New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-204 Exam - Topic 3 Question 19 Discussion

Actual exam question for Microsoft's AZ-204 exam
Question #: 19
Topic #: 3
[All AZ-204 Questions]

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You develop Azure solutions.

You must grant a virtual machine (VM) access to specific resource groups in Azure Resource Manager.

You need to obtain an Azure Resource Manager access token.

Solution: Use an X.509 certificate to authenticate the VM with Azure Resource Manager.

Does the solution meet the goal?

Show Suggested Answer Hide Answer
Suggested Answer: B

Instead run the Invoke-RestMethod cmdlet to make a request to the local managed identity for Azure resources endpoint.


https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-arm

Contribute your Thoughts:

0/2000 characters
Allene
4 months ago
Just to clarify, does this method require additional setup?
upvoted 0 times
...
Anissa
4 months ago
Totally agree, it's a secure approach for VM authentication!
upvoted 0 times
...
Chauncey
4 months ago
Wait, can you really use a certificate for that? Sounds complicated.
upvoted 0 times
...
Toi
5 months ago
I disagree, there are simpler ways to get an access token.
upvoted 0 times
...
Mitsue
5 months ago
Yes, using an X.509 certificate is a valid method for authentication.
upvoted 0 times
...
Tennie
5 months ago
I feel like using an X.509 certificate could work, but I can't recall if it's specifically for access tokens in this context.
upvoted 0 times
...
Callie
5 months ago
I think we practiced a similar question where we used managed identities instead of certificates. That might be a better approach here.
upvoted 0 times
...
Isaac
5 months ago
I remember something about using certificates for authentication, but I'm not sure if it's the right method for obtaining an access token.
upvoted 0 times
...
Jesusita
5 months ago
I definitely remember that there are multiple ways to authenticate with Azure, but I’m unsure if this solution is the most efficient one.
upvoted 0 times
...
Elbert
5 months ago
This seems like a tricky question. I'm not sure which option is the safest, but I think I'll go with C since it mentions creating a non-production test environment. That seems like the most controlled and responsible way to test the exploit.
upvoted 0 times
...
Danica
5 months ago
I remember practicing a question about this, and I think it's not really "software privacy"—that sounds different.
upvoted 0 times
...
Annabelle
5 months ago
This seems pretty straightforward. I think the Log Analytics agent is the right choice to forward security exploits to Defender for Cloud.
upvoted 0 times
...
Carmen
5 months ago
Hmm, this looks like a tricky one. I'll need to carefully read through each option and think about which ones are true about the receiving process.
upvoted 0 times
...

Save Cancel