<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: CrackCerts</title>
    <description>The latest articles on DEV Community by CrackCerts (@crackcerts).</description>
    <link>https://dev.to/crackcerts</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3375576%2F0c42f408-1529-406b-bce8-547ad04ec96f.png</url>
      <title>DEV Community: CrackCerts</title>
      <link>https://dev.to/crackcerts</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/crackcerts"/>
    <language>en</language>
    <item>
      <title>How I'd Structure 4 Weeks of AZ-104 Study (Domain-by-Domain Plan)</title>
      <dc:creator>CrackCerts</dc:creator>
      <pubDate>Tue, 31 Mar 2026 15:13:44 +0000</pubDate>
      <link>https://dev.to/crackcerts/how-id-structure-4-weeks-of-az-104-study-domain-by-domain-plan-1f29</link>
      <guid>https://dev.to/crackcerts/how-id-structure-4-weeks-of-az-104-study-domain-by-domain-plan-1f29</guid>
      <description>&lt;p&gt;The AZ-104 covers five domains across identity, storage, compute, &lt;br&gt;
networking, and monitoring. That's a lot of ground — and most study plans &lt;br&gt;
either treat every topic equally (wrong) or follow someone else's timeline &lt;br&gt;
that doesn't reflect how the exam actually weights things.&lt;/p&gt;

&lt;p&gt;This plan is built around the official domain weightings. The domains &lt;br&gt;
worth the most marks get the most time. The sequencing follows a logical &lt;br&gt;
dependency order — each week builds on the one before it.&lt;/p&gt;

&lt;p&gt;Assumptions: roughly 1–2 hours of study per day, 5 days a week. If you &lt;br&gt;
have more time, compress the plan. If you're starting from scratch with &lt;br&gt;
no Azure experience, add an extra week before Week 1 to get hands-on &lt;br&gt;
with the Azure portal basics.&lt;/p&gt;




&lt;h2&gt;
  
  
  Before You Start: Understand the Exam Format
&lt;/h2&gt;

&lt;p&gt;The AZ-104 is not a recall exam. It's a scenario-based reasoning exam.&lt;/p&gt;

&lt;p&gt;Questions don't ask you to define services — they put you inside a &lt;br&gt;
real-world configuration and ask what you would do, what is blocked, &lt;br&gt;
what happens next, or what the correct sequence of steps is.&lt;/p&gt;

&lt;p&gt;That means hands-on practice in a real Azure environment is not optional. &lt;br&gt;
A free Azure trial gives you enough to work through the configurations &lt;br&gt;
that appear most on the exam. Use it throughout this plan.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Exam structure to keep in mind:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;50–55 questions across two sections&lt;/li&gt;
&lt;li&gt;100 minutes of actual exam time&lt;/li&gt;
&lt;li&gt;Passing score: 700 out of 1000 (scaled scoring)&lt;/li&gt;
&lt;li&gt;9 question formats including case studies, drag-and-drop, 
Yes/No series, and dropdown completion&lt;/li&gt;
&lt;li&gt;Once you move to Section 2, you cannot return to Section 1&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full exam format breakdown including all 9 question types with &lt;br&gt;
examples: &lt;a href="https://crackcerts.com/exam-guide/az-104" rel="noopener noreferrer"&gt;AZ-104 Exam Guide&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Week 1 — Domain 01: Identities and Governance (20–25%)
&lt;/h2&gt;

&lt;p&gt;Start here. Identity and governance is jointly the highest-weighted domain &lt;br&gt;
alongside compute, and it establishes the access control model that &lt;br&gt;
underpins every other domain. Understanding RBAC scope inheritance before &lt;br&gt;
you study networking or storage makes both significantly easier.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What to cover this week:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft Entra ID (formerly Azure Active Directory)&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Creating users and groups, including dynamic membership rules&lt;/li&gt;
&lt;li&gt;How dynamic group rules evaluate user attributes 
(department, country, logical operators)&lt;/li&gt;
&lt;li&gt;Managing licenses through group assignment — including nested group 
inheritance and which group types are valid license targets&lt;/li&gt;
&lt;li&gt;Configuring SSPR — which identity types it applies to, which admin 
roles can configure it, which group types can scope it&lt;/li&gt;
&lt;li&gt;Managing B2B guest users and external collaboration settings&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Azure RBAC&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Built-in roles and their scope: Owner, Contributor, Reader, 
User Access Administrator&lt;/li&gt;
&lt;li&gt;The critical distinction: management-plane roles vs data-plane roles&lt;/li&gt;
&lt;li&gt;Assigning roles at management group, subscription, resource group, 
and resource scope — and how assignments inherit downward&lt;/li&gt;
&lt;li&gt;Custom role definitions: actions, notActions, dataActions, 
notDataActions&lt;/li&gt;
&lt;li&gt;Deployment stacks and DenyDelete — how this overrides even Owner-level 
RBAC&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Azure Policy&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Policy effects: append, deny, audit, modify&lt;/li&gt;
&lt;li&gt;Append policies apply to new resources only — not retroactive&lt;/li&gt;
&lt;li&gt;How conflicting policies interact across management group scopes&lt;/li&gt;
&lt;li&gt;Tag policy scenarios — what gets appended, what doesn't, 
what is inherited&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Resource Locks and Subscriptions&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CanNotDelete vs ReadOnly lock types&lt;/li&gt;
&lt;li&gt;Which scopes support locks (resource, resource group, subscription — 
not management groups)&lt;/li&gt;
&lt;li&gt;Azure Budgets: notification-only, they do not stop resources&lt;/li&gt;
&lt;li&gt;Subscription quota limits and how VM family quotas work&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Hands-on this week:&lt;/strong&gt; Assign RBAC roles at different scopes in the &lt;br&gt;
portal. Create a dynamic group with a membership rule. Create an Azure &lt;br&gt;
Policy and observe which resources it affects. Apply a resource lock and &lt;br&gt;
try to delete the resource.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Every sub-topic in Domain 01 mapped to exact question types: &lt;br&gt;
&lt;a href="https://crackcerts.com/exam-guide/az-104-domain-1-identities-governance" rel="noopener noreferrer"&gt;AZ-104 Domain 01 — Identities and Governance&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Week 2 — Domain 02: Storage (15–20%)
&lt;/h2&gt;

&lt;p&gt;Storage is the most detail-oriented domain on the exam. Questions test &lt;br&gt;
specific settings, exact JSON rule syntax, and edge-case behaviour of &lt;br&gt;
access mechanisms. The topics are narrower than identity or networking &lt;br&gt;
but they require precision.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What to cover this week:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Storage Account Fundamentals&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Account types: BlobStorage, BlockBlobStorage, StorageV2 (GPv2) — 
and which services each supports&lt;/li&gt;
&lt;li&gt;Redundancy options: LRS, ZRS, GRS, GZRS, RA-GRS, RA-GZRS — what 
each protects against and where data is replicated&lt;/li&gt;
&lt;li&gt;Which settings are immutable after account creation 
(performance tier, infrastructure encryption)&lt;/li&gt;
&lt;li&gt;Network routing: Microsoft global network vs internet routing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Access Control&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The three SAS types: user delegation SAS, service SAS, account SAS&lt;/li&gt;
&lt;li&gt;Which SAS types work when account key access is disabled 
(user delegation only)&lt;/li&gt;
&lt;li&gt;Effective SAS permissions = intersection of RBAC role + SAS permissions&lt;/li&gt;
&lt;li&gt;Stored access policies: hard limit of 5 per container&lt;/li&gt;
&lt;li&gt;Identity-based access for Azure Files: prerequisite configuration 
before IAM role assignments take effect&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Blob Storage&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access tiers: Hot, Cool, Archive — costs, minimum durations, 
and rehydration requirements&lt;/li&gt;
&lt;li&gt;Lifecycle management rules: JSON structure, condition properties, 
action properties, prefix scoping&lt;/li&gt;
&lt;li&gt;When two lifecycle rules apply to the same blob: more restrictive 
action wins&lt;/li&gt;
&lt;li&gt;Soft delete (protects against deletion) vs versioning 
(protects against overwrites)&lt;/li&gt;
&lt;li&gt;Object replication prerequisites: which account types are supported&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Azure Files&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Storage account types that support file shares&lt;/li&gt;
&lt;li&gt;SMB port 445 — must be open for external access&lt;/li&gt;
&lt;li&gt;UNC path format for scripting access to a file share&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Hands-on this week:&lt;/strong&gt; Create a storage account with different redundancy &lt;br&gt;
options. Generate each SAS token type and test access. Disable account &lt;br&gt;
key access and observe which tokens still work. Write a lifecycle &lt;br&gt;
management rule in JSON and apply it to a container.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Every sub-topic in Domain 02 mapped to exact question types: &lt;br&gt;
&lt;a href="https://crackcerts.com/exam-guide/az-104-domain-2-storage" rel="noopener noreferrer"&gt;AZ-104 Domain 02 — Storage&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Week 3 — Domain 03: Compute (20–25%)
&lt;/h2&gt;

&lt;p&gt;Compute is the broadest domain on the exam — 19 sub-topics spanning &lt;br&gt;
ARM templates, virtual machines, containers, and App Services. &lt;br&gt;
The breadth is the challenge here more than the depth of any single topic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What to cover this week:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ARM Templates and Bicep&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reading Bicep files: hardcoded vs parameter-driven values, 
declarative nature, idempotency&lt;/li&gt;
&lt;li&gt;Copy loops with copyIndex() — how to calculate resource names 
and count from a template&lt;/li&gt;
&lt;li&gt;Deployment modes: incremental vs complete (complete removes 
pre-existing resources)&lt;/li&gt;
&lt;li&gt;PowerShell cmdlets by deployment scope: New-AzResourceGroupDeployment 
vs New-AzSubscriptionDeployment&lt;/li&gt;
&lt;li&gt;Where to find deployment history for a past deployment&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Virtual Machines&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;VM state requirements: which operations require a running VM vs 
stopped/deallocated&lt;/li&gt;
&lt;li&gt;Disk types and host caching: Premium vs Standard, LRS vs ZRS, 
caching trade-offs&lt;/li&gt;
&lt;li&gt;Azure Disk Encryption vs encryption at host vs customer-managed keys 
— what each protects and where the key is held&lt;/li&gt;
&lt;li&gt;Moving a VM: cross-subscription move constraints, 
which associated resources can and cannot move&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Availability and Scale&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Availability sets: fault domains (hardware failure) vs update domains 
(planned maintenance)&lt;/li&gt;
&lt;li&gt;Calculating maximum VMs simultaneously unavailable given fault domain 
and update domain counts&lt;/li&gt;
&lt;li&gt;VMSS autoscale: instance count calculation respecting cooldown periods, 
minimum, and maximum limits&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Containers&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Container Registry tiers: which features require Premium 
(geo-replication, private endpoints, ACR Tasks)&lt;/li&gt;
&lt;li&gt;Container Instances: OS constraints for container groups, 
file share mounting eligibility, restart policy&lt;/li&gt;
&lt;li&gt;Container Apps: managed identity for Key Vault access, 
minimum subnet size for custom VNet (/27)&lt;/li&gt;
&lt;li&gt;Which container services support autoscaling&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;App Service&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Plan OS constraint: Windows vs Linux runtime stack eligibility&lt;/li&gt;
&lt;li&gt;Minimum plan count when multiple apps have different runtime 
requirements&lt;/li&gt;
&lt;li&gt;Tier requirements: deployment slots (Standard+), rule-based 
scale-out (Standard+), zone redundancy (Premium+)&lt;/li&gt;
&lt;li&gt;VNet integration vs Hybrid Connections for on-premises connectivity&lt;/li&gt;
&lt;li&gt;Deployment slots: slot swap rollback, backup configuration 
applies per slot not per app&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Hands-on this week:&lt;/strong&gt; Deploy a Bicep file and redeploy it — observe &lt;br&gt;
idempotency. Create an availability set with specific fault and update &lt;br&gt;
domain counts. Configure a VMSS with autoscale rules and manually trigger &lt;br&gt;
scale events. Create an App Service plan and add a deployment slot.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Every sub-topic in Domain 03 mapped to exact question types: &lt;br&gt;
&lt;a href="https://crackcerts.com/exam-guide/az-104-domain-3-compute" rel="noopener noreferrer"&gt;AZ-104 Domain 03 — Compute&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Week 4 — Domain 04 + Domain 05: Networking and Monitoring (25–35% combined)
&lt;/h2&gt;

&lt;p&gt;The final week covers two domains. Domain 04 (networking) is widely &lt;br&gt;
considered the hardest domain on the exam despite its 15–20% weighting &lt;br&gt;
— questions require multi-step reasoning through peering, routes, NSG &lt;br&gt;
rules, and DNS simultaneously. Domain 05 (monitoring) is the smallest &lt;br&gt;
domain at 10–15% and is more straightforward once you understand the &lt;br&gt;
vault distinction.&lt;/p&gt;

&lt;p&gt;Split the week roughly 60/40 in favour of networking.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain 04 — Networking&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;VNets and Peering&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;VNet peering is not transitive: A↔B, B↔C does not give A access to C&lt;/li&gt;
&lt;li&gt;Overlapping address spaces cannot be peered&lt;/li&gt;
&lt;li&gt;Cross-tenant peering requires additional prerequisites&lt;/li&gt;
&lt;li&gt;Disconnected peering status: how to resolve it&lt;/li&gt;
&lt;li&gt;DNS resolution across peered VNets: which VNet must be linked to the 
private DNS zone&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;NSGs&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;NSG regional constraint: can only be associated with subnets 
in the same region&lt;/li&gt;
&lt;li&gt;Evaluating effective rules: subnet-level NSG + NIC-level NSG 
combined effect on the same VM&lt;/li&gt;
&lt;li&gt;Service tags for outbound PaaS access (e.g. Storage, AzureActiveDirectory)&lt;/li&gt;
&lt;li&gt;NSG on subnet does not control inbound traffic to a VNet-integrated 
App Service&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Routing and Connectivity&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;User-defined routes: next hop types, subnet association&lt;/li&gt;
&lt;li&gt;Network Watcher tools: IP flow verify vs Connection troubleshoot 
— which tool for which diagnostic task&lt;/li&gt;
&lt;li&gt;Private endpoint vs service endpoint: private IP in your VNet 
vs optimised routing&lt;/li&gt;
&lt;li&gt;Azure Bastion SKUs: Basic (browser only) vs Standard (native client), 
one-hop peering limit, /26 minimum subnet&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Load Balancers and DNS&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Standard LB: Standard SKU public IPs only, NSG required on VMs, 
IPv6 not supported as frontend&lt;/li&gt;
&lt;li&gt;Basic LB: VMs must be in the same availability set or scale set&lt;/li&gt;
&lt;li&gt;Private DNS zone auto-registration: which VMs get records, 
which IP type is recorded&lt;/li&gt;
&lt;li&gt;DNS resolution precedence: NIC-level overrides VNet-level&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Domain 05 — Monitoring and Maintenance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure Monitor and Alerts&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Alert rules target the Log Analytics workspace for event log alerts, 
not the VM itself&lt;/li&gt;
&lt;li&gt;Activity log alert scope: operations on a resource trigger both 
resource-scoped and RG-scoped alerts; operations on the RG only 
trigger the RG-scoped alert&lt;/li&gt;
&lt;li&gt;Alert suppression: prevents notifications, alert still fires 
and appears in portal&lt;/li&gt;
&lt;li&gt;Minimum alert rules and action groups: each unique signal needs 
its own rule; multiple alerts to the same recipients can share 
one action group&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Azure Backup&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Recovery Services vault: Azure VMs, Azure Files, SQL in Azure VMs, 
on-premises workloads&lt;/li&gt;
&lt;li&gt;Backup vault: Azure Managed Disks, Azure Database for PostgreSQL, 
Azure Blobs at account level&lt;/li&gt;
&lt;li&gt;Blob containers: protected by neither vault — use soft delete 
or versioning&lt;/li&gt;
&lt;li&gt;Backup policy compatibility: not all policy types support VMs with 
Azure Disk Encryption or Trusted Launch enabled&lt;/li&gt;
&lt;li&gt;Site Recovery test failover: subnet name matching between source 
and target VNets&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Hands-on this week:&lt;/strong&gt; Create two VNets, peer them, and verify &lt;br&gt;
non-transitive behaviour with a third VNet. Build an NSG with priority-&lt;br&gt;
ordered rules and test effective access. Deploy Azure Bastion and connect &lt;br&gt;
to a VM. Create a Recovery Services vault, configure a backup policy, &lt;br&gt;
and perform a test restore.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full Domain 04 breakdown: &lt;br&gt;
&lt;a href="https://crackcerts.com/exam-guide/az-104-domain-4-networking" rel="noopener noreferrer"&gt;AZ-104 Domain 04 — Networking&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📖 Full Domain 05 breakdown: &lt;br&gt;
&lt;a href="https://crackcerts.com/exam-guide/az-104-domain-5-monitoring" rel="noopener noreferrer"&gt;AZ-104 Domain 05 — Monitor and Maintain&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  The Week Before the Exam
&lt;/h2&gt;

&lt;p&gt;Stop introducing new material. This week is entirely for consolidation &lt;br&gt;
and timed practice.&lt;/p&gt;

&lt;p&gt;Take at least two full-length practice tests under real exam conditions &lt;br&gt;
— 100 minutes, no pausing, no looking things up mid-test. Review every &lt;br&gt;
wrong answer with its explanation. The goal isn't just to see what you &lt;br&gt;
got wrong; it's to understand why the correct answer is correct and why &lt;br&gt;
the distractor options are wrong.&lt;/p&gt;

&lt;p&gt;Pay particular attention to questions where you got the right answer &lt;br&gt;
for the wrong reason — those are the ones that will cost you on exam day &lt;br&gt;
when the scenario is framed slightly differently.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full exam overview including all question types and what to expect &lt;br&gt;
on exam day: &lt;a href="https://crackcerts.com/exam-guide/az-104" rel="noopener noreferrer"&gt;AZ-104 Exam Guide&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;→ &lt;a href="https://crackcerts.com/practice-tests/az-104-microsoft-azure-administrator" rel="noopener noreferrer"&gt;AZ-104 Practice Tests on CrackCerts&lt;/a&gt; — &lt;br&gt;
full-length, timed, with detailed explanations for every question.&lt;/p&gt;

&lt;p&gt;→ &lt;a href="https://dev.to/crackcerts/az-104-cheat-sheet-key-rules-limits-and-gotchas-for-exam-day-3ekb"&gt;AZ-104 Last Minute Cheat Sheet&lt;/a&gt; &lt;/p&gt;

</description>
      <category>azure</category>
      <category>administration</category>
      <category>az104</category>
      <category>certification</category>
    </item>
    <item>
      <title>AZ-104 Last-Minute Cheat Sheet: The Rules, Limits, and Traps That Actually Show Up</title>
      <dc:creator>CrackCerts</dc:creator>
      <pubDate>Tue, 31 Mar 2026 14:38:45 +0000</pubDate>
      <link>https://dev.to/crackcerts/az-104-cheat-sheet-key-rules-limits-and-gotchas-for-exam-day-3ekb</link>
      <guid>https://dev.to/crackcerts/az-104-cheat-sheet-key-rules-limits-and-gotchas-for-exam-day-3ekb</guid>
      <description>&lt;p&gt;You've studied the domains. You've done the labs. Now it's 48 hours before &lt;br&gt;
your AZ-104 exam and you need one place with the rules that actually trip &lt;br&gt;
people up — not another overview of what the exam covers.&lt;/p&gt;

&lt;p&gt;This is that page.&lt;/p&gt;

&lt;p&gt;Everything below is pulled from what the exam actually tests. Bookmark it, &lt;br&gt;
read it the morning of your exam, and don't let any of these cost you marks.&lt;/p&gt;




&lt;h2&gt;
  
  
  Exam Format — Know This Before You Start
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Questions:&lt;/strong&gt; 50–55 total&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Time:&lt;/strong&gt; 100 minutes of actual exam time (timer starts when you click 
"Start Exam," not before)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Passing score:&lt;/strong&gt; 700 out of 1000 (scaled — this is not 70% correct)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Sections:&lt;/strong&gt; Two sections. Section 1 has ~45–51 questions including one 
case study. Section 2 has 4–6 scenario-based questions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Critical:&lt;/strong&gt; Once you move to Section 2, you &lt;strong&gt;cannot go back&lt;/strong&gt; to 
Section 1. Review everything in Section 1 before proceeding.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Result:&lt;/strong&gt; Shown immediately on screen — Pass or Fail, your score, and 
a domain-by-domain breakdown.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Domain 01 — Identity and Governance (20–25%)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;RBAC scope inheritance flows downward.&lt;/strong&gt; A role assigned at a management group applies to all child subscriptions, resource groups, and resources &lt;br&gt;
beneath it. It does not flow upward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Management-plane ≠ data-plane.&lt;/strong&gt; This is one of the most tested &lt;br&gt;
distinctions on the exam:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Storage Account Contributor&lt;/code&gt; lets you manage the storage account — it 
does &lt;strong&gt;not&lt;/strong&gt; grant access to blob data&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Storage Blob Data Contributor&lt;/code&gt; grants blob data access&lt;/li&gt;
&lt;li&gt;A user with an &lt;strong&gt;account access key bypasses RBAC entirely&lt;/strong&gt; — they can 
read any content regardless of their role assignments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Contributor cannot delegate.&lt;/strong&gt; If a user needs to assign roles to others &lt;br&gt;
on a specific resource, Contributor alone is not enough. You need &lt;br&gt;
&lt;code&gt;User Access Administrator&lt;/code&gt; or &lt;code&gt;Owner&lt;/code&gt; for that scope.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure Policy does not apply retroactively.&lt;/strong&gt; An &lt;code&gt;append&lt;/code&gt; policy only &lt;br&gt;
affects newly created resources. Existing resources at the time of &lt;br&gt;
assignment keep their current state.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resource locks apply at:&lt;/strong&gt; resource, resource group, and subscription &lt;br&gt;
level. &lt;strong&gt;Management groups do not support resource locks.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Budgets do not stop anything.&lt;/strong&gt; When a Budget threshold is reached, Azure &lt;br&gt;
sends a notification. It does &lt;strong&gt;not&lt;/strong&gt; deallocate VMs, pause services, or &lt;br&gt;
block new deployments — regardless of how far over budget you go.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Two lock types:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;CanNotDelete&lt;/code&gt; — read and modify allowed, delete blocked&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;ReadOnly&lt;/code&gt; — no modifications or deletes permitted&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Dynamic groups require Azure AD Premium P1.&lt;/strong&gt; Static groups do not.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full breakdown of every sub-topic in this domain: &lt;br&gt;
&lt;a href="https://crackcerts.com/exam-guide/az-104-domain-1-identities-governance" rel="noopener noreferrer"&gt;AZ-104 Domain 01 — Identities and Governance&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Domain 02 — Storage (15–20%)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Three SAS types — know which works when:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;User delegation SAS&lt;/code&gt; — backed by Entra ID credentials, works even when 
account key access is disabled&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Service SAS&lt;/code&gt; — signed with account key, &lt;strong&gt;blocked&lt;/strong&gt; when account key 
access is disabled&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Account SAS&lt;/code&gt; — also signed with account key, &lt;strong&gt;blocked&lt;/strong&gt; when account 
key access is disabled&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If the exam disables account key access, user delegation SAS is the only &lt;br&gt;
type that continues to function.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SAS effective permissions = intersection of RBAC role + SAS permissions.&lt;/strong&gt; &lt;br&gt;
The SAS cannot grant more than the role allows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Redundancy options at a glance:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;LRS&lt;/code&gt; — 3 copies in one datacenter&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;ZRS&lt;/code&gt; — 3 copies across availability zones in one region&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;GRS&lt;/code&gt; — LRS + async replication to a secondary region&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;GZRS&lt;/code&gt; — ZRS + async replication to a secondary region&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;RA-GRS / RA-GZRS&lt;/code&gt; — read access to the secondary region&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Archive tier is offline.&lt;/strong&gt; Blobs in Archive cannot be read without &lt;br&gt;
rehydration first. This adds delay. Blobs in Cool or Hot tier are &lt;br&gt;
immediately readable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimum storage durations:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Hot&lt;/code&gt; — no minimum&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Cool&lt;/code&gt; — 30 days (early deletion = penalty)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Cold&lt;/code&gt; — 90 days (early deletion = penalty)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Archive&lt;/code&gt; — 180 days (early deletion = penalty)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Lifecycle rules apply to new state, not past state.&lt;/strong&gt; When a blob &lt;br&gt;
matches two rules simultaneously, the more restrictive action wins.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Soft delete vs versioning:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Soft delete protects against accidental &lt;strong&gt;deletion&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Versioning protects against accidental &lt;strong&gt;overwrites&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full sub-topic breakdown including SAS gotchas and lifecycle JSON &lt;br&gt;
rules: &lt;a href="https://crackcerts.com/exam-guide/az-104-domain-2-storage" rel="noopener noreferrer"&gt;AZ-104 Domain 02 — Storage&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Domain 03 — Compute (20–25%)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Bicep/ARM deployments are idempotent.&lt;/strong&gt; Deploying the same template &lt;br&gt;
multiple times will not cause errors — it brings resources to the declared &lt;br&gt;
state.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Availability sets vs availability zones:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Availability sets&lt;/code&gt; — protect against hardware failures and planned 
maintenance within a single datacenter (fault domains and update domains)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Availability zones&lt;/code&gt; — protect against full datacenter failure within a 
region&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Fault domains vs update domains in availability sets:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Fault domains&lt;/code&gt; — separate physical hardware (power, network). Protects 
against hardware failures.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Update domains&lt;/code&gt; — separate groups for planned maintenance. Only one 
update domain is rebooted at a time.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;VMSS autoscale cooldown matters.&lt;/strong&gt; The exam will give you a starting &lt;br&gt;
instance count, a CPU threshold, and a cooldown window, then ask you to &lt;br&gt;
calculate the count after a sequence of events. No scale event can fire &lt;br&gt;
during the cooldown period after the previous one.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;App Service plan OS is a hard constraint.&lt;/strong&gt; A Windows plan cannot host a &lt;br&gt;
Linux runtime stack (Python, for example). This drives the minimum plan &lt;br&gt;
count when multiple apps have different runtime requirements.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deployment slots are not free.&lt;/strong&gt; Slot support requires Standard tier or &lt;br&gt;
above. If the Slots option is greyed out, you need to &lt;strong&gt;scale up&lt;/strong&gt; (not &lt;br&gt;
scale out) the plan.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container Apps minimum subnet size:&lt;/strong&gt; /27 for workload profiles &lt;br&gt;
environment — make sure you know how to check remaining address space in a &lt;br&gt;
VNet before deploying.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full compute sub-topic breakdown including ARM/Bicep, containers, and &lt;br&gt;
App Service: &lt;a href="https://crackcerts.com/exam-guide/az-104-domain-3-compute" rel="noopener noreferrer"&gt;AZ-104 Domain 03 — Compute&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Domain 04 — Networking (15–20%)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;VNet peering is not transitive.&lt;/strong&gt; VNet A peered with VNet B, VNet B &lt;br&gt;
peered with VNet C — VNet A &lt;strong&gt;cannot&lt;/strong&gt; reach VNet C. This is one of the &lt;br&gt;
most commonly tested networking facts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overlapping address spaces cannot be peered.&lt;/strong&gt; You must modify one VNet's &lt;br&gt;
address space before peering is possible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure Bastion — SKU differences:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Basic SKU&lt;/code&gt; — browser-based access only (Azure portal)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Standard SKU&lt;/code&gt; — native client access (mstsc.exe, SSH client)&lt;/li&gt;
&lt;li&gt;Bastion reach follows &lt;strong&gt;one hop of direct peering only&lt;/strong&gt; — VMs on VNet2 
(directly peered with VNet1 where Bastion lives) are reachable; VMs on 
VNet3 (only peered with VNet2) are not.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;AzureBastionSubnet minimum size:&lt;/strong&gt; /26 for Standard SKU. Public IP must &lt;br&gt;
be Standard SKU, static assignment, IPv4.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NSG regional constraint.&lt;/strong&gt; An NSG can only be associated with subnets in &lt;br&gt;
the &lt;strong&gt;same region&lt;/strong&gt; as the NSG. Cross-region association is not possible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NSG on subnet ≠ control over App Service inbound traffic&lt;/strong&gt; unless the app &lt;br&gt;
is deployed into that subnet (App Service Environment / Isolated tier). A &lt;br&gt;
VNet-integrated app using the subnet for outbound traffic is not controlled &lt;br&gt;
by a subnet NSG for inbound requests.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Standard Load Balancer requirements:&lt;/strong&gt; Standard SKU public IPs only. &lt;br&gt;
VMs must have an NSG configured. IPv6 addresses are not supported as &lt;br&gt;
frontend IPs on a Standard public load balancer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private endpoint vs service endpoint:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Private endpoint&lt;/code&gt; — gives a PaaS resource a private IP in your VNet, 
traffic stays off the public internet&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Service endpoint&lt;/code&gt; — optimises routing to the PaaS service but does not 
give it a private IP&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full networking sub-topic breakdown including NSG rules, Bastion, DNS, &lt;br&gt;
and peering: &lt;a href="https://crackcerts.com/exam-guide/az-104-domain-4-networking" rel="noopener noreferrer"&gt;AZ-104 Domain 04 — Networking&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Domain 05 — Monitor and Maintain (10–15%)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Recovery Services vault vs Backup vault — know which protects what:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Recovery Services vault&lt;/code&gt; — Azure VMs, Azure Files, SQL in Azure VMs, 
on-premises workloads&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Backup vault&lt;/code&gt; — Azure Managed Disks, Azure Database for PostgreSQL, 
Azure Blobs at account level&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Blob containers&lt;/strong&gt; cannot be protected by either vault — use blob soft 
delete or versioning instead&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Alert rules target the Log Analytics workspace, not the VM&lt;/strong&gt;, when &lt;br&gt;
monitoring Windows event log entries. Event log data is collected into the &lt;br&gt;
workspace — the alert must target the workspace.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Budgets send notifications. They do not stop resources.&lt;/strong&gt; (Worth &lt;br&gt;
repeating — this appears in both Domain 01 and Domain 05 contexts.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Alert suppression rules prevent notifications, but the alert still fires&lt;/strong&gt; &lt;br&gt;
and appears in the portal. Suppression ≠ cancelling the alert.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Activity log alert scope inheritance:&lt;/strong&gt; An operation on a resource &lt;br&gt;
triggers alerts scoped to that resource AND alerts scoped to its parent &lt;br&gt;
resource group. An operation on the resource group itself only triggers the &lt;br&gt;
RG-scoped alert — not any resource-scoped alerts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Site Recovery subnet matching:&lt;/strong&gt; During test failover, Site Recovery maps &lt;br&gt;
source subnets to target subnets by matching subnet names. If the same &lt;br&gt;
subnet name exists in the target VNet, the VM is connected to it.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;📖 Full monitoring and backup sub-topic breakdown: &lt;br&gt;
&lt;a href="https://crackcerts.com/exam-guide/az-104-domain-5-monitoring" rel="noopener noreferrer"&gt;AZ-104 Domain 05 — Monitor and Maintain&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  One More Thing
&lt;/h2&gt;

&lt;p&gt;A cheat sheet gets you through the last 48 hours. What gets you through &lt;br&gt;
the exam itself is working through real scenario-based questions under &lt;br&gt;
timed conditions — the format the AZ-104 actually uses.&lt;/p&gt;

&lt;p&gt;If you haven't done full-length timed practice tests yet, that's the &lt;br&gt;
highest-leverage thing you can do before exam day.&lt;/p&gt;

&lt;p&gt;→ &lt;a href="https://crackcerts.com/practice-tests/az-104-microsoft-azure-administrator" rel="noopener noreferrer"&gt;Try a FREE AZ-104 Practice Test on CrackCerts&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;→ &lt;a href="https://dev.to/crackcerts/how-id-structure-4-weeks-of-az-104-study-domain-by-domain-plan-1f29"&gt;4 Weeks of AZ-104 Study&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Good luck. You've got this.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>az104</category>
      <category>certification</category>
      <category>administration</category>
    </item>
  </channel>
</rss>
