Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam AZ-104 Topic 2 Question 118 Discussion

Actual exam question for Microsoft's AZ-104 exam
Question #: 118
Topic #: 2
[All AZ-104 Questions]

You download an Azure Resource Manager template based on an existing virtual machine. The template will be used to deploy 100 virtual machines.

You need to modify the template to reference an administrative password. You must prevent the password from being stored in plain text.

What should you create to store the password?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Cheryl
28 days ago
D) an Azure Storage account and an access policy? Really? That's like putting a paper bag over your head to hide from the sun. C) is the way to go, no doubt.
upvoted 0 times
...
Carolynn
1 months ago
I bet the password is 'password123'. Just kidding, but seriously, C) is the correct answer. Gotta keep that sensitive data locked up tight.
upvoted 0 times
Sheridan
6 days ago
User 1: I think C) an Azure Key Vault and an access policy is the way to go.
upvoted 0 times
...
Mica
17 days ago
User 3: Definitely, storing it in plain text is a big no-no.
upvoted 0 times
...
Gaston
23 days ago
User 2: Agreed, we need to keep that password secure.
upvoted 0 times
...
Gerald
27 days ago
User 1: I think C) an Azure Key Vault and an access policy is the way to go.
upvoted 0 times
...
...
Goldie
1 months ago
I'm not sure, but it makes sense to use Azure Key Vault to store passwords securely. It's important to follow best practices for security.
upvoted 0 times
...
Elmira
2 months ago
Hmm, let's see. A vault, a policy, and a password. Sounds like a secret agent mission to me! C) is the way to go, folks.
upvoted 0 times
Lelia
11 days ago
Using Azure Key Vault will ensure that the password is not stored in plain text and can be securely accessed when needed.
upvoted 0 times
...
Adrianna
16 days ago
I agree, C) an Azure Key Vault and an access policy is the best option to store the password securely.
upvoted 0 times
...
...
Catarina
2 months ago
I agree with Lilli. Azure Key Vault is designed to safeguard cryptographic keys and secrets used by cloud applications and services.
upvoted 0 times
...
Alton
2 months ago
Why would anyone want to store a password in plain text? That's just asking for trouble. C) is the obvious choice here.
upvoted 0 times
...
Lang
2 months ago
C) an Azure Key Vault and an access policy is the way to go. That's the best way to securely store passwords and other sensitive information.
upvoted 0 times
Jennie
12 days ago
Definitely, using Azure Key Vault adds an extra layer of security to your deployment.
upvoted 0 times
...
Lyndia
13 days ago
It's important to follow best practices when it comes to securing sensitive information like passwords.
upvoted 0 times
...
Mona
21 days ago
I agree, Azure Key Vault is the best option for storing passwords securely.
upvoted 0 times
...
Karl
24 days ago
C) an Azure Key Vault and an access policy is the way to go. That's the best way to securely store passwords and other sensitive information.
upvoted 0 times
...
Franchesca
26 days ago
Using Azure Key Vault will help ensure that the password is not stored in plain text.
upvoted 0 times
...
Stefania
27 days ago
It's important to follow best practices for security when dealing with passwords in templates.
upvoted 0 times
...
In
30 days ago
I agree, Azure Key Vault is a secure and centralized place to store sensitive information.
upvoted 0 times
...
Reuben
1 months ago
C) an Azure Key Vault and an access policy is the best option for securely storing passwords.
upvoted 0 times
...
...
Lilli
2 months ago
I think the answer is C) an Azure Key Vault and an access policy. It's the best way to store sensitive information securely.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77