Microsoft Azure AZ-104 Dumps FreeBy itexambyte.com / 14 February 2024 Created by itexambyte.com Microsoft Azure Administrator AZ-104 Exam Dumps DomainWeightage%Manage Azure identities and governance20-25%Implement and manage storage15-20%Deploy and manage Azure compute resources20-25%Implement and manage virtual networking15-20%Monitor and maintain Azure resources10-15% 1 / 60 1. In your company's Azure infrastructure, there are two interconnected VNets: VNetA and VNetB, both peered with each other. Your objective is to guarantee that traffic from VNetA to VNetB consistently traverses through a network virtual appliance (NVA), while also having a mechanism to diagnose any potential connectivity problems. What steps should you consider to achieve these requirements effectively? (Select two) Set up a user-defined route in VNetA to point to the NVA for traffic destined to VNetB. Remove the peering and connect VNets using Azure VPN Gateway. Ensure both Nets have the same address space. Use Azure Network Watcher's IP flow verify to diagnose any connectivity issues. 2 / 60 2. You have an existing deployment managed with an Azure Resource Manager template. You're considering transitioning to Bicep for infrastructure as code. Which of the following steps should you take to accomplish this? (Choose two) Convert your ARM template to Bicep using bicep decompile "your-template. json" . Use Azure Storage Explorer to export the ARM template to Bicep Convert Bicep back to ARM using bicep build "your- template.bicep", if needed. Convert the Bicep file back to ARM using az bicep deconvert 3 / 60 3. In your organization's strategy to bolster security measures, Azure Bastion has been chosen as the solution for accessing VMs securely, along with the setup of Azure PaaS services with heightened network security. What immediate advantage does the implementation of Azure Bastion offer in this particular context? It provides DDoS protection for Azure services. It automatically sets up private endpoints for all PaaS services. It acts as a replacement for network security groups (NSGs). It allows direct RDP/SSH connectivity from your local machine to Azure VMs without exposing them to the public internet. 4 / 60 4. Which option can you use to manage governance across multiple Azure subscriptions? Azure initiatives Resource groups Management groups 5 / 60 5. Which storage solution replicates data to a secondary region, and maintains six copies of the data? Locally redundant storage Read-access geo-redundant storage Zone-redundant storage 6 / 60 6. You've been asked to allow HTTP traffic to a Azure virtual machine (VM) from the internet. Which of the following rules in a Network Security Group (NSG) would accomplish this? Source: VirtualNetwork | Destination: Any | Port Range: 80 | Action: Allow Source: Any | Destination: Any | Port Range: 80 | Action: Allow Source: Internet | Destination: VirtualNetwork | Port Range: 443 | Action: Allow Source: Any | Destination: VirtualNetwork | Port Range: 80 | Action: Deny 7 / 60 7. How can admins move the data in the existing storage account to the new storage account? Use the Azure portal Use the Robocopy command-line tool Use the AzCopy command-line tool 8 / 60 8. You are responsible for ensuring data resilience for a set of files hosted on an Azure file share. A user accidentally deleted a critical file, and you need to recover it. Which of the following would best facilitate file recovery? Soft delete on Azure Files Azure File share backup Azure Blob Storage versioning Snapshots on the Azure file share 9 / 60 9. As the overseer of Azure Blob Storage in your organization, you have specific requirements to fulfill:Automatically transfer infrequently accessed data to a more economical storage tier.Maintain old versions of blobs for a duration of up to 60 days.Enable the recovery of deleted objects for a period of 30 days.Which of the following features of Azure Blob Storage would you configure to meet these requirements? (Choose three) Soft Delete for blobs Blob versioning Blob lifecycle management policy Cool Storage Tier 10 / 60 10. Your company has critical virtual machine workloads running on Azure. You're using Azure Backup and other Azure services to help protect your virtual machines.A recent malware attack deleted several virtual machine backups. How long are backup items available in a soft delete state? 14 Days 7 Days 1 days 30 Days 11 / 60 11. An Engineer is setting up a highly available e-commerce web application in Azure. He decide to use Azure App Service for hosting the application. Which of the following configurations will ensure that the application remains operational during regional outages and maintenance? Deploy the App Service in a single region and enable Geo-Redundant backups. Deploy the App Service in a single region with multiple deployment slots. Deploy the app to multiple regions and use Azure Front Door for load balancing Use an Azure CDN in front of the App Service. 12 / 60 12. Which choice correctly describes Microsoft Entra ID? Microsoft Entra ID can be queried through LDAP. Microsoft Entra ID is primarily an identity solution. Microsoft Entra ID uses organizational units (OUs) and group policy objects (GPOs). 13 / 60 13. How long are Azure Monitor activity logs kept? 120 Days 7 Days 30 Days 90 Days 14 / 60 14. When configuring an Azure Storage account, which of the following redundancy options are available? (Select two) Object-level redundancy (OLR) Remote Redundancy Storage (RRS) Geo-Zone-Redundant Storage (GZRS Local Redundancy Storage (LRS) 15 / 60 15. You need to deploy a set of virtual machines (VMs) to ensure high availability within an Azure region. Which Azure service should you use to ensure that your VMs are spread across multiple data centers within a region, providing redundancy to your application? Azure Availability Zones Azure Virtual Machine Scale Sets Azure Update Domains Azure Affinity Groups 16 / 60 16. To analyze system updates across multiple virtual machines, which feature of Azure Monitor should you utilize? Metrics Log Analytics Insight Alert 17 / 60 17. What does Azure Advisor provide recommendations for? cost savings best practice to write code high availability performance Azure region selection 18 / 60 18. Your organization uses Microsoft Entra ID for managing licenses. You are tasked with ensuring an external partner can access certain company resources without consuming a license and that an internal user gets an appropriate license. Which of the following actions should you take? (Choose two) Assign a Guest account to the external partner. Add the external partner as a member in Entra ID. Provide the internal user with a (direct) license assignment. Assign an Azure Blob Storage permission to the internal user. 19 / 60 19. ou've been tasked with configuring a UDR (User-Defined Route) to direct traffic from a specific subnet within your virtual network through a Network Virtual Appliance. Among the following properties, which one is unnecessary to specify when establishing this UDR? Address Prefix Next Hop Type Destination Port Range Destination Port Range 20 / 60 20. How does Azure Network Watcher support graphical visualizations for networks? Next hop Topology tool Views 21 / 60 21. Suppose you have two video files stored as blobs. One of the videos is business-critical and requires a replication policy that creates multiple copies across geographically diverse datacenters. The other video is noncritical, and a local replication policy is sufficient. Which of the following options would satisfy both data diversity and cost sensitivity consideration. Create a single storage account that makes use of Local-redundant storage (LRS) and host both videos from here. Create a single storage account that makes use of Geo-redundant storage (GRS) and host both videos from here. Create two storage accounts. The first account makes use of Geo-redundant storage (GRS) and hosts the business-critical video content. The second account makes use of Local-redundant storage (LRS) and hosts the noncritical video content. 22 / 60 22. Which feature in Azure Blob Storage is used to automate the transition of blobs to cooler storage tiers, archive blobs or delete blobs at the end of their lifecycles? Blob Lifecycle Management Blob Versioning Blob Compactor Blob Freezer 23 / 60 23. To satisfy the finance team's request for billing by department, multiple resource groups have been created and the resource tags applied. What's the next step? Create an Azure policy Create a management group Review the Azure Policy compliance page 24 / 60 24. Which of the following statements about Azure Virtual Network is correct? Outbound communication with the internet must be configured for each resource on the virtual network. Azure Virtual Network enables communication between Azure resources. Azure virtual networks can't be configured to communicate with on-premises resources. 25 / 60 25. What is the purpose of the 'AssignableScopes' permissions in a role definition? Specifies the actions that aren't allowed Specifies the actions that are allowed Specifies the scopes where a role definition can be assigned 26 / 60 26. You observed that one of your VMs behind an Azure Load Balancer isn't receiving any traffic. What should be your initial step to troubleshoot this issue? Verify that the VM's firewall allows inbound traffic on the required ports. Register the VM's IP address in Azure DNS. Check if the VM has a public IP address assigned. Ensure that the VM is running the latest version of Azure CLI. 27 / 60 27. Azure Disk Encryption uses which of the following to encrypt the OS and data disks of Azure virtual machines? BitLocker Azure Key Vault Entra ID Azure Policy 28 / 60 28. What's the best way to sync files stored on the manufacturing warehouse machines with the cloud? Create an Azure file share and directly mount shares on the machines in the warehouse. Use a machine in the warehouse to host a file share, install Azure File Sync, and share a drive with the rest of the warehouse. Install Azure File Sync on every machine in the warehouse and also in the main office. 29 / 60 29. Your company is implementing an Azure Virtual Network peering solution to enable connectivity between virtual networks. You're working on the plan to support shared access to gateways and resources, and to control internet communication. A few teams submitted questions and configuration requests for your input.What approach enables peered virtual networks to share the gateway and get access to resources? Point-to-site connectivity Gateway transit Transitivity 30 / 60 30. A DevOps Engineer is responsible for developing a containerized application workflow for a startup. He decide to use Azure to streamline deployment and scaling. Which of the following actions are critical to successfully deploy and scale a containerized application in Azure? Create an Azure Container Registry and store the Docker images. Deploy the container using Azure Container Services for orchestration. Provision the application using Azure Container Instances for rapid elasticity. Enable auto-scaling and customize scaling rules in Azure Container Apps. 31 / 60 31. You have been asked to set up an Azure file share for a department in your organization. They require the ability to retain file changes and ensure deleted files can be restored for 14 days. What should you enable on the Azure file share? storage tiering Blob Lifecycle Management blob versioning soft delete 32 / 60 32. You are trying to control the Azure expenditure for a specific department in your organization. Which of the following would allow you to be notified if the expenditure exceeds a predefined amount? Azure Management Group Azure Lock Azure resource Policy Alert 33 / 60 33. Which Azure Monitor feature can notify administrators in real time about critical application issues? Azure Monitor activity logs Alert teams Action groups 34 / 60 34. Azure Private DNS supports which of the following scenarios? Organizations manage and resolve domain names in a virtual network by adding a custom DNS solution. Organizations manage domain names in other organizations. Organizations manage and resolve domain names in a virtual network without adding a custom DNS solution. 35 / 60 35. Your organization has several Azure virtual networks deployed across different regions. You need to ensure DNS resolution across these virtual networks, enabling communication between them using custom DNS domains. Which Azure DNS feature should you implement? Azure DNS Public Zones Azure Traffic Manager Azure DNS Private Zones Azure Front Door 36 / 60 36. Your company has several departments. Each department has a number of virtual machines (VMs). The company has an Azure subscription that contains a resource group named RG1.All VMs are located in RG1.You want to associate each VM with its respective department.What should you do? Create Azure Management Groups for each department. Create a resource group for each department. Assign tags to the virtual machines. Modify the settings of the virtual machines. 37 / 60 37. What types of scaling can you use to increase the CPU capacity for your existing Virtual Machine Scale Sets instances? Horizontal scaling Auto Scaling Vertical scaling Load balancing 38 / 60 38. Imagine you're working on a project that requires transferring data between your local file system and Azure Blob storage. Which specific tool would you use to seamlessly copy data back and forth between these two environments? AzCopy Azure Blob Manager Azure Keyvault Azure Storage Explorer 39 / 60 39. In your organization, adherence to stringent security protocols is paramount. You're tasked with generating a SAS token for a container within a storage account. Additionally, you must ensure that the SAS token's permissions can be adjusted without needing to regenerate the token if security requirements evolve. What approach or tool should you employ to meet these requirements effectively? Generate an account-level SAS without any stored access policy. Generate a service-level SAS linked to a stored access policy. Generate an account-level SAS and link it to a role-based access control (RBAC) policy. Use managed identity to access the container. 40 / 60 40. Which of the following tools can be used to create a custom virtual machine image for deployment in Azure? Azure CLI Azure Portal Azure Image Builder Azure PowerShell 41 / 60 41. Your organization has diverse requirements for the configuration of their virtual machines. You're responsible for designing a plan to fulfill the various requests.For the security requirements, how can you connect to Azure Linux virtual machines and install software? Configure a guest configuration on the virtual machine. Configure Azure Bastion. Create a custom script extension. 42 / 60 42. You are tasked with setting up logging for a group of virtual machines in Azure and want to be able to run queries against these logs. Which TWO actions should you perform? Configure Storage Account metrics Enable Diagnostic Settings and send to Log Analytics Install the Log Analytics agent on the VMs Use Azure Network Watcher logs 43 / 60 43. You have successfully deployed resources using an ARM template. Now, you want to use the Bicep language to manage these resources in the future. What is the recommended way to transition from ARM to Bicep? Convert the ARM template into a binary file. Export the deployment as a Bicep file using Azure CLI. Manually rewrite the ARM template in Bicep syntax. Use the bicep decompile command to convert the ARM template to a Bicep file. 44 / 60 44. You have three virtual machines (VM1, VM2, VM3) in a resource group. A new admin is hired, and they need to be able to modify settings on VM3. They shouldn't be able to make changes to VM1 or VM2. How can you implement RBAC to minimize administrative overhead? Assign the admin to the Contributor role on the resource group. Assign the admin to the Contributor role on VM3. Move VM3 to a new resource group, and then assign the admin to the Owner role on VM3. 45 / 60 45. Which Microsoft Entra role enables a user to manage all groups in your Teams tenants, and also assign other admin roles? Global administrator Security administrator User administrator 46 / 60 46. You are troubleshooting connectivity issues between two virtual machines using Azure Network Watcher. Which tool within Network Watcher should you use to diagnose any communication problems between the virtual machines due to user-defined routing or security groups? IP Flow Verify Network Performance Monitor Connection Troubleshoot Packet Capture 47 / 60 47. Which option preserves data residency, and offers comprehensive compliance and resiliency options? Microsoft Entra account Subscriptions Regions 48 / 60 48. What term defines a dedicated and trusted instance of Microsoft Entra ID? Azure tenant Identity Microsoft Entra account 49 / 60 49. What is the primary benefit of using Azure Container Registry (ACR) alongside AKS? ACR provides built-in monitoring and logging capabilities for AKS clusters. ACR allows for seamless integration with on-premises Kubernetes clusters. ACR offers secure storage and management of container images used by AKS. CR enables automatic scaling of AKS clusters based on resource utilization. 50 / 60 50. Which of the following options is a feature of Azure Container Instances? Container Instances require several minutes to load. Billing for Container Instances occurs when containers are in use. Container Instances use Azure Blob Storage for retrieve and persist state. 51 / 60 51. You have deployed a new Azure virtual machine, but you cannot access its web service from the internet. What should be your initial step to ensure its accessibility? Configure a user-defined route for the virtual machine. Assign a public IP address to the virtual machine. Enable virtual network peering for the associated subnet. Ensure the virtual network's firewall is disabled. 52 / 60 52. The company financial controller wants to be notified whenever the company is half-way to spending the money allocated for cloud services. Which approach supports this request? Create an Azure reservation. Create a budget and a spending threshold. Create a management group. 53 / 60 53. You have an application running on several VMs in Azure. You want to set up an alert in Azure Monitor to notify you when network latency goes above a certain threshold. Which Azure service would best serve this purpose? Azure Metrics Explorer Azure Log Analytics Connection Monitor Azure Service Health 54 / 60 54. Suppose an administrator needs to generate a report of the role assignments for the last week. Where in the Azure portal would they generate that report? Search for Activity log and filter on the Create role assignment (roleAssignments) operation. At the appropriate scope, go to Access control (IAM) > Download role assignments. At the appropriate scope, go to Access control (IAM) > Role assignments. 55 / 60 55. You are examining a Bicep file designed to deploy a virtual machine. You have observed that the file does not include a declaration to specify the size of the virtual machine. In order to ensure that the deployment uses a Standard_DS1_v2 size for the VM, which line should you insert into the Bicep file? vmSize: 'Standard_DS1_v2' properties size: 'Standard_DS1_v2' sku: 'Standard_DS1_v2' vm_sku: 'Standard_DS1_v2' 56 / 60 56. Picture yourself setting up a load balancer in your Azure environment. In the course of configuration, you're curious about the default distribution type for directing traffic through the load balancer. What distribution type would you encounter by default in this scenario? Five-tuple hash One-tuple hash Three-tuple hash Four-tuple hash 57 / 60 57. What makes virtual machines a better choice over containers for your setup? Virtual machines run the user mode portion of an operating system and can be tailored to contain just the needed services for your app. Virtual machines provide complete isolation from the host operating system and other virtual machines. Virtual machines use Azure Disks for local storage for a single node. 58 / 60 58. You are tasked with ensuring the confidentiality and security of data at rest within your Azure virtual machines. Which of the following actions will help you achieve this? Encrypt VM OS and data disks using Azure Disk Encryption. Convert unmanaged disks to managed disks. Enable Azure Defender for the virtual machines. Store VM disks in Azure Blob Storage with a private access level. 59 / 60 59. You are tasked with setting up notifications for your team whenever CPU usage exceeds 90% on any virtual machine for a duration of 10 minutes. Which of the following components in Azure Monitor would be crucial to achieve this? An alert rule An action group A metric A connection monitor 60 / 60 60. Suppose an administrator in another department needs access to a virtual machine managed by your department. What's the best way to grant them access to just that resource? At the resource scope, create a role for them with the appropriate access. At the resource group scope, assign the role with the appropriate access. At the resource scope, assign the role with the appropriate access. Your score is The average score is 21% LinkedIn Facebook Twitter Restart quiz Exit