mediummultiple choiceObjective-mapped

A team can already deploy virtual machines, but they want to prevent users from creating VMs unless the deployment includes an approved tag. They also want to see which existing resources do not meet the rule. What should the administrator use?

Question 1mediummultiple choice
Full question →

A team can already deploy virtual machines, but they want to prevent users from creating VMs unless the deployment includes an approved tag. They also want to see which existing resources do not meet the rule. What should the administrator use?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

A custom RBAC role that removes the create action for virtual machines.

RBAC can block creation, but it cannot evaluate whether a deployment includes the required tag.

B

Best answer

An Azure Policy assignment with a deny or audit effect for the tag requirement.

Azure Policy is the correct control because the requirement is about resource compliance, not user authorization. A policy can deny deployments that do not include the approved tag and can also audit existing resources to show which ones are noncompliant. That separates governance enforcement from RBAC, which only decides who is allowed to perform actions in Azure.

C

Distractor review

A resource lock on the resource group.

A lock does not check whether the correct tag is present and would not provide compliance reporting.

D

Distractor review

An Entra ID dynamic group for the VM creators.

Group membership helps manage access, but it does not enforce deployment rules or resource tagging.

Common exam trap

Common exam trap: ACLs stop at the first match

ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.

Technical deep dive

How to think about this question

ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.

KKey Concepts to Remember

  • Standard ACLs match source addresses.
  • Extended ACLs can match source, destination, protocol and ports.
  • The first matching ACL entry is used.
  • There is usually an implicit deny at the end.

TExam Day Tips

  • Check inbound versus outbound direction.
  • Read the ACL from top to bottom.
  • Look for a broader permit or deny above the intended line.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

Standard ACLs match source addresses.

What is the correct answer to this question?

The correct answer is: An Azure Policy assignment with a deny or audit effect for the tag requirement. — The requirement is governance-focused, not permission-focused. Azure Policy can deny noncompliant deployments so new VMs must include the approved tag, and it can audit existing resources to show which ones are already out of compliance. RBAC cannot inspect resource properties during deployment, so it is not the right control for this problem. Why others are wrong: A custom RBAC role can restrict actions, but it cannot enforce tag presence or evaluate the configuration of the deployed resource. Resource locks are for preventing certain management operations, not for policy-based compliance. Entra ID groups are useful for access management, but they do not enforce deployment standards.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.