AZ-104 Practice test with complete solutions 100%
Correct Answers 2023
What major directory roles are available in Azure AD? (Choose 3 answers)
a. User
b. Global Administrator
c. Guest
d. Limited Administrator - ANSWER: User, Global Administrator, Limited
Administrator
Administrator and Guest are not Directory roles in Azure AD. User, Global
Administrator, and Limited Administrator are the three major Directory roles in
Azure AD. Limited Administrator can be broken out into various types of "sub-
administrators."
Which of the following statements is incorrect regarding a resource policy created
using Azure Policy?
a. Azure Policy scans Azure resources for noncompliance with defined resource
policies.
b. It applies to Azure resources, not Azure subscribers or users.
c. Once a policy is created, it applies to both new and existing resources.
d. Users can search through Azure policy with custom policy queries. - ANSWER: d.
Users can search through Azure policy with custom policy queries.
Azure Policy creates policies to define Azure resources only. Once a policy is created,
it applies to new, updated and existing resources. The service scans hourly to detect
noncompliance, but it does not support custom policy queries.
What does placing your virtual machines into an availability set accomplish regarding
failures or outages?
a. It limits the impact of potential physical hardware failures.
b. It prevents hardware failures.
c. It may limit the impact of network outages in the future..
d. It protects your application from failures, power outages or anything else. -
ANSWER: a. It limits the impact of potential physical hardware failures.
Placing two or more VMs in an availability set provides redundancy for them, and
limits the impact of potential physical hardware failures.
If you want to review detailed information about what incoming requests have been
allowed or denied by network security groups on a per-rule basis, what Network
Watcher service will best assist you?
,a. NSG Flow Logs
b. Diagnostic Logs
c. Network Performance Monitor
d. IP Flow Verify - ANSWER: a. NSG Flow Logs
Network security group (NSG) flow logs are a feature of Network Watcher that
allows you to view information about ingress and egress IP traffic through an NSG.
You are reviewing the specifications for a new solution, and it lists "a managed layer
7 load balancer. Which of the following services will be included in your design?
a. Azure Application Gateway
b. Azure Load Balancer
c. A custom virtual appliance
d. Azure Traffic Manager - ANSWER: a. Azure Application Gateway
The OSI model defines layer 7 as an application layer. That includes protocols such as
FTP, HTTP(S), STMP, etc.
Application Gateway is a layer 7 load balancer for HTTP(S) based traffic.
Application Gateway can make routing decisions based on additional attributes of an
HTTP request, for example URI path or host headers. For example, you can route
traffic based on the incoming URL. So if /images is in the incoming URL, you can
route traffic to a specific set of servers (known as a pool) configured for images. If
/video is in the URL, that traffic is routed to another pool that's optimized for videos.
You are investigating Azure Storage replication options to discover when you get the
read and write access to the remote replica. Which statement regarding read and
write access to Azure Storage replicas is correct?
a. No matter which replication option you've selected for your Azure Storage
account, you gain read and write access to the remote replica when you initiate
failover.
b. If you have configured RA-GRS replication for your Azure Storage account, you
always have read and write access to the Azure Storage account's replica.
c. No matter which replication option you've selected, once Azure fails over to the
account's remote sites, then you are granted write access to the replicated data.
d. If you have configured GRS or RA-GRS replication for your Azure Storage account,
you always have read and write access to the Azure Storage account's replica. -
ANSWER: c. No matter which replication option you've selected, once Azure fails
, over to the account's remote sites, then you are granted write access to the
replicated data.
With GRS and other replication options, only Microsoft can declare a disaster and
failover the remote sites, then you will get read and write access to data. Until then
you don't have access to the remote site's data for the read/write operations. You
only have access to the remote copy for read operations when using RA-GRS.
When deciding which redundancy option is best for your scenario, consider the
tradeoffs between lower costs and higher availability. The factors that help
determine which redundancy option you should choose include:
How your data is replicated in the primary region.
Whether your data is replicated to a second region that is geographically distant to
the primary region, to protect against regional disasters (geo-replication).
Whether your application requires read access to the replicated data in the
secondary region if the primary region becomes unavailable for any reason (geo-
replication with read access).
You would like to implement a hub-and-spoke VNet peering connection between
two of your virtual networks, VNet1 in the East US region and VNet2 in the East US-2
region, using a network virtual appliance (NVA).You have deployed VNet3 to serve as
the network hub, and a custom Linux virtual machine in VNet3 to serve as the
NVA.How should you configure the peering connections between the VNets with this
particular hub-and-spoke architecture?
a. Configure all peering connections to allow forwarded traffic.
b. Configure peering connections directed to the hub network (VNet3) to allow
gateway transit.
c. Configure peering connections directed to the spoke networks (VNet1 and VNet2)
to use remote gateways.
d. Configure peering connections directed to the hub network (VNet3) to use remote
gateways. Configure all other peering connections to allow gateway transit. -
ANSWER: a. Configure all peering connections to allow forwarded traffic.
If you require connectivity between spokes, consider deploying an Azure Firewall or
other network virtual appliance. Then create routes to forward traffic from the spoke
to the firewall or network virtual appliance, which can then route to the second
spoke. In this scenario, you must configure the peering connections to allow
forwarded traffic.
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller knoowy96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.