nerdexam
MicrosoftMicrosoft

SC-300 · Question #344

SC-300 Question #344: Real Exam Question with Answer & Explanation

The correct answer is D: Assign an Azure role to VM1.. Explanation Assigning an Azure role (specifically the Key Vault Secrets User role) to VM1's system-assigned managed identity is the correct first step, because Azure Key Vault uses Azure Role-Based Access Control (RBAC) to authorize access, and the managed identity must be grante

Submitted by cyberguy42· Mar 6, 2026Plan and implement workload identities

Question

You have an Azure subscription that contains a virtual machine named VM1 and an Azure key vault named Vault1. VM1 has a system-assigned managed identity. You need to ensure that VM1 can retrieve the values of secrets stored in Vault1. The solution must minimize administrative effort. What should you do first?

Options

  • AConfigure the Resource access settings for Vault1.
  • BConfigure the permissions model for Vault1.
  • CAdd a user-assigned managed identity to VM1.
  • DAssign an Azure role to VM1.

Explanation

Explanation

Assigning an Azure role (specifically the Key Vault Secrets User role) to VM1's system-assigned managed identity is the correct first step, because Azure Key Vault uses Azure Role-Based Access Control (RBAC) to authorize access, and the managed identity must be granted explicit permissions to read secrets before it can retrieve them. Option A (Resource access settings) is a distractor because configuring network/resource access alone doesn't grant the identity permission to read secret values - authorization is a separate concern. Option B (configuring the permissions model) is incorrect as the first step because the permissions model (RBAC vs. Vault Access Policy) is typically already configured; changing it would be a prerequisite only if the vault was misconfigured, and the question asks what to do first to enable access with minimum effort. Option C (adding a user-assigned managed identity) is unnecessary because VM1 already has a system-assigned managed identity, so adding another one increases administrative overhead rather than minimizing it.

Memory Tip 🔑

Think "Identity → Role → Access": once an identity exists (system-assigned is already there), your next move is always to assign a role to grant permissions - you never need a second identity when one already exists.

Topics

#Managed Identity#Azure Key Vault#Azure RBAC#Workload Identity Access

Community Discussion

No community discussion yet for this question.

Full SC-300 PracticeBrowse All SC-300 Questions