hardmulti selectObjective-mapped

A bootstrap script must install software on three VMs, then download configuration files from Blob Storage. Security forbids secrets in templates or scripts, and the same authentication method must work after the VMs are rebuilt. Which two choices should you make? Select two.

Question 1hardmulti select
Full question →

A bootstrap script must install software on three VMs, then download configuration files from Blob Storage. Security forbids secrets in templates or scripts, and the same authentication method must work after the VMs are rebuilt. Which two choices should you make? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Assign a user-assigned managed identity and attach it to each VM.

A user-assigned managed identity can be reused across multiple VMs and survives VM rebuilds because it is a separate Azure resource. That makes it ideal when the same identity must work for several machines over time.

B

Distractor review

Store the storage account access key in a script variable.

Embedding an access key in a script variable still leaves a secret inside automation content. That violates the security requirement and creates a high-risk credential-management problem.

C

Best answer

Use a Custom Script Extension to run the bootstrap commands at provisioning.

A Custom Script Extension is an appropriate way to run first-boot installation steps without putting secrets directly in the image or template. It lets Azure execute the bootstrap logic on the VM during provisioning.

D

Distractor review

Create a separate local administrator account for the script to use.

A local administrator account does not solve secret storage, and it does not provide a reusable Azure authentication mechanism for Blob Storage. It also increases operational overhead and credential exposure.

E

Distractor review

Embed a SAS token directly in the Bicep parameters file.

A SAS token is still a secret, and placing it in a parameters file exposes it to anyone who can read the deployment artifact. That conflicts with the requirement to avoid secrets in templates and scripts.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Assign a user-assigned managed identity and attach it to each VM. — The right design is to authenticate the VMs with a user-assigned managed identity and to use a VM extension to run the installation logic. The identity gives the script a secretless way to reach Azure Storage, and the extension automates the bootstrap process during provisioning. Because the identity is separate from the VM, it can be reused after rebuilds and across multiple machines. Why others are wrong: Storing account keys or SAS tokens in scripts or parameter files still places secrets in automation content, which the scenario forbids. A local admin account is not an Azure authentication method and does not solve the Blob access problem. The combination of a reusable managed identity and an extension is what removes secrets from the workflow.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.