0
0
Azurecloud~10 mins

Why identity management is foundational in Azure - Test Your Understanding

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to create a new Azure Active Directory user.

Azure
az ad user create --display-name "John Doe" --user-principal-name john.doe@example.com --password [1]
Drag options to blanks, or click blank then click option'
A123456
Badmin
Cjohn.doe
DPassword123!
Attempts:
3 left
💡 Hint
Common Mistakes
Using a username instead of a password.
Using a weak password that Azure rejects.
2fill in blank
medium

Complete the code to assign the 'Reader' role to a user on a resource group.

Azure
az role assignment create --assignee john.doe@example.com --role [1] --resource-group MyResourceGroup
Drag options to blanks, or click blank then click option'
AOwner
BContributor
CReader
DUser Access Administrator
Attempts:
3 left
💡 Hint
Common Mistakes
Assigning 'Owner' or 'Contributor' roles when only read access is needed.
Using incorrect role names.
3fill in blank
hard

Fix the error in the command to enable multi-factor authentication (MFA) for a user.

Azure
az ad user update --id john.doe@example.com --[1] true
Drag options to blanks, or click blank then click option'
Astrong-authentication-required
Bforce-mfa
Cmfa-enabled
Denable-mfa
Attempts:
3 left
💡 Hint
Common Mistakes
Using non-existent parameters like 'enable-mfa'.
Confusing parameter names.
4fill in blank
hard

Fill both blanks to create a service principal with contributor role and assign it to a subscription.

Azure
az ad sp create-for-rbac --name [1] --role [2] --scopes /subscriptions/00000000-0000-0000-0000-000000000000
Drag options to blanks, or click blank then click option'
AMyAppSP
BReader
CContributor
DAdmin
Attempts:
3 left
💡 Hint
Common Mistakes
Using 'Reader' role when write access is needed.
Using invalid role names like 'Admin'.
5fill in blank
hard

Fill all three blanks to create a conditional access policy that requires MFA for users in group 'Admins'.

Azure
az ad conditional-access policy create --display-name [1] --state enabled --conditions "[2]" --grant-controls "[3]"
Drag options to blanks, or click blank then click option'
A"AdminsGroupCondition"
B"users/groups eq 'Admins'"
C"mfaRequired"
D"requireMfa"
Attempts:
3 left
💡 Hint
Common Mistakes
Using incorrect condition syntax.
Using wrong grant control names.
Omitting quotes around strings.