Question 313 of 324
mediummultiple choiceObjective-mapped

AZ-204 Practice Question: Key Vault RBAC vs access policies for multi-team…

This AZ-204 practice question tests your understanding of key vault rbac vs access policies for multi-team…. The scenario asks you to isolate a root cause — eliminate options that address a different problem before choosing. A key principle to apply: key Vault RBAC. Once you have made your selection, read the full explanation to reinforce the concept and understand why each distractor is designed to mislead on exam day.

Multiple teams need different levels of access to the same Azure Key Vault: the DevOps team needs to create and rotate secrets, the application team needs read-only secret access, and the auditing team needs list-only access. The security team wants audit logs of all access decisions and the ability to manage permissions through a single system. What access model should the developer recommend?

Question 1mediummultiple choice
Full question →

Multiple teams need different levels of access to the same Azure Key Vault: the DevOps team needs to create and rotate secrets, the application team needs read-only secret access, and the auditing team needs list-only access. The security team wants audit logs of all access decisions and the ability to manage permissions through a single system. What access model should the developer recommend?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Issue shared access signatures for each team scoped to the operations they need

Key Vault does not support SAS tokens. SAS is a feature of Azure Storage. Key Vault access is controlled exclusively through Azure AD identity-based permissions — access policies or RBAC.

B

Best answer

Use Azure RBAC for Key Vault with role assignments scoped per team: Key Vault Secrets Officer for DevOps, Key Vault Secrets User for the app team, and Key Vault Reader for auditing

RBAC assignments are integrated with Azure's identity and access management plane. All access decisions are logged in Azure Activity Log, fulfilling the audit requirement. Roles can be assigned at vault scope or narrower scopes. RBAC policies are managed centrally in Azure IAM, consistent with how all other Azure resources are governed.

C

Distractor review

Create separate access policies for each team with the minimum required permissions

Access policies are a flat list at the vault level. They cannot be scoped to individual secrets. All policy assignments apply to the entire vault. Access policies are not integrated into Azure Activity Log as a unified RBAC audit trail — they have their own, separate logging mechanism.

D

Distractor review

Create a separate Key Vault per team to enforce isolation between access levels

Using separate vaults for access isolation multiplies management overhead (key rotation, backup, monitoring, cost) without providing the per-operation granularity that RBAC roles offer within a single vault.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

Treat this as a scenario question. Identify the problem, the constraint, and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Key Vault RBAC
  • Key Vault access policies
  • least privilege
  • centralized access management

TExam Day Tips

  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Key takeaway

Key Vault RBAC

Related practice questions

Related AZ-204 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

Question 1

An application stores customer invoices in Azure Blob Storage. Deleted blobs must be recoverable for 14 days. What should be enabled?

Question 2

You are deploying a containerized application to Azure Container Instances. The application requires a custom domain name and SSL/TLS termination. You need to configure these features. Which resource should you create alongside the container group?

Question 3

A developer needs to run a Kusto query against application request data to identify 95th percentile latency by operation. Where should the query be run? The architecture review board prefers a managed AWS-native control.

Question 4

You are developing a web app that authenticates users via Microsoft Entra ID. The app needs to read the user's profile and send emails on their behalf. You want to minimize user consent prompts. Which OAuth 2.0 grant type should you use?

Question 5

You are developing an Azure Function that processes messages from an Azure Service Bus queue. The function uses a Service Bus queue trigger and runs on a Consumption Plan. The queue receives a high volume of messages in bursts. You need to ensure that the function scales out to handle the load but does not exceed 10 concurrent instances. Which configuration should you apply?

Question 6

You are monitoring an Azure App Service using Application Insights. You notice that the server response time is high for certain requests. You need to drill down to see which external dependencies (like databases or APIs) are causing the delay. Which Application Insights feature should you use?

Practice this exam

Start a free AZ-204 practice session

Short sessions build daily habit. Longer sessions build exam-day stamina. Try a timed session to simulate real conditions.

FAQ

Questions learners often ask

What does this AZ-204 question test?

Key Vault RBAC

What is the correct answer to this question?

The correct answer is: Use Azure RBAC for Key Vault with role assignments scoped per team: Key Vault Secrets Officer for DevOps, Key Vault Secrets User for the app team, and Key Vault Reader for auditing — Azure RBAC for Key Vault uses built-in roles (Key Vault Administrator, Key Vault Secrets Officer, Key Vault Secrets User, Key Vault Reader) assigned at the vault or individual object scope. RBAC assignments are recorded in Azure Activity Logs alongside all other Azure RBAC decisions, providing a single audit trail. Access policies, the legacy model, are vault-level and cannot be scoped to individual secrets. RBAC is the recommended model for fine-grained, auditable, multi-team access.

What should I do if I get this AZ-204 question wrong?

Review key Vault RBAC, then practise related AZ-204 questions on the same topic to reinforce the concept.

About these practice questions

Courseiva creates original exam-style practice questions with explanations and wrong-answer analysis. It does not publish real exam questions, exam dumps, or protected exam content. Learn why practice questions differ from exam dumps →

How Courseiva writes practice questions · Editorial policy

Discussion

Loading comments…

Sign in to join the discussion.

This AZ-204 practice question is part of Courseiva's free Microsoft certification practice question bank. Courseiva provides original exam-style practice questions with explanations, topic-based practice, mock exams, readiness tracking, and study analytics to help learners prepare for the AZ-204 exam.