Deploy and manage Azure compute resources
Automate deployment, manage VMs, containers, and App Service.
Deploying and managing Azure compute resources is a critical domain within the Azure Administrator Associate (AZ-104) certification, representing a substantial portion of the required skills. This competency centers on the end-to-end lifecycle of compute infrastructure, primarily focusing on Virtua…
Concepts covered: Azure Resource Manager (ARM) templates, Bicep files, Create and configure virtual machines, Configure Azure Disk Encryption, Manage VM sizes and disks, Availability zones and availability sets, Azure Virtual Machine Scale Sets, Azure Container Registry, Azure Container Instances (ACI), Azure Container Apps (ACA), Provision and configure App Service plans, Configure App Service certificates and TLS, App Service custom DNS and networking, App Service deployment slots
AZ-104 - Deploy and manage Azure compute resources Example Questions
Test your knowledge of Deploy and manage Azure compute resources
Question 1
You are authoring a YAML template to deploy an application to Azure Container Instances (ACI). The application requires a third-party API key to be available as an environment variable at runtime. You need to ensure that the value of this key is obscured and cannot be viewed in clear text after the deployment when listing the container group properties. Which configuration property should you utilize in the container definition?
Question 2
You manage an Azure Compute Gallery named 'Gallery1' in the East US region that contains a generalized image version. You attempt to deploy a new virtual machine based on this image into the West Europe region, but the deployment fails because the image is not locally available. You need to resolve this issue to enable the deployment. Which action should you take?
Question 3
You administer a Windows virtual machine named 'vm-prod-01' containing crucial application data. You prepare to execute the Azure Disk Encryption (ADE) extension to encrypt both the operating system and data volumes. To ensure data recoverability in the event of an encryption failure, which action should you prioritize before running the command?