mediummultiple choiceObjective-mapped

Exhibit

Current workspace settings:
Workspace: law-prod
Retention: 14 days
Connected sources: VM guest logs, App Service logs
Subscription Activity log export: Not configured
Incident note: A user deleted a storage account yesterday, but the team could not search for the deletion event after two weeks.

Based on the exhibit, the support team needs a searchable 90-day history of who deleted Azure resources and when. The current workspace only contains VM guest logs. Which configuration should you add?

Question 1mediummultiple choice
Full question →

Based on the exhibit, the support team needs a searchable 90-day history of who deleted Azure resources and when. The current workspace only contains VM guest logs. Which configuration should you add?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Enable guest-level diagnostics on each VM so deletion events are captured.

Guest diagnostics only collect events from inside the operating system. They do not capture subscription-level control-plane actions such as deleting Azure resources.

B

Best answer

Configure a diagnostic setting at the subscription scope to send the Azure Activity log to Log Analytics and retain it for 90 days.

The Azure Activity log records control-plane actions like deletes, updates, and role assignments. Exporting it from the subscription to Log Analytics makes those events searchable, and increasing retention gives the team the required 90-day history.

C

Distractor review

Turn on NSG flow logs for all subnets to capture resource deletions.

NSG flow logs show network traffic patterns. They do not record who deleted a resource or what management action was taken.

D

Distractor review

Store VM backups in the vault and use restore points as an audit trail.

Backups help recover workloads, but they are not an audit source for who performed management operations. Restore points cannot replace the Activity log for investigating deletes.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Configure a diagnostic setting at the subscription scope to send the Azure Activity log to Log Analytics and retain it for 90 days. — To investigate who deleted Azure resources, you need the subscription-level Activity log, because it records management-plane actions and the caller associated with them. A diagnostic setting can export that log to a Log Analytics workspace so the events become searchable. Since the current retention is only 14 days, extending retention to 90 days ensures the team can keep and query deletion history long enough for investigations. Why others are wrong: Guest diagnostics, NSG flow logs, and backup restore points do not record control-plane deletions. They are useful for OS events, network traffic, or recovery, but none provide an audit trail for subscription management actions. The requirement is specifically about who deleted Azure resources, so the Activity log is the correct data source.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.