0
0
Azurecloud~20 mins

Key Vault references in App Service in Azure - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Key Vault Reference Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
service_behavior
intermediate
2:00remaining
How does App Service retrieve secrets using Key Vault references?

When you configure an Azure App Service to use Key Vault references in its application settings, how does the App Service retrieve the secret values at runtime?

AApp Service fetches the secret value directly from Key Vault every time the app reads the setting.
BApp Service retrieves the secret once at startup and caches it for the app's lifetime.
CApp Service requires the app code to call Key Vault APIs explicitly to get the secret values.
DApp Service stores the secret value in its configuration permanently after the first retrieval.
Attempts:
2 left
💡 Hint

Think about performance and how often secrets might change.

security
intermediate
2:00remaining
What permission is required for App Service to access Key Vault secrets via references?

To enable an Azure App Service to use Key Vault references in its application settings, what minimum permission must be granted to the App Service's managed identity on the Key Vault?

AKey Vault 'set' secret permission
BKey Vault 'list' secret permission
CKey Vault 'get' secret permission
DKey Vault 'delete' secret permission
Attempts:
2 left
💡 Hint

Consider what action is needed to read a secret.

Architecture
advanced
3:00remaining
How to design App Service with Key Vault references for secret rotation?

You want your Azure App Service to automatically use updated secrets from Key Vault without manual app restarts. Which architecture approach supports this?

AUse Key Vault references in app settings and enable 'Azure App Service Managed Identity' with 'get' permission; configure app to restart on secret change notifications.
BStore secrets directly in App Service app settings and update them manually when secrets rotate.
CUse Key Vault references but rely on app restart only when manually triggered to refresh secrets.
DEmbed secrets in app code and redeploy app when secrets change.
Attempts:
2 left
💡 Hint

Think about automation and identity permissions.

Best Practice
advanced
3:00remaining
What is the best practice for securing Key Vault access from App Service?

Which of the following is the best practice to secure access from an Azure App Service to Azure Key Vault when using Key Vault references?

AGrant full Key Vault administrator rights to the App Service's managed identity.
BStore Key Vault credentials in App Service app settings and use them to authenticate.
CUse a shared access key stored in app code to authenticate to Key Vault.
DUse a system-assigned managed identity for the App Service and grant it least privilege 'get' secret access in Key Vault access policies.
Attempts:
2 left
💡 Hint

Consider principle of least privilege and secure authentication methods.

🧠 Conceptual
expert
3:00remaining
Why might an App Service fail to resolve Key Vault references despite correct permissions?

An Azure App Service is configured with Key Vault references in its application settings and the managed identity has 'get' permission on Key Vault secrets. However, the app fails to resolve the secrets at runtime. What is the most likely cause?

AThe Key Vault firewall or virtual network settings block access from the App Service outbound IP addresses.
BThe App Service is missing the 'list' permission on Key Vault secrets.
CThe secrets in Key Vault are expired and cannot be retrieved.
DThe App Service is using a user-assigned managed identity instead of system-assigned.
Attempts:
2 left
💡 Hint

Think about network restrictions and connectivity.