hardmultiple choiceObjective-mapped

An organization must retain Azure Key Vault audit data for 18 months, search the data in Log Analytics, and keep a second copy if the workspace retention policy is later shortened. The operations team already has an action group for notifications. What should be configured on the Key Vault?

Question 1hardmultiple choice
Full question →

An organization must retain Azure Key Vault audit data for 18 months, search the data in Log Analytics, and keep a second copy if the workspace retention policy is later shortened. The operations team already has an action group for notifications. What should be configured on the Key Vault?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Create an activity log alert and point it at the existing action group.

Activity log alerts detect subscription events, but they do not store resource-level audit data for long-term searching.

B

Best answer

Create a diagnostic setting that streams AuditEvent logs to Log Analytics and a storage account.

A diagnostic setting on the Key Vault can export resource logs to Log Analytics for querying and also to a storage account for durable retention. That meets both investigation and long-term preservation requirements. The action group can still be used separately for notifications, but it does not replace the log collection path. This is the only option that addresses both searchable telemetry and an independent retained copy.

C

Distractor review

Create a metric alert on the Key Vault and archive the alert history.

Metric alerts are useful for threshold-based monitoring, but they do not capture detailed audit events or provide retained raw log copies.

D

Distractor review

Enable only resource metrics and rely on workspace retention for compliance.

Metrics do not contain the audit details required for key vault investigations, and workspace retention alone provides no second copy.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Create a diagnostic setting that streams AuditEvent logs to Log Analytics and a storage account. — Diagnostic settings are the Azure Monitor feature that exports a resource's logs and supported metrics. In this scenario, the organization needs both searchable audit data in Log Analytics and a separate retained copy that survives workspace retention changes. Streaming the Key Vault AuditEvent category to Log Analytics and storage satisfies both needs. The action group is useful for notifications, but it does not collect or retain the telemetry itself. Why others are wrong: An activity log alert only watches subscription-level events and does not preserve the Key Vault's audit stream. Metric alerts can detect thresholds, but they do not contain the raw operations needed for forensic review. Enabling metrics alone is insufficient because metrics are aggregated signals, not detailed audit records, and they do not provide a second durable copy.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.