mediummulti selectObjective-mapped

The service desk needs to add and remove users from a support group that grants access to an internal application, but the service desk must not receive Azure subscription permissions. Which two actions should you take? Select two.

Question 1mediummulti select
Full question →

The service desk needs to add and remove users from a support group that grants access to an internal application, but the service desk must not receive Azure subscription permissions. Which two actions should you take? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Create a security group in Microsoft Entra ID for the application access.

Security groups are the standard Entra ID container for access management. They let you grant permissions once and control membership centrally, which is ideal for a support team that will add and remove users often.

B

Best answer

Add the service desk staff as owners of that group.

Group owners can manage membership without receiving Azure resource permissions. This delegates the membership task cleanly while keeping the service desk out of subscription-level RBAC assignments.

C

Distractor review

Assign the service desk staff Contributor on the subscription.

Contributor would grant broad Azure resource management permissions far beyond group administration. It does not address the requirement to manage only the group membership.

D

Distractor review

Convert the service desk staff into guest users in the tenant.

Guest status changes the account type but does not automatically grant safe delegation for group administration. It also adds unnecessary identity complexity for an internal support task.

E

Distractor review

Add the service desk staff as members only, without ownership.

Members can use the access granted by the group, but they cannot manage membership unless they are owners. That does not satisfy the delegation requirement.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: Create a security group in Microsoft Entra ID for the application access. — A security group gives you a central place to control application access, and assigning service desk staff as owners lets them manage membership without any Azure subscription permissions. This is the least-privilege approach for delegated access administration in Microsoft Entra ID. It keeps access changes focused on identity management rather than Azure resource management. Why others are wrong: Contributor on the subscription is far too broad for a simple membership task. Guest accounts are not a delegation mechanism, and membership alone does not allow user management. The requirement is to delegate control of the group, not to expand Azure RBAC or change account types.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.