Complete the code to create a new Azure Active Directory user.
az ad user create --display-name "John Doe" --user-principal-name john.doe@example.com --password [1]
The password must be strong and meet Azure AD requirements. "Password123!" is a valid strong password.
Complete the code to assign the 'Reader' role to a user on a resource group.
az role assignment create --assignee john.doe@example.com --role [1] --resource-group MyResourceGroupThe 'Reader' role allows read-only access to resources, which is often assigned for monitoring or auditing.
Fix the error in the command to enable multi-factor authentication (MFA) for a user.
az ad user update --id john.doe@example.com --[1] trueThe correct parameter to require MFA is '--strong-authentication-required'.
Fill both blanks to create a service principal with contributor role and assign it to a subscription.
az ad sp create-for-rbac --name [1] --role [2] --scopes /subscriptions/00000000-0000-0000-0000-000000000000
'MyAppSP' is a valid name for the service principal. 'Contributor' role grants permissions to manage resources.
Fill all three blanks to create a conditional access policy that requires MFA for users in group 'Admins'.
az ad conditional-access policy create --display-name [1] --state enabled --conditions "[2]" --grant-controls "[3]"
The policy needs a name, a condition targeting the 'Admins' group, and a grant control requiring MFA.