exam questions

Exam AZ-400 All Questions

View all questions & answers for the AZ-400 exam

Exam AZ-400 topic 4 question 18 discussion

Actual exam question from Microsoft's AZ-400
Question #: 18
Topic #: 4
[All AZ-400 Questions]

You are deploying a server application that will run on a Server Core installation of Windows Server 2019.
You create an Azure key vault and a secret.
You need to use the key vault to secure API secrets for third-party integrations.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

  • A. Configure RBAC for the key vault.
  • B. Modify the application to access the key vault.
  • C. Configure a Key Vault access policy.
  • D. Deploy an Azure Desired State Configuration (DSC) extension.
  • E. Deploy a virtual machine that uses a system-assigned managed identity.
Show Suggested Answer Hide Answer
Suggested Answer: ABE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Marang73
Highly Voted 4 years, 5 months ago
B, C, E is possible see https://docs.microsoft.com/en-us/azure/key-vault/general/tutorial-net-virtual-machine RBAC is also possible but it still in preview https://docs.microsoft.com/en-us/azure/key-vault/general/rbac-guide
upvoted 30 times
Tyler2023
1 year, 7 months ago
RBAC is the recommended authorization now, I understand Marang73 comments was almost 3 years ago, but for others going to see this, use RBAC if possible
upvoted 12 times
...
catfood
1 year, 9 months ago
not in preview any more, so could be either access policy or RBAC. When creating a key vault, "Azure role-based access control (recommended)" is shown in the portal.
upvoted 8 times
...
...
kumardeb
Highly Voted 4 years, 5 months ago
B. Modify the application to access the key vault. C. Configure a Key Vault access policy. E. Deploy a virtual machine that uses a system-assigned managed identity.
upvoted 7 times
...
nikolayivanov
Most Recent 3 months, 1 week ago
Selected Answer: ABE
Recommended Answer Based on the Latest Best Practices (2025) A. Configure RBAC for the Key Vault Use RBAC to assign roles like "Key Vault Reader" or "Key Vault Secrets User" to the VM's managed identity. RBAC provides more flexibility and is Microsoft's current recommendation. B. Modify the application to access the key vault The application must be updated to use Azure SDKs or APIs to fetch secrets securely. E. Deploy a virtual machine that uses a system-assigned managed identity The managed identity enables the VM to securely authenticate to Azure services, including the Key Vault, without hardcoding credentials.
upvoted 2 times
...
Morca
4 months, 2 weeks ago
Selected Answer: ACE
Azure Key Vault permissions can be managed using both RBAC and access policies simultaneously. For a system-assigned managed identity to access secrets in the Key Vault, you typically need: RBAC (Role-Based Access Control) to grant the identity access to the Key Vault itself. Access Policies to define specific operations like Get, List, or Set secrets within the Key Vault. Therefore, both RBAC and access policies are required in many cases to fully enable access for a managed identity. Correct Steps: ✅ A. Configure RBAC for the key vault This grants the managed identity or service principal access to the Key Vault at a high level. ✅ C. Configure a Key Vault access policy This defines the specific permissions (e.g., read or write secrets) for the managed identity. ✅ E. Deploy a virtual machine that uses a system-assigned managed identity This ensures the VM can securely authenticate to Azure services like Key Vault without storing credentials.
upvoted 2 times
...
Mattt
6 months, 3 weeks ago
Selected Answer: ABE
A, B , E for the current version
upvoted 2 times
...
only_juans
7 months, 2 weeks ago
Selected Answer: ABE
As of today, ABE is the best choice.
upvoted 1 times
...
hajurbau
10 months, 2 weeks ago
Selected Answer: ABE
ABE and BCW are both acceptable solutions. However, I am now going with ABE as RBAC as the new recommended authorisation.
upvoted 2 times
...
ay_m
10 months, 2 weeks ago
Selected Answer: ABE
RBAC is now the recommended method for key vault, and access policies are considered legacy by Microsoft. This link further clarifies this change. https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-access-policy
upvoted 2 times
...
UrbanRellik
11 months, 2 weeks ago
Selected Answer: ABE
1) E, deploy a VM that uses a system-assigned managed identity. 2) A, configure RBAC for the Key Vault and assign the system managed identity access. 3) B, modify the application to access the key vault as desired.
upvoted 2 times
...
ozbonny
1 year, 2 months ago
Selected Answer: BDE
I think BCE
upvoted 2 times
...
cluqueg
1 year, 5 months ago
Selected Answer: ABE
Now it's recommended to use RBAC instead.
upvoted 5 times
...
Tyler2023
1 year, 7 months ago
RBAC is now recommended authz, if I'm going to do this in sequence, I will do E,A,B
upvoted 4 times
...
ieboaix
1 year, 8 months ago
B, C and E are correct the answer. B and C are obvious. while A is possible when the app is registered with AAD. but here it hints the app is deployed in a VM with a managed identity, hence, E is chosen.
upvoted 2 times
...
flafernan
1 year, 9 months ago
A,B,C - Option E is not required to ensure secure access to Key Vault secrets by the application running on the server. Using a system-assigned managed identity (system-assigned managed identity) is useful when you want the virtual machine itself to have an identity to access resources such as Key Vault directly. However, in this specific scenario, the objective is to modify the application to access the Key Vault, and this is done by configuring the accepted permissions (RBAC) and a Key Vault access policy, which does not require the use of an identity managed by the Key Vault. virtual machine. Therefore, option E is not needed in this situation and can be excluded from the choices. Options A, B and C are the most suitable to meet the specific requirements of the presented scenario.
upvoted 4 times
...
xRiot007
1 year, 9 months ago
E,C,B E - you need to assign a managed identity to your VM C - you create a policy for that managed identity to give it permissions B - you have to modify your app to retrieve values from the KV before usage. It will use DefaultAzureCredential
upvoted 2 times
xRiot007
1 year, 9 months ago
https://learn.microsoft.com/en-us/azure/key-vault/general/tutorial-net-virtual-machine?tabs=azure-cli
upvoted 1 times
...
...
Pamban
1 year, 10 months ago
Selected Answer: BCE
Definitely B,C and E I have engaged these sort of activities many times in greenfield deployments
upvoted 1 times
...
diego84
2 years, 4 months ago
Selected Answer: ABE
E - it is for VM A- Set up MI over KV using RBAC B - Change your app to use the MI
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago