Decide Fast & Get 50% Flat Discount | Limited Time Offer - Ends In 0d 00h 00m 00s Coupon code: SAVE50

Master Microsoft AZ-700 Exam with Reliable Practice Questions

Page: 1 out of Viewing questions 1-5 out of 263 questions
Last exam update: Nov 19,2024
Upgrade to Premium
Question 1

SIMULATION

Task 7

You plan to deploy 100 virtual machines to subnet4-1. The virtual machines will NOT be assigned a public IP address. The virtual machines will call the same API. which is hosted by a third party. The virtual machines will make more than 10,000 calls per minute to the API.

You need to minimize the risk of SNAT port exhaustion. The solution must minimize administrative effort.


Correct : A

To minimize the risk of SNAT port exhaustion for your 100 virtual machines in subnet4-1, while ensuring minimal administrative effort, you can use anAzure NAT Gateway. This service provides scalable and resilient outbound connectivity for virtual networks, dynamically allocating SNAT ports to avoid exhaustion.

Step-by-Step Solution

Step 1: Create a NAT Gateway

Navigate to the Azure Portal.

Search for ''NAT gateways''and select it.

Click on ''Create''.

Enter the following details:

Subscription: Select your subscription.

Resource Group: Select an existing resource group or create a new one.

Name: Enter a name for the NAT gateway (e.g.,NATGateway-Subnet4-1).

Region: Select the region where your virtual network is located.

Click on ''Next: Outbound IP''.

Step 2: Configure Outbound IP Addresses

Choose whether to use existing public IP addresses or create new ones.

If creating new ones, click on''Add new''and configure the new public IP addresses.

Click on ''Next: Subnet''.

Step 3: Associate the NAT Gateway with Subnet4-1

Click on ''Associate subnet''.

Select the virtual networkthat contains subnet4-1.

Select subnet4-1from the list of subnets.

Click on ''OK''.

Step 4: Review and Create

Review your settingsto ensure everything is correct.

Click on ''Review + create''and then''Create''.

Explanation

Azure NAT Gateway: This service provides outbound connectivity for virtual networks, dynamically allocating SNAT ports across all VM instances within a subnet.This dynamic allocation helps prevent SNAT port exhaustion, especially in scenarios with high outbound connection volumes12.

Dynamic SNAT Port Allocation: Unlike static allocation methods, NAT Gateway dynamically allocates SNAT ports based on demand, ensuring efficient use of available ports and reducing the risk of exhaustion2.

By following these steps, you can ensure that your 100 virtual machines in subnet4-1 can make the necessary API calls without running into SNAT port exhaustion, all while minimizing administrative effort.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

SIMULATION

Task 8

You plan to deploy an appliance to subnet3-2- The appliance will perform packet inspection and will have an IP address of 10.3.2.100.

You need to ensure that all traffic to the internet from subnet3-1 is forwarded to the appliance for inspection.


Correct : A

To ensure that all traffic to the internet from subnet3-1 is forwarded to the appliance in subnet3-2 for packet inspection, you can useUser-Defined Routes (UDRs)to direct the traffic. Here's how you can do it:

Step-by-Step Solution

Step 1: Create a Route Table

Navigate to the Azure Portal.

Search for ''Route tables''and select it.

Click on ''Create''.

Enter the following details:

Subscription: Select your subscription.

Resource Group: Select an existing resource group or create a new one.

Name: Enter a name for the route table (e.g.,RouteTable-Subnet3-1).

Region: Select the region where your virtual network is located.

Click on ''Review + create''and then''Create''.

Step 2: Add a Route to the Route Table

Navigate to the newly created route table.

Select ''Routes''from the left-hand menu.

Click on ''Add''to create a new route.

Enter the following details:

Route name: Enter a name for the route (e.g.,RouteToAppliance).

Address prefix: Enter0.0.0.0/0to route all internet traffic.

Next hop type: SelectVirtual appliance.

Next hop address: Enter the IP address of the appliance (10.3.2.100).

Click on ''OK''to add the route.

Step 3: Associate the Route Table with Subnet3-1

Navigate to the route table.

Select ''Subnets''from the left-hand menu.

Click on ''Associate''.

Select the virtual networkthat contains subnet3-1.

Select subnet3-1from the list of subnets.

Click on ''OK''.

Explanation

User-Defined Routes (UDRs): These allow you to control the routing of traffic within your virtual network.By defining a route that directs all internet-bound traffic to the appliance, you ensure that the traffic is inspected before it reaches the internet1.

Virtual Appliance: This is a network appliance that performs specific functions, such as packet inspection, and is treated as a next hop in the routing table2.

Route Table Association: Associating the route table with subnet3-1 ensures that all traffic from this subnet follows the defined routes.

By following these steps, you can ensure that all internet-bound traffic from subnet3-1 is forwarded to the appliance in subnet3-2 for inspection, thereby enhancing your network security.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

SIMULATION

Task 9

You plan to use VNET4 for an Azure API Management implementation.

You need to configure a policy that can be used by an Azure application gateway to protect against known web attack vectors. The policy must only allow requests that originate from IP addresses in Canad

a. You do NOT need to create the application gateway to complete this task.


Correct : A

To configure a policy in Azure API Management that can be used by an Azure Application Gateway to protect against known web attack vectors and only allow requests from IP addresses in Canada, follow these steps:

Step-by-Step Solution

Step 1: Create or Access Your API Management Instance

Navigate to the Azure Portal.

Search for ''API Management services''and select your API Management instance.

Step 2: Configure the Policy

In the API Management instance, go to the''APIs''section.

Select the APIyou want to apply the policy to.

Go to the ''Design'' tab.

Select ''All operations''if you want to apply the policy to all operations, or select a specific operation.

Step 3: Add the Inbound Policy

In the Inbound processing section, click on''+ Add policy''.

Select ''IP filter''from the list of policies.

Add the IP address ranges for Canada. You can find the IP ranges for Canada from a reliable source or use a service that provides this information.

Here is an example of the XML configuration for the policy:

<inbound>

<ip-filter action='allow'>

<!-- Add other Canadian IP ranges as needed -->

</ip-filter>

<ip-filter action='deny'>

</ip-filter>

</inbound>

Save the policyto apply the changes.

Explanation

IP Filter Policy: This policy allows you to filter incoming requests based on their IP addresses. By specifying the IP ranges for Canada, you ensure that only requests originating from these IPs are allowed.

Inbound Processing: Applying the policy in the inbound section ensures that the requests are filtered before they reach your API.

By following these steps, you can configure a policy in Azure API Management that restricts access to your API to only those requests originating from IP addresses in Canada, thereby enhancing security and compliance


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

SIMULATION

Task 10

You plan to deploy several virtual machines to subnet1-2.

You need to prevent all Azure hosts outside of subnetl-2 from connecting to TCP port 5585 on hosts on subnet1-2. The solution must minimize administrative effort.


Correct : A

To prevent all Azure hosts outside of subnet1-2 from connecting to TCP port 5585 on hosts within subnet1-2, you can use aNetwork Security Group (NSG). This solution is straightforward and minimizes administrative effort.

Step-by-Step Solution

Step 1: Create a Network Security Group (NSG)

Navigate to the Azure Portal.

Search for ''Network security groups''and select it.

Click on ''Create''.

Enter the following details:

Subscription: Select your subscription.

Resource Group: Select an existing resource group or create a new one.

Name: Enter a name for the NSG (e.g.,NSG-Subnet1-2).

Region: Select the region where your virtual network is located.

Click on ''Review + create''and then''Create''.

Step 2: Create an Inbound Security Rule

Navigate to the newly created NSG.

Select ''Inbound security rules''from the left-hand menu.

Click on ''Add''to create a new rule.

Enter the following details:

Source: SelectService Tag.

Source Service Tag: SelectVirtualNetwork.

Source port ranges: Leave as*.

Destination: SelectIP Addresses.

Destination IP addresses/CIDR ranges: Enter the IP range of subnet1-2 (e.g.,10.1.2.0/24).

Destination port ranges: Enter5585.

Protocol: SelectTCP.

Action: SelectDeny.

Priority: Enter a priority value (e.g.,100).

Name: Enter a name for the rule (e.g.,Deny-TCP-5585).

Click on ''Add''to create the rule.

Step 3: Associate the NSG with Subnet1-2

Navigate to the virtual networkthat contains subnet1-2.

Select ''Subnets''from the left-hand menu.

Select subnet1-2from the list of subnets.

Click on ''Network security group''.

Select the NSGyou created (NSG-Subnet1-2).

Click on ''Save''.

Explanation

Network Security Group (NSG): NSGs are used to filter network traffic to and from Azure resources in an Azure virtual network.They contain security rules that allow or deny inbound and outbound traffic based on source and destination IP addresses, port, and protocol1.

Inbound Security Rule: By creating a rule that denies traffic on TCP port 5585 from any source outside of subnet1-2, you ensure that only hosts within subnet1-2 can connect to this port.

Association with Subnet: Associating the NSG with subnet1-2 ensures that the security rules are applied to all resources within this subnet.

By following these steps, you can effectively prevent all Azure hosts outside of subnet1-2 from connecting to TCP port 5585 on hosts within subnet1-2, while minimizing administrative effort.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

SIMULATION

Task 11

You need to ensure that only hosts on VNET1 can access the slcnage42150372 storage account. The solution must ensure that access occurs over the Azure backbone network.


Correct : A

To ensure that only hosts on VNET1 can access theslcnage42150372storage account and that access occurs over the Azure backbone network, you can useAzure Private Endpoints. This method secures the connection by assigning a private IP address from your virtual network to the storage account, ensuring that traffic does not traverse the public internet.

Step-by-Step Solution

Step 1: Create a Private Endpoint for the Storage Account

Navigate to the Azure Portal.

Search for ''Storage accounts''and select theslcnage42150372storage account.

In the storage account blade, select''Networking''under the ''Security + networking'' section.

Under ''Private endpoint connections'', click on''Add private endpoint''.

Enter the following details:

Name: Enter a name for the private endpoint (e.g.,PrivateEndpoint-VNET1).

Region: Select the same region as your virtual network (VNET1).

Click on ''Next: Resource''.

Step 2: Configure the Resource

Select ''Target sub-resource'': Choose the storage service you want to connect to (e.g.,blob,file,queue,table).

Click on ''Next: Virtual network''.

Step 3: Select the Virtual Network and Subnet

Select the virtual network: Choose VNET1.

Select the subnet: Choose the appropriate subnet within VNET1.

Click on ''Next: Configuration''.

Step 4: Configure DNS Integration (Optional)

Configure DNS settingsif needed to ensure proper name resolution within your virtual network.

Click on ''Next: Tags'', add any tags if necessary, and then click on''Review + create''.

Review your settingsand click on''Create''.

Step 5: Restrict Public Network Access

Navigate back to the storage account.

Select ''Networking''under the ''Security + networking'' section.

Under ''Firewalls and virtual networks'', select''Selected networks''.

Ensure that only VNET1 is listedunder the virtual networks section.

Click on ''Save''.

Explanation

Private Endpoints: These provide secure connectivity to Azure services by assigning a private IP address from your VNet to the service, ensuring that traffic stays within the Azure backbone network12.

Firewall and Virtual Networks: Configuring the storage account to allow access only from selected networks (VNET1) ensures that no other network can access the storage account3.

By following these steps, you can ensure that only hosts on VNET1 can access theslcnage42150372storage account, and that all access occurs over the secure Azure backbone network.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500