Microsoft Azure Developer Associate Practice Test (AZ-204)
Use the form below to configure your Microsoft Azure Developer Associate Practice Test (AZ-204). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Microsoft Azure Developer Associate AZ-204 Information
Navigating the AZ-204 Azure Developer Associate Exam
The Microsoft Azure Developer Associate (AZ-204) certification is a crucial credential for cloud developers specializing in the Microsoft Azure ecosystem. This exam is designed for professionals who are responsible for all phases of the development lifecycle, including gathering requirements, design, development, deployment, security, maintenance, performance tuning, and monitoring. Candidates should have 1-2 years of professional development experience, including hands-on experience with Microsoft Azure. The exam validates a developer's proficiency in leveraging Azure's tools, SDKs, and APIs to build and maintain cloud applications and services.
The AZ-204 exam assesses a broad set of skills across five primary domains. These areas include developing Azure compute solutions (25-30%), developing for Azure storage (15-20%), implementing Azure security (15-20%), monitoring, troubleshooting, and optimizing Azure solutions (5-10%), and connecting to and consuming Azure services and third-party services (20-25%). The exam itself consists of 40-60 questions and has a duration of about 100 minutes. The question formats can vary, including multiple-choice, scenario-based questions, and drag-and-drop tasks.
The Value of Practice Exams in Preparation
A critical component of a successful study plan for the AZ-204 exam is the use of practice tests. Taking practice exams offers several key benefits that go beyond simply memorizing facts. They help you become familiar with the style, wording, and difficulty of the questions you are likely to encounter on the actual exam. This familiarity can help reduce anxiety and improve time management skills during the test.
Furthermore, practice exams are an excellent tool for self-assessment. They allow you to gauge your readiness, identify areas of weakness in your knowledge, and focus your study efforts accordingly. By reviewing your answers, especially the incorrect ones, you can gain a deeper understanding of how different Azure services work together to solve real-world problems. Many candidates find that simulating exam conditions with timed practice tests helps build the confidence needed to think clearly and methodically under pressure. Microsoft itself provides a practice assessment to help candidates prepare and fill knowledge gaps, increasing the likelihood of passing the exam.

Free Microsoft Azure Developer Associate AZ-204 Practice Test
- 20 Questions
- Unlimited
- Develop Azure compute solutionsDevelop for Azure storageImplement Azure securityMonitor and troubleshoot Azure solutionsConnect to and consume Azure services and third-party services
Free Preview
This test is a free preview, no account required.
Subscribe to unlock all content, keep track of your scores, and access AI features!
Your production Web App runs on Azure App Service for Windows in the Premium V2 tier. During spikes in traffic, requests occasionally time out. You suspect a thread-pool deadlock and need a full memory and thread dump for offline analysis, but you must avoid recycling the worker process to meet the SLA. Which built-in App Service feature lets you capture the dump directly from the Azure portal without restarting the app?
Application Insights Profiler trace
Diagnose and solve problems - Collect Memory Dump tool
Kudu WebSSH console
Log Stream with detailed error logging enabled
Answer Description
The Diagnose and solve problems blade in the Azure portal includes the Collect Memory Dump tool. This feature captures a full memory and thread dump of the running worker process while the site continues to serve traffic, so no application restart is required. Kudu's WebSSH console can browse the file system and run commands but cannot create process dumps. Log Stream only streams existing logs and error messages; it does not take memory snapshots. Application Insights Profiler records CPU and execution traces, not complete memory dumps needed to inspect thread states.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Collect Memory Dump tool in Azure App Service?
How does the Collect Memory Dump tool avoid app downtime?
Why is a thread-pool deadlock a problem in web apps?
You have a general-purpose v2 storage account that stores log files in a container named logs. To reduce costs, the files must automatically move to the Archive access tier 90 days after they were last modified. When creating an object lifecycle management rule, which JSON action and condition should you add to the rule definition to meet the requirement?
"actions": { "baseBlob": { "tierToArchive": { "daysAfterLastAccessTimeGreaterThan": 90 } } }
"actions": { "baseBlob": { "tierToCool": { "daysAfterModificationGreaterThan": 90 } } }
"actions": { "baseBlob": { "tierToArchive": { "daysAfterModificationGreaterThan": 90 } } }
"actions": { "snapshot": { "tierToArchive": { "daysAfterModificationGreaterThan": 90 } } }
Answer Description
The built-in lifecycle management policy supports the tierToArchive action for base blobs. Setting the property daysAfterModificationGreaterThan to 90 directs Azure Storage to move any matching blob to the Archive tier 90 days after its last modification. The daysAfterLastAccessGreaterThan property targets last access, not modification. The snapshot scope and the tierToCool action do not satisfy the requirement to archive base blobs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the 'tierToArchive' action do in Azure Storage lifecycle management?
What is the difference between 'daysAfterModificationGreaterThan' and 'daysAfterLastAccessTimeGreaterThan'?
Why can’t snapshots or 'tierToCool' actions be used in this scenario?
You are developing a single-page JavaScript application (SPA) that needs to call a custom web API protected by Microsoft Entra ID. The solution must use an OAuth 2.0 flow that never transmits a client secret, returns tokens containing user claims, and works with Conditional Access and modern browser protections. Which grant type should you implement?
Resource-owner-password-credentials grant
Client-credentials grant
Implicit grant
Authorization code flow with PKCE
Answer Description
The authorization code flow with Proof Key for Code Exchange (PKCE) is the recommended OAuth 2.0 flow for SPAs using the Microsoft identity platform. It does not require a client secret, includes the user's delegated claims in the issued access token, complies with Conditional Access policies, and replaces the older implicit grant. The client-credentials grant is intended for app-only tokens and therefore lacks user claims. Resource-owner-password-credentials transmits user credentials directly and is incompatible with Conditional Access. The implicit grant is deprecated for new solutions because it exposes tokens in the browser address bar and cannot meet modern security requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is PKCE in the authorization code flow?
Why is the implicit grant deprecated?
How does Conditional Access work with the authorization code flow?
You run an on-demand data-processing task in Azure Container Instances. The task completes in roughly 15 minutes. After a successful run (exit code 0), the container should stop so that billing ends. If the task fails (non-zero exit code), the container must restart automatically. Which restart policy should you set when creating the container group?
Always
OnFailure
Never
UnlessStopped
Answer Description
The OnFailure restart policy instructs Azure Container Instances to monitor the main process running inside the container. If the process exits successfully (exit code 0), the container stops and remains stopped, so billing for CPU and memory ceases. If the process exits with a non-zero code, ACI interprets this as a failure and restarts the container automatically. The Always policy keeps restarting the container even after successful completion, incurring unnecessary cost. The Never policy prevents any automatic restart, so a failure would leave the container stopped. UnlessStopped is not a valid ACI restart policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of exit codes in Azure Container Instances?
How does the OnFailure restart policy benefit cost management in Azure Container Instances?
What happens if I choose Always or Never restart policies in Azure Container Instances?
You have the source code and a Dockerfile in the current directory on your workstation. The workstation lacks Docker engine and has limited CPU resources. You need to build the image in Azure and push it to an Azure Container Registry named contosoacrdemo, tagging the resulting image as web:v1. Which Azure CLI command should you run?
docker build -t contosoacrdemo.azurecr.io/web:v1 .
az acr build --registry contosoacrdemo --image web:v1 .
az acr task create --registry contosoacrdemo --name buildweb --image web:v1 --context .
az container create --registry-login-server contosoacrdemo.azurecr.io --image web:v1 .
Answer Description
The az acr build command sends the current directory context to the Azure Container Registry build service, which performs the docker build operation in Azure and automatically pushes the resulting image to the specified registry. Using --registry identifies the target ACR, and --image supplies the desired repository name and tag. The trailing period (.) indicates the local context to upload. az acr task create sets up a persistent task but does not immediately build the image; docker build runs locally and therefore requires Docker Engine; az container create provisions a container instance and does not build or push images.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of the Azure Container Registry (ACR)?
What does the '--registry' flag do in the az acr build command?
Why is az acr build preferred when Docker engine is not installed locally?
An Azure App Service web app named contoso-api uses two deployment slots: production and staging. The configuration contains an app setting APPINSIGHTS_INSTRUMENTATIONKEY and a connection string DefaultConnection that currently points to the production database. You plan to swap staging with production. After the swap, each slot must continue using its existing database. What should you do before starting the swap?
Enable auto-swap on the staging slot.
Mark the DefaultConnection connection string as a slot setting.
Mark the APPINSIGHTS_INSTRUMENTATIONKEY app setting as a slot setting.
Configure traffic routing to send 20 % of traffic to the staging slot.
Answer Description
Connection strings or app settings that are marked as slot settings stay with the slot during a swap. By marking the DefaultConnection connection string as a slot setting, the value that points to the test database remains in the staging slot after the swap, while the production slot retains the production database connection string. Enabling auto-swap or traffic routing does not affect configuration persistence, and marking the APPINSIGHTS_INSTRUMENTATIONKEY setting does not address the database requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Azure App Service deployment slot?
What does marking a connection string as a slot setting do?
What is auto-swap in Azure App Service?
You are managing an Azure App Service Web App hosted in a Standard tier App Service plan. To reduce costs, you must configure autoscale so that the plan runs between one and five instances based on average CPU utilization. Autoscale must continue to function even if the web app is stopped for maintenance. In the Azure portal, on which resource should you configure the autoscale profile?
The App Service plan that hosts the web app
The web app resource itself
The Azure Monitor autoscale setting applied at the resource group level
The Application Insights resource linked to the web app
Answer Description
Autoscale for Azure App Service is configured at the App Service plan level, not on the individual web app. Scaling operations are performed by Azure Monitor against the plan resource itself, so they continue to add or remove worker instances even when a particular web app in that plan is stopped. Configuring autoscale on Application Insights, the resource group, or the web app would not meet the requirement, because none of those resources are responsible for the underlying worker pool that actually scales.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an App Service plan in Azure?
How does Azure Monitor handle autoscaling for App Service plans?
Why isn't autoscale configured on the web app resource itself?
You need to watch a production ASP.NET Core web app for service degradation while rolling out a critical fix. The solution must let you see incoming request rate, average server response time, and any failed requests within a few seconds, without waiting for data to appear in the Logs blade. Which Application Insights feature should you use?
An Application Insights workbook
A Kusto query in the Logs blade
A metric-based alert rule targeting server response time
Live Metrics Stream
Answer Description
Live Metrics Stream (formerly QuickPulse) displays near-real-time telemetry that is pushed directly from the SDK every second. It shows request rate, response time, failure count, CPU and memory usage, and lets you inspect individual failed requests immediately, whereas the Logs blade (Kusto queries) relies on data that is ingested and can be delayed by several minutes. Alert rules, Workbooks, and the Failures pane depend on that ingested data and therefore cannot fulfil the "within a few seconds" requirement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Live Metrics Stream in Application Insights?
How does Live Metrics Stream differ from logging in the Logs blade?
Why are metric-based alert rules or Application Insights workbooks not suitable for near-real-time monitoring?
You have an Azure App Service for Linux that runs a custom container image stored in Azure Container Registry (ACR). Developers frequently push new versions of the image by overwriting the existing "latest" tag. You must ensure the web app automatically pulls and runs the updated image each time the tag is pushed, without any manual steps. Which action should you take?
Set the app setting WEBSITES_CONTAINER_START_TIME_LIMIT to 0 so App Service re-pulls the container image each time it starts.
Create a staging deployment slot and configure autoswap to production whenever the slot restarts.
Enable Continuous Deployment for the ACR image in Deployment Center, allowing a registry webhook to redeploy the web app automatically.
Package the application code into a zip file and deploy it with Run-From-Package.
Answer Description
When you enable Continuous Deployment for an ACR-based image in the App Service Deployment Center, the portal creates a webhook in the registry that targets the web app. Every time the specified tag is pushed, ACR sends the webhook, which triggers App Service to pull and start the new image automatically. Changing WEBSITES_CONTAINER_START_TIME_LIMIT only affects the startup timeout and does not trigger image refreshes. Run-From-Package deploys code, not containers. Autoswap between deployment slots orchestrates slot traffic changes but does not cause the app to detect a new image in the registry.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Deployment Center, and how does it enable Continuous Deployment?
What is a webhook, and how is it used in Azure Continuous Deployment?
Why doesn't changing the WEBSITES_CONTAINER_START_TIME_LIMIT trigger image refreshes?
You have an Azure Container App named orders-api that was created by using the default settings. You plan to deploy an updated container image and gradually shift 20 percent of incoming traffic to the new revision while the remaining 80 percent continues to use the current revision. Before deploying the new image, which change must you make to the existing container app to support this traffic-splitting strategy?
Enable the Dapr sidecar and add a component that defines canary percentages.
Change the revisionMode setting of orders-api to multiple.
Create a second container app for the new image and configure an Azure Traffic Manager profile to distribute 20 percent of traffic to it.
Add a new autoscale rule with the canary policy type.
Answer Description
Azure Container Apps supports traffic-splitting across revisions only when revision management is set to multiple. The default setting for a newly created container app is single, which keeps only the latest revision active and routes all traffic to it. Changing the container app's revisionMode property to multiple (for example by running "az containerapp update --revision-mode multiple" or by redeploying with a YAML template that sets revisionMode: multiple) enables multiple active revisions and allows you to assign traffic weights such as 80/20. Enabling Dapr, configuring autoscale rules, or adding an external Azure Traffic Manager profile do not activate the built-in revision traffic-splitting capability, and creating a second container app would require DNS or gateway changes rather than the built-in percentage-based routing inside a single container app.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the revisionMode setting in Azure Container Apps?
How does traffic-splitting work in Azure Container Apps?
Why is enabling Dapr not suitable for traffic-splitting in this scenario?
You deploy a Linux-based Azure App Service Web App that runs a custom image stored in a private Azure Container Registry. The image tag is set to "webapi:prod". You push further updates to the same tag several times a week. You need the web app to redeploy automatically each time the tag is updated, without changing the container configuration manually. Which setting should you configure on the web app?
Add an application setting named WEBSITE_PULL_IMAGE_ON_STARTUP with the value true.
Add an application setting named DOCKER_ENABLE_CI with the value true.
Add an application setting named WEBSITES_PORT with the value 80.
Enable Always On in the Configuration page.
Answer Description
Azure App Service supports continuous deployment for custom container images. Enabling this feature causes the platform to create a webhook in Azure Container Registry and to restart the web app whenever a new image with the same tag is pushed. This capability is enabled by adding the application setting "DOCKER_ENABLE_CI" and setting its value to "true" (the portal adds this automatically when you switch on Continuous Deployment). The other settings do not trigger image pulls when the tag is updated: WEBSITE_PULL_IMAGE_ON_STARTUP is not a recognized key, WEBSITES_PORT only defines the container's listening port, and Always On merely prevents the app from unloading during idle periods.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DOCKER_ENABLE_CI used for in Azure App Service?
How does Azure App Service use webhooks for container redeployment?
Why doesn't WEBSITE_PULL_IMAGE_ON_STARTUP trigger automatic container updates?
You are developing an ASP.NET Core 6.0 web API that will be deployed to Azure App Service. The app has a system-assigned managed identity. A secret named DbConnection is stored in Azure Key Vault. You need to load the secret into the app's configuration at startup without hard-coding any credentials. Which code statement should you add?
builder.Configuration.AddEnvironmentVariables("DbConnection");
builder.Configuration.AddAzureKeyVault(new Uri(keyVaultUrl), new DefaultAzureCredential());
builder.Configuration.AddUserSecrets
(); builder.Configuration.AddJsonFile("Secrets.json", optional: false, reloadOnChange: true);
Answer Description
The Azure.Extensions.AspNetCore.Configuration.Secrets package provides the AddAzureKeyVault extension, which loads secrets directly into IConfiguration. Passing the vault URI and a DefaultAzureCredential instance allows the SDK to obtain a token through the app's system-assigned managed identity when running in Azure, so no credentials are embedded in code. User secrets, environment variables, and JSON files all require storing the connection string elsewhere and do not pull it from Key Vault automatically.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a system-assigned managed identity in Azure App Service?
How does DefaultAzureCredential work in Azure SDK?
What are Azure Key Vault secrets and why use them?
Your company stores container images in a private Azure Container Registry (ACR) named contosoreg. You need to run the image contosoreg.azurecr.io/reports:prod in Azure Container Instances (ACI) as a scheduled task. The security team forbids saving the registry username or password in deployment templates or scripts. Which approach allows ACI to pull the image while meeting the security requirement?
Move the image to a public Docker Hub repository and reference that URL in the deployment.
Assign a user-assigned managed identity to the container group and grant it the AcrPull role on contosoreg.
Configure contosoreg to allow anonymous pull access.
Enable the admin user on contosoreg and supply the registry credentials during container creation.
Answer Description
ACI can authenticate to a private Azure Container Registry with a managed identity. By assigning a user-assigned managed identity to the container group and granting that identity the built-in AcrPull role on the registry, ACI can obtain an access token at runtime without any credentials being stored in templates or scripts. Enabling the admin user or anonymous access exposes credentials or the registry, and moving the image to a public repository violates the requirement to keep the image in the private ACR.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a user-assigned managed identity?
What is the AcrPull role in Azure?
How does Azure Container Instances authenticate to Azure Container Registry using a managed identity?
You are building an Azure Function that runs on a timer trigger and produces a weekly CSV list of every guest user in the Microsoft Entra tenant. The function executes without any interactive user or front-end and must access Microsoft Graph with the least possible privileges to read the entire user collection. How should you configure authentication and authorization for the function?
Grant the delegated permission User.ReadWrite.All and have the function acquire tokens through the on-behalf-of flow when it starts.
Grant the application permission Directory.Read.All and acquire tokens by using the authorization code flow during the function's startup.
Register an app for the function, grant it the application permission User.Read.All, administer tenant consent, and acquire tokens with the client-credentials flow.
Grant the delegated permission User.Read to the app and retrieve tokens by using the authorization code flow with an Azure managed identity.
Answer Description
Because the function runs as a background (daemon) process, it must use the client-credentials flow to obtain an app-only access token-no delegated (user) context is available. The least-privileged Microsoft Graph scope that grants read access to the full set of user objects is the application permission User.Read.All. Directory.Read.All would also work but exposes additional directory data, so it is not the least-privileged choice. Delegated permissions or on-behalf-of flows require a signed-in user and are therefore unsuitable for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the client-credentials flow in Azure authentication?
What is the difference between application permissions and delegated permissions?
What is the purpose of the User.Read.All permission in Microsoft Graph?
You have an Azure Container Registry named contosoacrrg. The source code for a containerized .NET application resides in the public GitHub repository https://github.com/contoso/api. You need to build the container image in Azure and push it to the registry with tags v1 and latest, all in a single Azure CLI command from your local machine. Which command should you run?
az acr import --source https://github.com/contoso/api --name contosoacrrg --image api:v1 --tag latest
az acr build --registry contosoacrrg --image api:v1 --image api:latest https://github.com/contoso/api
az acr build contosoacrrg.azurecr.io/api:v1,latest https://github.com/contoso/api
docker build -t contosoacrrg.azurecr.io/api:v1,latest https://github.com/contoso/api && docker push contosoacrrg.azurecr.io/api
Answer Description
The az acr build command builds container images in Azure Container Registry Tasks and automatically pushes the resulting image to the specified registry. The --registry parameter targets the registry, while multiple --image parameters add the desired tags. Providing the GitHub repository URL as the final argument sets the build context. Other options are incorrect because they either use invalid syntax for az acr build, rely on a local docker build that would not push both tags in one step, or use az acr import, which pulls an already-built image rather than building from source.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Azure Container Registry (ACR)?
What is the purpose of the --image parameter in the az acr build command?
Why is az acr import not suitable for this scenario?
You are preparing to deploy a new web application to Azure App Service. The application will run a Linux-based container image and must reside in the East US2 region using the Basic (B1) pricing tier. Before creating the Web App in the Azure portal, which Azure resource must you provision to satisfy these requirements?
An Azure Container Registry in the East US2 region using the Basic SKU
An Azure Kubernetes Service (AKS) cluster with a Linux node pool in East US2
An App Service plan configured for Linux in the East US2 region on the Basic (B1) tier
A virtual network that contains a subnet delegated to an App Service Environment v3
Answer Description
A Web App cannot exist unless it is associated with an App Service plan that specifies the region, operating system, and pricing tier that will supply the underlying compute resources. Creating a Linux App Service plan in East US2 on the B1 tier fulfills these prerequisites. The other resources can be useful but are not mandatory for creating the Web App. An Azure Container Registry is only required if you need a private registry; the app can also pull from public registries. A virtual network with a delegated subnet is necessary only for an App Service Environment, which is not required in this scenario. An AKS cluster is unrelated to Azure App Service and would not host an App Service Web App.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an App Service plan in Azure?
How does an Azure Container Registry differ from public registries like Docker Hub?
When should you use an Azure Kubernetes Service (AKS) compared to Azure App Service?
You enable Application Insights using the default ASP.NET Core SDK for an API that calls both a SQL database and an external REST endpoint. You must determine how long each external call takes in order to identify slow dependencies. Which built-in Application Insights telemetry type should you query for this information?
Page view telemetry
Request telemetry
Performance counter telemetry
Dependency telemetry
Answer Description
Dependency telemetry is automatically captured by the ASP.NET Core Application Insights SDK and records each call made by the application to external components such as SQL databases, REST services, and queues. The telemetry includes the dependency name, target, success or failure, and the duration of the call, allowing you to analyze average or percentile latency. Request telemetry measures incoming HTTP requests to your API, not outbound calls. Page view telemetry is produced by JavaScript on client pages, and performance counter telemetry surfaces server resource metrics such as CPU or memory-neither provides the timing of outbound dependencies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Dependency Telemetry in Application Insights?
How does Dependency Telemetry differ from Request Telemetry?
Can I customize Dependency Telemetry in Application Insights?
Your Linux container image is stored in Azure Container Registry. The microservice must scale automatically from zero to 50 instances based on Azure Service Bus queue length, provide optional HTTPS ingress with managed TLS, and avoid managing Kubernetes or VMs. Which Azure service best meets these requirements?
Azure Kubernetes Service with the KEDA add-on
Azure App Service Web App for Containers
Azure Container Apps
Azure Container Instances
Answer Description
Azure Container Apps offers event-driven KEDA-based scaling that can react to Azure Service Bus queue length and can scale down to zero when there is no load. It also supplies built-in HTTP ingress with the ability to generate and renew managed TLS certificates. Because it is a fully managed serverless platform, you do not provision or operate any underlying VMs or Kubernetes control plane.
Azure Container Instances runs single or manually scaled groups of containers and has no native event-driven auto-scaling. Azure Kubernetes Service with the KEDA add-on can satisfy the scaling requirement, but you would still have to create and administer the Kubernetes cluster. App Service Web App for Containers supports HTTP ingress and autoscale, yet it cannot scale to zero and does not natively scale on queue length events.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is KEDA?
How does Azure Container Apps handle HTTPS ingress and TLS certificates?
What is Azure Service Bus and how does it integrate with Azure Container Apps?
Your build script runs in Azure Cloud Shell and must build a Docker image from the current directory and publish it to an existing Azure Container Registry named contosoacr. The solution must not require the Cloud Shell environment to have the Docker engine installed. Which Azure CLI command should you run?
az acr build --registry contosoacr --image web:v1 .
az acr import --name contosoacr --source . --image web:v1
docker build -t contosoacr.azurecr.io/web:v1 . && docker push contosoacr.azurecr.io/web:v1
az container create --registry-login-server contosoacr.azurecr.io --image web:v1 --file Dockerfile
Answer Description
The az acr build command submits the build context to the Azure Container Registry task service, which performs the Docker build and pushes the resulting image back to the registry. Because the build happens in Azure, Docker does not need to be installed in the local environment. The command must reference the target registry and provide the desired image name and tag. az acr import copies an existing image from another registry, not a local build context. Combining docker build and docker push requires the Docker engine to be available, which contradicts the requirements. az container create deploys a running container instance and does not build or publish an image.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Azure Container Registry (ACR)?
How does az acr build differ from docker build?
What is a Docker build context and why is it important?
Your team needs to monitor the public HTTPS endpoint of an ASP.NET Core API using Application Insights. The test must validate the SSL certificate, allow you to specify a custom HTTP header, and run from multiple Azure locations without writing any code. Which type of availability test should you configure?
Custom TrackAvailability test
Standard test
Multi-step web test
URL ping test
Answer Description
The Standard test is the only built-in Application Insights availability test that lets you configure advanced options such as SSL certificate validation and custom request headers while still being codeless. A URL ping test is limited to a simple GET operation with no header customization or certificate checks. A custom TrackAvailability test does support any logic you write, but it requires adding code to the application and therefore does not meet the "without writing code" requirement. A multi-step web test is deprecated for new resources and is no longer the recommended choice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key features of the Standard test in Application Insights?
How does a URL ping test differ from a Standard test?
Why is the Multi-step web test deprecated in Application Insights?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.