Common Traps on Which Command Should the Administrator Use Practice Questions
- ·Separate verification commands from configuration commands.
- ·Read whether the question asks to identify, verify, fix, permit or deny.
- ·Small command keywords often change the correct answer.
Sample Questions
Practice all 15 →You are deploying a containerized application to Azure Container Instances. The application requires a custom domain name and SSL/TLS termination. You need to configure these features. Which resource should you create alongside the container group?
Explanation: Azure Application Gateway provides layer-7 load balancing, SSL termination, and custom domain support. Azure Front Door is a global load balancer but not required for simple SSL termination. Azure Container Registry stores container images. Azure DNS only resolves names. Therefore, Application Gateway is the correct choice.
You are building a serverless application that needs to react to insertions and updates in an Azure Cosmos DB container. You want to process these changes using an Azure Function. Which trigger should you configure for the function?
Explanation: The Cosmos DB trigger binds to the change feed of a Cosmos DB container, allowing a function to react automatically to document changes. Blob trigger reacts to blob events, Event Grid for event notifications, and Service Bus for message processing.
You are using Azure API Management (APIM) to expose a REST API. The backend API requires mutual TLS (client certificate) for authentication. The client certificate is stored in Azure Key Vault. You need to configure APIM to use this certificate when calling the backend, without exposing the certificate contents in the policy files. Which APIM feature and policy should you use?
Explanation: APIM Named Values can reference secrets or certificates stored in Azure Key Vault. By creating a named value of type 'Key Vault' that points to the certificate, you can then use the authentication-certificate policy with that named value. APIM securely retrieves the certificate at runtime from Key Vault. This avoids hardcoding the certificate in policies.
A containerized booking backend deployed to Azure Container Apps must scale to zero when idle and scale out based on queue length. What should the developer configure?
Explanation: Container Apps uses KEDA-driven event scaling, including scale-to-zero patterns.
A containerized checkout API deployed to Azure Container Apps must scale to zero when idle and scale out based on queue length. What should the developer configure?
Explanation: Container Apps uses KEDA-driven event scaling, including scale-to-zero patterns.
+10 more scenario questions available
Practice all Which Command Should the Administrator Use Practice QuestionsRelated Topics
Frequently asked questions
How do "Which Command Should the Administrator Use Practice Questions" appear on the real AZ-204?
Practise command-choice questions where the task is to identify the correct verification, configuration or troubleshooting command. These appear throughout the AZ-204 and require you to apply your knowledge, not just recall facts.
How many scenario questions are on the AZ-204 exam?
Cisco doesn't publish an exact breakdown, but scenario-based questions (especially exhibit and command-output formats) make up a significant portion of the AZ-204. Practicing each scenario type ensures you're ready for any format.
Are these AZ-204 scenario practice questions free?
Yes — all scenario practice on Courseiva is completely free. Sign up for a free account to track your progress and see which scenario types you've mastered.
Ready to practice this scenario type?
Launch a full Which Command Should the Administrator Use Practice Questions session with instant scoring and detailed explanations.
Start Scenario Practice →