This approach effectively blocks all other network traffic over the Internet. Integrating the storage account with a virtual network in Azure won't help because on-premises networks aren't part of Azure's virtual networks. Enabling private endpoints restricts access to within Azure virtual networks or through private connections, not over the Internet from specific external locations. Activating Azure Active Directory authentication manages identity-based access but doesn't control network-level access based on source addresses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Azure Storage Account firewall settings?
How do I identify the public IP addresses of my on-premises network for Azure configurations?
What is the difference between private endpoints and firewall rules in Azure?
You are an Azure administrator for Contoso Ltd. The company has two virtual networks, VNetA and VNetB, located in the same Azure region but in different subscriptions. You need to establish connectivity between the resources in VNetA and VNetB with minimal latency and bandwidth limitations. What should you do?
Implement an Azure Load Balancer to route traffic between VNetA and VNetB
Configure a site-to-site VPN connection between VNetA and VNetB
Create a virtual network peering between VNetA and VNetB using their resource IDs
Establish an ExpressRoute circuit between VNetA and VNetB
Answer Description
To connect virtual networks in different subscriptions within the same Azure region, you can create a virtual network peering between them. By using virtual network peering with resource IDs, you enable direct connectivity between VNetA and VNetB without the need for additional gateways or complex configurations. This approach provides low-latency, high-bandwidth connectivity between the networks. Other options like ExpressRoute or VPN connections are unnecessary and more complex for this scenario, and an Azure Load Balancer does not facilitate network connectivity between virtual networks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is virtual network peering in Azure?
What are resource IDs in virtual network peering?
Why not use VPN or ExpressRoute for this scenario?
An Azure administrator needs to add 500 new users to Azure Entra ID quickly and efficiently. The user data has been provided by the HR department. Which method should the administrator use to accomplish this task?
Set up Azure AD Connect to sync the accounts from an on-premises Active Directory.
Use the bulk create users feature in Azure Active Directory.
Create the user accounts manually through the Azure portal.
Use PowerShell to script the creation of user accounts.
Answer Description
The most efficient method is to use the bulk create users feature in Azure Entra ID. This feature allows the administrator to import multiple users at once by uploading a CSV file. Manually creating users through the portal is impractical for a large number of accounts. While a PowerShell script could automate the process, it requires scripting knowledge and additional time to develop and test. Syncing from an on-premises Entra ID is not applicable if the users are not present there.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the bulk create users feature in Azure Active Directory?
How should the CSV file for bulk user creation be formatted?
What are the main use cases for PowerShell in Azure user management?
You are the Azure administrator for your company's virtual network infrastructure. A virtual machine named VM1 is experiencing connectivity issues to a specific endpoint. You need to determine whether network security group (NSG) rules are allowing or denying the traffic to that endpoint. Which Azure Network Watcher feature should you use?
Packet capture
Next hop
IP flow verify
Connection troubleshoot
Answer Description
The 'IP flow verify' feature in Azure Network Watcher is used to check if a packet is allowed or denied to or from a virtual machine. It tests the traffic against configured network security group (NSG) rules and returns the specific rule that allowed or denied the traffic. This makes it the correct tool for the scenario. 'Connection troubleshoot' provides a comprehensive, point-in-time connection check but does not specify which NSG rule is responsible for a failure. 'Packet capture' collects raw network traffic for deep analysis but does not directly report on NSG rule evaluations. 'Next hop' is used to diagnose routing issues by showing the next hop in the traffic path, not for checking security rules.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of Azure Network Watcher's 'IP flow verify' feature?
What is the difference between 'IP flow verify' and 'Connection troubleshoot' in Azure?
Why can't 'Packet capture' or 'Next hop' be used for evaluating NSG rules?
When deploying a virtual machine in Azure, which setting allows you to specify the number of CPUs and amount of memory allocated to the virtual machine?
Size
Availability Set
Resource Group
Image
Answer Description
The 'Size' setting allows you to select the computational resources for your virtual machine, including the number of CPUs and the amount of memory. The 'Image' option specifies the operating system and software configuration, the 'Resource Group' is used for organizing resources, and the 'Availability Set' enhances availability by distributing VMs across fault domains.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Azure VM size and how does it determine resource allocation?
How can you change the size of an Azure Virtual Machine after deployment?
What factors should be considered when choosing a VM size in Azure?
You have two virtual networks, VNetA and VNetB, that you want to connect using virtual network peering in Azure. What requirement must be met to successfully configure the peering between VNetA and VNetB?
Network security group flow logs are enabled on both VNets
Both VNets are in the same subscription
The IP address spaces of VNetA and VNetB do not overlap
Both VNets are in the same resource group
Answer Description
To successfully peer two virtual networks, their IP address spaces must not overlap. Azure requires that the address ranges for each virtual network are unique to ensure proper routing of traffic between them. It is not necessary for the virtual networks to be in the same subscription or resource group; peering can be configured across subscriptions and resource groups. Enabling network security group (NSG) flow logs is not a requirement for virtual network peering.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important that the IP address spaces of VNetA and VNetB do not overlap?
Can virtual network peering be configured between VNets in different Azure subscriptions?
What happens to network security groups (NSGs) when VNets are peered?
You have an Azure Resource Manager (ARM) template that deploys a storage account and a virtual network. You need to update the template to include a virtual machine that is connected to the virtual network defined in the same template. What is the most appropriate way to modify the template to accomplish this?
Modify the 'outputs' section to include details of the virtual machine.
Add new parameters for the virtual machine configuration to the 'parameters' section of the template.
Add new resources for the virtual machine and its network interface to the 'resources' section of the template.
Add new variables for the virtual machine properties to the 'variables' section of the template.
Answer Description
To include a virtual machine in the ARM template and connect it to the existing virtual network, adding new resources for the virtual machine and its network interface in the 'resources' section is necessary. This ensures that the virtual machine and its dependencies are properly defined and deployed within the same template. Modifying parameters or variables would not create the actual resources; they only define values used by resources. The outputs section is used to return values from the deployment and does not affect resource creation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Azure Resource Manager (ARM) template?
What role does the 'resources' section play in an ARM template?
How do parameters and variables differ in an ARM template?
As part of a compliance audit, you must implement a solution that automatically rotates the two access keys for an Azure Storage account every 30 days while letting applications retrieve the keys securely without giving developers direct visibility of those secrets. Which Azure feature should you use to meet these requirements?
Automate access-key regeneration with custom scripts and scheduled tasks.
Use Azure Key Vault to store and automatically rotate the storage account access keys.
Manually regenerate the access keys periodically in the Azure portal.
Implement Azure AD authentication to eliminate the need for storage account access keys.
Answer Description
Azure Key Vault's managed storage account keys feature is the recommended approach. Key Vault stores the access keys as secrets, controls access through Azure RBAC, and can automatically regenerate (rotate) the keys on a defined schedule without exposing their values to users. Manual rotation-whether through the portal or scripts-requires additional effort and lacks centralized auditing. Switching entirely to Azure AD authentication is ideal when possible but does not solve the stated need to continue using access keys and rotate them regularly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Key Vault, and how does it help with access key management?
What is the difference between Azure RBAC and Key Vault access policies?
Why is automated access key rotation important in Azure?
Your organization has recently acquired licenses for a new enterprise application integrated with Azure Entra ID. As an administrator, you need to assign these licenses to a group of users, ensuring that license assignments automatically update when users join or leave the group. What should you do to accomplish this?
Create a dynamic device group and assign licenses to it.
Assign licenses directly to each user manually.
Configure an Azure Policy to enforce license assignments.
Assign licenses to users by adding them to a group with the licenses assigned.
Answer Description
By assigning licenses to a group in Azure Entra ID, you ensure that all current and future members of the group automatically receive the licenses, and licenses are revoked when users leave the group. This method is known as group-based licensing and simplifies license management. Assigning licenses directly to each user is time-consuming and does not automatically update when group membership changes. Dynamic device groups manage devices, not user accounts or licenses. Azure Policy is used for policy-based management and cannot assign licenses to users.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is group-based licensing in Azure Entra ID?
How can dynamic groups assist with license assignment in Azure?
What scenarios make group-based licensing more useful than manual assignment?
Which Azure Storage feature allows you to delegate limited permissions to storage resources for a specified time without sharing your account keys?
Managed Identities
Access Control Lists
Stored Access Policies
Shared Access Signature
Answer Description
Shared Access Signatures (SAS) enable you to grant clients limited access rights to storage resources without exposing your account keys. A SAS token specifies permissions and an expiration time, enhancing security when sharing resources. Managed Identities allow Azure services to authenticate to other services but do not directly delegate storage permissions. Access Control Lists (ACLs) are used to define permissions for files and directories in Azure Data Lake Storage Gen2 but are not used for time-limited access. Stored Access Policies help manage SAS by providing additional restrictions but are not used alone to delegate permissions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Shared Access Signature (SAS) in Azure?
How does a Stored Access Policy relate to SAS?
What are the security benefits of using a SAS token instead of account keys?
You are deploying an Azure infrastructure template that provisions a server. You need to ensure that additional software is automatically installed on the server after deployment. What is the best way to achieve this within the template?
Use Azure CLI to run the installation script after the server is deployed.
Include a custom script extension in the template.
Enable Azure Automation to install the software on the server.
Manually connect to the server and install the software.
Answer Description
Including a custom script extension in the template is the best way to automatically install additional software on the server after deployment. Extensions like the Custom Script Extension allow you to run scripts during or after the provisioning process as part of the deployment. This method ensures that the software installation is automated and integrated within the template, providing consistency and scalability. Using Azure CLI or Azure Automation requires additional configurations outside the template and does not embed the installation process within the deployment. Manually installing the software is inefficient and does not leverage automation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a custom script extension in Azure?
How do you include a custom script extension in an ARM template?
What advantages does using a custom script extension provide over manual installation?
You are an Azure administrator tasked with deploying a storage solution for a new application. The application requires high-performance file shares accessible via the NFS protocol. The data stored is sensitive financial information. Which storage account configuration should you choose to meet these requirements?
Create a general-purpose v2 storage account with standard performance tier
Create a general-purpose v2 storage account with premium performance tier
Create a FileStorage storage account with premium performance tier
Create a Blob storage account with premium performance tier
Answer Description
To meet the requirements, you should create a FileStorage storage account with the premium performance tier. FileStorage accounts are specifically designed for high-performance Azure Files workloads and support both SMB (Server Message Block) and NFS (Network File System) protocols. The premium tier provides the necessary low latency and high throughput for performance-intensive applications. Additionally, data in Azure Storage is encrypted at rest by default, ensuring the security of sensitive information. General-purpose v2 storage accounts with standard performance do not offer the required performance levels. Blob storage accounts are intended for object storage and do not support file shares. General-purpose v2 storage accounts with premium performance tier do not support premium file shares with NFS; this capability is exclusive to FileStorage accounts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a FileStorage account and a general-purpose v2 storage account?
What is the NFS protocol, and how is it used in Azure?
How does Azure Storage ensure that sensitive financial information is secure?
You assign the Contributor role to a user for a specific resource group named 'RG-WebApp'. The user has no other roles assigned at any other scope. What level of access does this user have?
The user has Contributor permissions on the entire subscription.
The user has Contributor permissions on all resource groups within the subscription.
The user has Contributor permissions on the 'RG-WebApp' resource group only.
The user has Reader permissions on the subscription and Contributor permissions on 'RG-WebApp'.
Answer Description
In Azure, role-based access control (RBAC) permissions are inherited from parent scopes down to child scopes. A role assigned at a resource group scope grants permissions only to that resource group and the resources within it. These permissions do not propagate upwards to the subscription level. Therefore, the user with the Contributor role on 'RG-WebApp' can create, manage, and delete resources only within that specific resource group. They do not have any permissions at the subscription level or in other resource groups.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the Contributor role allow a user to do?
What does 'scope' mean in Azure RBAC?
What’s the difference between Contributor and Reader roles in Azure?
Your company needs to deploy an AKS cluster where each pod must have its own IP address within the Azure virtual network to communicate directly with on-premises resources. Which networking model should you configure for the cluster to meet this requirement?
Azure CNI networking
Kubenet networking
Virtual Network peering
Azure Network Policy
Answer Description
The Azure Container Networking Interface (CNI) networking model allows each pod in an AKS cluster to receive an IP address from the Azure virtual network subnet. This setup enables pods to communicate directly with other resources on the virtual network and on-premises networks connected via VPN or ExpressRoute, without network address translation (NAT). The kubenet networking model assigns IP addresses at the node level and uses NAT for pod communication, which does not provide the required direct pod connectivity. Virtual Network (VNet) peering connects Azure virtual networks but does not assign IP addresses to pods. Azure Network Policy is used to define network traffic rules but does not affect the underlying networking model or pod IP assignment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure CNI networking?
How does Azure CNI differ from Kubenet?
What are the benefits of using Azure CNI for AKS clusters?
You need to transfer several terabytes of data from an on-premises server to an Azure Storage account. Your internet connection is reliable and sufficiently fast. You require a tool that can efficiently transfer data and can be automated via scripts. Which tool should you use?
Azure Portal
Azure Import/Export service
AzCopy
Azure Storage Explorer
Answer Description
AzCopy is a command-line tool that allows for efficient data transfer to and from Azure Storage accounts. It supports scripting and automation, making it ideal for transferring large datasets. Azure Storage Explorer is a graphical tool better suited for manual operations and smaller data transfers. The Azure Import/Export service involves shipping physical disks to Microsoft data centers, which is unnecessary given the reliable internet connection. The Azure Portal is not designed for transferring large amounts of data or for automation through scripts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does AzCopy ensure efficient data transfer?
Can AzCopy handle different types of Azure Storage accounts?
What are some common use cases for scripting AzCopy commands?
You are an Azure Entra ID administrator for your company. You need to create a group that automatically includes all users whose department is set to "Sales" in their user profiles. The group membership should update automatically when users change departments or new users are added to the Sales department. What should you do?
Create a Microsoft 365 group with assigned membership and add users from the Sales department
Create a security group with dynamic user membership using a department attribute query
Create an administrative unit for the Sales department
Create a security group with assigned membership and add users from the Sales department
Answer Description
To achieve automatic updates to the group membership based on user attributes, you should create a security group with dynamic user membership using a department attribute query. This allows Azure Entra ID to automatically add or remove users from the group when their department attribute changes. Assigned membership requires manual management of group members, which does not meet the requirement for automatic updates. A Microsoft 365 group is typically used for collaboration features in Microsoft 365 services and may not be necessary if those features aren't required. An administrative unit is used for delegating administrative permissions and scoping administrative tasks, not for grouping users based on attributes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a dynamic user membership in Azure Entra ID?
How do you define a dynamic membership rule in Azure Entra ID?
What is the difference between a security group and a Microsoft 365 group in Azure?
You are an Azure Administrator managing a production environment that includes several Azure Virtual Machines in the North Europe region. Your company requires a disaster recovery solution that allows failover to the West Europe region in case of a regional outage. You have been tasked with configuring replication of the VMs to the secondary region.
Which of the following steps should you perform first to set up the replication for the VMs?
Configure a backup policy for the virtual machines.
Enable replication for the virtual machines in the Azure portal.
Create an RSV in the West Europe region.
Install the replication agent on the virtual machines.
Answer Description
The first step in configuring disaster recovery for Azure VMs with Azure Site Recovery is to create a Recovery Services vault (RSV). This vault is a management entity that contains the disaster recovery configuration, policies, and metadata. It is a best practice and a requirement to create the vault in a region other than the source region; placing it in the target West Europe region ensures the vault is available during a North Europe regional outage. The vault orchestrates the replication process, where replicated data and recovery points are stored in storage accounts in the target region.
The other options are incorrect. Enabling replication is a subsequent step that is configured within the Recovery Services vault. Configuring a backup policy is an action related to Azure Backup, not Azure Site Recovery's replication capabilities. For Azure-to-Azure VM disaster recovery, the process is agentless, meaning you do not need to manually install a replication agent on the source virtual machines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Recovery Services vault (RSV) in Azure?
Why is the RSV created in the target region for disaster recovery?
How does Azure Site Recovery achieve agentless replication?
You are an Azure Administrator at Contoso Ltd. The company needs to add a new user who does not have an existing Microsoft account or email address. The user should be able to sign in and access resources assigned to them in the company's Azure environment. Which of the following actions should you take to create this user account?
Invite the user as a guest to the directory.
Create a new cloud user with a username and password.
Use a synchronization tool to sync their account from on-premises.
Create an application registration for the user.
Answer Description
Creating a new cloud-based user with a username and password allows you to set up an account without requiring an existing email address. The user will receive a unique User Principal Name (UPN) and can sign in using the credentials you provide. Inviting a guest user requires an email address to send the invitation. Using synchronization tools to sync an account from on-premises is not applicable since there is no on-premises account to synchronize. Creating an application registration is intended for application identities, not individual user accounts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cloud user in Azure Active Directory?
What is the purpose of the User Principal Name (UPN) in Azure?
How does inviting a guest user differ from creating a cloud user in Azure AD?
You are an Azure administrator for a company that stores sensitive data in Azure Blob Storage. You want to ensure that users can access the blobs using their existing corporate credentials without managing storage account keys or shared access signatures. What should you configure to achieve this?
Use shared access signatures to grant access to users.
Enable anonymous access on the storage account.
Configure Azure Entra ID authentication for the storage account.
Provide users with the storage account access keys.
Answer Description
Configuring Azure Entra ID authentication for the storage account enables users to access blobs using their corporate credentials. This approach integrates with your organization's existing identity management, enhancing security and simplifying access control. Using shared access signatures or distributing access keys would require managing and securing keys or tokens, which you aim to avoid. Enabling anonymous access would significantly reduce security and is not appropriate for sensitive data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Entra ID authentication for Azure Blob Storage?
What is the difference between shared access signatures and Azure Entra ID authentication?
Why is enabling anonymous access inappropriate for sensitive data?
An organization needs to delegate administrative permissions so that certain administrators can manage users and groups within their own department without affecting other departments. Which Azure feature should you implement to achieve this?
Azure Role-Based Access Control (RBAC)
Azure Entra ID Privileged Identity Management
Azure Management Groups
Azure Entra ID Administrative Units
Answer Description
Administrative Units in Azure Entra ID allow you to delegate administrative permissions to specific subsets of users or groups within your organization, such as by department or region. By using Administrative Units, you can assign administrators to manage only the users and groups within a particular Administrative Unit, without giving them broader access to other resources in Azure Entra ID. Other features like Azure Entra ID Privileged Identity Management, Management Groups, and Role-Based Access Control (RBAC) do not provide the necessary scope limitation at the department level within Azure AD user and group management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Administrative Units in Azure Entra ID?
How do Administrative Units differ from Azure RBAC?
Can Administrative Units manage specific resources outside Azure Entra ID?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.