ITExambyte

Microsoft Azure AZ-104 Dumps Free

Created by itexambyte.com

Microsoft Azure Administrator AZ-104 Exam Dumps

DomainWeightage%
Manage Azure identities and governance20-25%
Implement and manage storage15-20%
Deploy and manage Azure compute resources20-25%
Implement and manage virtual networking15-20%
Monitor and maintain Azure resources10-15%

1 / 60

1. In your company's Azure infrastructure, there are two interconnected VNets: VNetA and VNetB, both peered with each other. Your objective is to guarantee that traffic from VNetA to VNetB consistently traverses through a network virtual appliance (NVA), while also having a mechanism to diagnose any potential connectivity problems. What steps should you consider to achieve these requirements effectively? (Select two)

2 / 60

2. You have an existing deployment managed with an Azure Resource Manager template. You're considering transitioning to Bicep for infrastructure as code. Which of the following steps should you take to accomplish this? (Choose two)

3 / 60

3. In your organization's strategy to bolster security measures, Azure Bastion has been chosen as the solution for accessing VMs securely, along with the setup of Azure PaaS services with heightened network security. What immediate advantage does the implementation of Azure Bastion offer in this particular context?

4 / 60

4. Which option can you use to manage governance across multiple Azure subscriptions?

5 / 60

5. Which storage solution replicates data to a secondary region, and maintains six copies of the data?

6 / 60

6. You've been asked to allow HTTP traffic to a Azure virtual machine (VM) from the internet. Which of the following rules in a Network Security Group (NSG) would accomplish this?

7 / 60

7. How can admins move the data in the existing storage account to the new storage account?

8 / 60

8. You are responsible for ensuring data resilience for a set of files hosted on an Azure file share. A user accidentally deleted a critical file, and you need to recover it. Which of the following would best facilitate file recovery?

9 / 60

9. As the overseer of Azure Blob Storage in your organization, you have specific requirements to fulfill:

  1. Automatically transfer infrequently accessed data to a more economical storage tier.
  2. Maintain old versions of blobs for a duration of up to 60 days.
  3. Enable the recovery of deleted objects for a period of 30 days.

Which of the following features of Azure Blob Storage would you configure to meet these requirements? (Choose three)

10 / 60

10. Your company has critical virtual machine workloads running on Azure. You're using Azure Backup and other Azure services to help protect your virtual machines.

A recent malware attack deleted several virtual machine backups. How long are backup items available in a soft delete state?

11 / 60

11. An Engineer is setting up a highly available e-commerce web application in Azure. He decide to use Azure App Service for hosting the application. Which of the following configurations will ensure that the application remains operational during regional outages and maintenance?

12 / 60

12. Which choice correctly describes Microsoft Entra ID?

13 / 60

13. How long are Azure Monitor activity logs kept?

14 / 60

14. When configuring an Azure Storage account, which of the following redundancy options are available? (Select two)

15 / 60

15. You need to deploy a set of virtual machines (VMs) to ensure high availability within an Azure region. Which Azure service should you use to ensure that your VMs are spread across multiple data centers within a region, providing redundancy to your application?

16 / 60

16. To analyze system updates across multiple virtual machines, which feature of Azure Monitor should you utilize?

17 / 60

17. What does Azure Advisor provide recommendations for?

18 / 60

18. Your organization uses Microsoft Entra ID for managing licenses. You are tasked with ensuring an external partner can access certain company resources without consuming a license and that an internal user gets an appropriate license. Which of the following actions should you take? (Choose two)

19 / 60

19. ou've been tasked with configuring a UDR (User-Defined Route) to direct traffic from a specific subnet within your virtual network through a Network Virtual Appliance. Among the following properties, which one is unnecessary to specify when establishing this UDR?

20 / 60

20. How does Azure Network Watcher support graphical visualizations for networks?

21 / 60

21. Suppose you have two video files stored as blobs. One of the videos is business-critical and requires a replication policy that creates multiple copies across geographically diverse datacenters. The other video is noncritical, and a local replication policy is sufficient. Which of the following options would satisfy both data diversity and cost sensitivity consideration.

22 / 60

22. Which feature in Azure Blob Storage is used to automate the transition of blobs to cooler storage tiers, archive blobs or delete blobs at the end of their lifecycles?

23 / 60

23. To satisfy the finance team's request for billing by department, multiple resource groups have been created and the resource tags applied. What's the next step?

24 / 60

24. Which of the following statements about Azure Virtual Network is correct?

25 / 60

25. What is the purpose of the 'AssignableScopes' permissions in a role definition?

26 / 60

26. You observed that one of your VMs behind an Azure Load Balancer isn't receiving any traffic. What should be your initial step to troubleshoot this issue?

27 / 60

27. Azure Disk Encryption uses which of the following to encrypt the OS and data disks of Azure virtual machines?

28 / 60

28. What's the best way to sync files stored on the manufacturing warehouse machines with the cloud?

29 / 60

29. Your company is implementing an Azure Virtual Network peering solution to enable connectivity between virtual networks. You're working on the plan to support shared access to gateways and resources, and to control internet communication. A few teams submitted questions and configuration requests for your input.

What approach enables peered virtual networks to share the gateway and get access to resources?

 

30 / 60

30. A DevOps Engineer is responsible for developing a containerized application workflow for a startup. He decide to use Azure to streamline deployment and scaling. Which of the following actions are critical to successfully deploy and scale a containerized application in Azure?

31 / 60

31. You have been asked to set up an Azure file share for a department in your organization. They require the ability to retain file changes and ensure deleted files can be restored for 14 days. What should you enable on the Azure file share?

32 / 60

32. You are trying to control the Azure expenditure for a specific department in your organization. Which of the following would allow you to be notified if the expenditure exceeds a predefined amount?

33 / 60

33. Which Azure Monitor feature can notify administrators in real time about critical application issues?

34 / 60

34. Azure Private DNS supports which of the following scenarios?

35 / 60

35. Your organization has several Azure virtual networks deployed across different regions. You need to ensure DNS resolution across these virtual networks, enabling communication between them using custom DNS domains. Which Azure DNS feature should you implement?

36 / 60

36. Your company has several departments. Each department has a number of virtual machines (VMs). The company has an Azure subscription that contains a resource group named RG1.
All VMs are located in RG1.
You want to associate each VM with its respective department.
What should you do?

37 / 60

37. What types of scaling can you use to increase the CPU capacity for your existing Virtual Machine Scale Sets instances?

38 / 60

38. Imagine you're working on a project that requires transferring data between your local file system and Azure Blob storage. Which specific tool would you use to seamlessly copy data back and forth between these two environments?

39 / 60

39. In your organization, adherence to stringent security protocols is paramount. You're tasked with generating a SAS token for a container within a storage account. Additionally, you must ensure that the SAS token's permissions can be adjusted without needing to regenerate the token if security requirements evolve. What approach or tool should you employ to meet these requirements effectively?

40 / 60

40. Which of the following tools can be used to create a custom virtual machine image for deployment in Azure?

41 / 60

41. Your organization has diverse requirements for the configuration of their virtual machines. You're responsible for designing a plan to fulfill the various requests.

For the security requirements, how can you connect to Azure Linux virtual machines and install software?

42 / 60

42. You are tasked with setting up logging for a group of virtual machines in Azure and want to be able to run queries against these logs. Which TWO actions should you perform?

43 / 60

43. You have successfully deployed resources using an ARM template. Now, you want to use the Bicep language to manage these resources in the future. What is the recommended way to transition from ARM to Bicep?

44 / 60

44. You have three virtual machines (VM1, VM2, VM3) in a resource group. A new admin is hired, and they need to be able to modify settings on VM3. They shouldn't be able to make changes to VM1 or VM2. How can you implement RBAC to minimize administrative overhead?

45 / 60

45. Which Microsoft Entra role enables a user to manage all groups in your Teams tenants, and also assign other admin roles?

46 / 60

46. You are troubleshooting connectivity issues between two virtual machines using Azure Network Watcher. Which tool within Network Watcher should you use to diagnose any communication problems between the virtual machines due to user-defined routing or security groups?

47 / 60

47. Which option preserves data residency, and offers comprehensive compliance and resiliency options?

48 / 60

48. What term defines a dedicated and trusted instance of Microsoft Entra ID?

49 / 60

49. What is the primary benefit of using Azure Container Registry (ACR) alongside AKS?

50 / 60

50. Which of the following options is a feature of Azure Container Instances?

51 / 60

51. You have deployed a new Azure virtual machine, but you cannot access its web service from the internet. What should be your initial step to ensure its accessibility?

52 / 60

52. The company financial controller wants to be notified whenever the company is half-way to spending the money allocated for cloud services. Which approach supports this request?

53 / 60

53. You have an application running on several VMs in Azure. You want to set up an alert in Azure Monitor to notify you when network latency goes above a certain threshold. Which Azure service would best serve this purpose?

54 / 60

54. Suppose an administrator needs to generate a report of the role assignments for the last week. Where in the Azure portal would they generate that report?

55 / 60

55. You are examining a Bicep file designed to deploy a virtual machine. You have observed that the file does not include a declaration to specify the size of the virtual machine. In order to ensure that the deployment uses a Standard_DS1_v2 size for the VM, which line should you insert into the Bicep file?

56 / 60

56. Picture yourself setting up a load balancer in your Azure environment. In the course of configuration, you're curious about the default distribution type for directing traffic through the load balancer. What distribution type would you encounter by default in this scenario?

57 / 60

57. What makes virtual machines a better choice over containers for your setup?

58 / 60

58. You are tasked with ensuring the confidentiality and security of data at rest within your Azure virtual machines. Which of the following actions will help you achieve this?

59 / 60

59. You are tasked with setting up notifications for your team whenever CPU usage exceeds 90% on any virtual machine for a duration of 10 minutes. Which of the following components in Azure Monitor would be crucial to achieve this?

60 / 60

60. Suppose an administrator in another department needs access to a virtual machine managed by your department. What's the best way to grant them access to just that resource?

Your score is

The average score is 21%

Exit

Scroll to Top