mediummultiple choiceObjective-mapped

Exhibit

Activity log export
-------------------
Category: Administrative
Destination: law-ops

KQL draft
---------
AzureActivity
| where OperationNameValue == "Microsoft.Resources/subscriptions/resourcegroups/delete"
| where Caller != "auto-remediate@contoso.com"

Requirement
-----------
Alert on resource group deletion events except when Caller is the automation account

Based on the exhibit, a subscription activity log is already being sent to Log Analytics. The operations team wants an alert that fires when any resource group is deleted, but it should ignore deletions performed by a known automation account. Which approach should the administrator use?

Question 1mediummultiple choice
Full question →

Based on the exhibit, a subscription activity log is already being sent to Log Analytics. The operations team wants an alert that fires when any resource group is deleted, but it should ignore deletions performed by a known automation account. Which approach should the administrator use?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Create a metric alert on CPU percentage for the subscription.

CPU metrics do not describe administrative deletions. The requirement is based on activity logs, not platform performance.

B

Best answer

Create a log alert using the AzureActivity table and filter out the automation caller.

The deletion event is captured in the AzureActivity table, and the alert should evaluate a KQL query that excludes the known automation account. That provides precise log-based alerting for administrative operations.

C

Distractor review

Enable a diagnostic setting on the resource group object.

Resource groups do not use diagnostic settings in the same way as platform resources. The event already exists in the activity log export.

D

Distractor review

Apply an Azure Policy deny assignment to all deletions.

Policy can restrict resource creation or configuration, but it does not analyze historical log entries or create alerts from them.

Common exam trap

Common exam trap: ACLs stop at the first match

ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.

Technical deep dive

How to think about this question

ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.

KKey Concepts to Remember

  • Standard ACLs match source addresses.
  • Extended ACLs can match source, destination, protocol and ports.
  • The first matching ACL entry is used.
  • There is usually an implicit deny at the end.

TExam Day Tips

  • Check inbound versus outbound direction.
  • Read the ACL from top to bottom.
  • Look for a broader permit or deny above the intended line.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

Standard ACLs match source addresses.

What is the correct answer to this question?

The correct answer is: Create a log alert using the AzureActivity table and filter out the automation caller. — Resource group deletion is an administrative event that appears in AzureActivity. Because the team already exports activity logs to Log Analytics, the right solution is a log alert built from a KQL query. The query can filter on the delete operation and exclude events where the caller is the trusted automation account, ensuring the alert is both accurate and actionable. Why others are wrong: A CPU metric alert is unrelated to administrative changes. Diagnostic settings are not the issue because the activity log is already being collected. Azure Policy governs compliance and deployment behavior, but it does not replace log-based detection of past events.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.