A company has a single Azure subscription that contains multiple resource groups for different departments. The security team needs to ensure that only members of the 'VM Operators' Azure Active Directory group can create virtual machines in the subscription. All other users, including subscription Owners, must be blocked from creating virtual machines. Which Azure feature should the security team use to enforce this requirement?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
Azure Policy with a deny effect
Incorrect. Azure Policy with a deny effect can block resource creation based on resource properties (e.g., resource type, location, tags) but not based on the identity of the user performing the action. Policy does not inspect the user's group membership; it evaluates the resource properties at creation time.
Best answer
Azure role-based access control (RBAC)
Correct. RBAC enables granular access management by assigning roles that include specific permissions (such as Microsoft.Compute/virtualMachines/write) to users or groups. By ensuring only the 'VM Operators' group has a role that allows creating VMs, and by using a deny assignment to block all others, the security team can enforce the requirement.
Distractor review
Azure Resource Lock at the subscription level
Incorrect. A resource lock prevents resources from being deleted or modified, but it does not block the creation of new resources. Additionally, locks affect all users equally and cannot be scoped to specific user groups.
Distractor review
Azure Blueprints
Incorrect. Azure Blueprints is used to define and deploy a repeatable set of Azure resources and policies (e.g., ARM templates, RBAC assignments, policy assignments) for creating consistent environments. It does not enforce runtime permissions after deployment; it can assign RBAC roles, but the enforcement of who can create VMs is done by RBAC itself, not by Blueprints.
Common exam trap
Common exam trap: ACLs stop at the first match
ACLs are processed top to bottom. The first matching entry wins, and an implicit deny usually exists at the end.
Technical deep dive
How to think about this question
ACL questions test precision: source, destination, protocol, port and direction. A generally correct ACL can still fail if it is applied on the wrong interface or in the wrong direction.
KKey Concepts to Remember
- Standard ACLs match source addresses.
- Extended ACLs can match source, destination, protocol and ports.
- The first matching ACL entry is used.
- There is usually an implicit deny at the end.
TExam Day Tips
- Check inbound versus outbound direction.
- Read the ACL from top to bottom.
- Look for a broader permit or deny above the intended line.
Related practice questions
Related AZ-900 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
AZ-900 cloud concepts practice questions
Practise AZ-900 questions linked to AZ-900 cloud concepts.
AZ-900 Azure services practice questions
Practise AZ-900 questions linked to AZ-900 Azure services.
AZ-900 pricing and support practice questions
Practise AZ-900 questions linked to AZ-900 pricing and support.
AZ-900 security and compliance practice questions
Practise AZ-900 questions linked to AZ-900 security and compliance.
AZ-900 governance practice questions
Practise AZ-900 questions linked to AZ-900 governance.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A developer is building a serverless application that requires integration with an on-premises SQL Server database for real-time data processing. The on-premises network is connected to Azure via a site-to-site VPN. Which Azure service would allow the function to securely access the on-premises database without exposing it to the public internet?
Question 2
A solutions architect is designing a storage solution for a large media company. The company needs to store video files that are accessed infrequently but must be retained for several years for compliance. Which two Azure storage options meet these requirements? (Select two.)
Question 3
A company deploys a multi-tier application using Azure virtual machines. The web tier VMs must be evenly distributed across two distinct data centers within an Azure region to avoid a single point of failure from an infrastructure outage. Which Azure construct should they use to meet this requirement?
Question 4
A company wants to enforce a set of security policies across all their Azure subscriptions. They have created several individual policy definitions. Which Azure construct should they use to group these policies together and assign them as a single package?
Question 5
A company deploys a line-of-business application on an Azure virtual machine. The IT team wants to ensure the application remains secure. According to the shared responsibility model, which of the following security tasks is the sole responsibility of the customer (the company)?
Question 6
A company develops a web API that runs on Azure App Service. The development team wants to deploy a new version of the API to a staging environment, run integration tests against it, and then gradually shift production traffic to the new version. If any issues are detected, they want to immediately roll back to the previous version without redeploying. Which Azure App Service feature should the team use to meet these requirements?
FAQ
Questions learners often ask
What does this AZ-900 question test?
Standard ACLs match source addresses.
What is the correct answer to this question?
The correct answer is: Azure role-based access control (RBAC) — Azure role-based access control (RBAC) allows you to grant or deny specific permissions to users, groups, or service principals by assigning roles. In this scenario, the security team can assign a custom RBAC role that includes the Microsoft.Compute/virtualMachines/write permission (or use a built-in role like Virtual Machine Contributor) to only the 'VM Operators' group, and use a deny assignment to block all other users, including Owners, from creating VMs. Azure Policy is used to enforce rules on resource properties (e.g., allowed locations, SKU sizes) but cannot control which user identity performs an operation. Azure Resource Lock prevents deletion or modification of resources but does not control who can create resources. Azure Blueprints is an orchestration tool for deploying consistent environments and does not enforce runtime permissions.
What should I do if I get this AZ-900 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.