az-104 dumps topic 5, 1-150 Flashcards
You have an Azure subscription named Sub1.
You plan to deploy a multi-tiered application that will contain the tiers shown in the following table.
Tier Accessible from the Internet Number of virtual machines
Front-end web server Yes 10
Business logic No 100
Microsoft SQL Server database No 5
You need to recommend a networking solution to meet the following requirements:
✑ Ensure that communication between the web servers and the business logic tier spreads equally across the virtual machines.
✑ Protect the web servers from SQL injection attacks.
Which Azure resource should you recommend for each requirement?
Hot Area:
Ensure that communication between the web servers and the business logic tier spreads equally across the virtual machines:
Protect the web servers from SQL injection attacks:
- an application gateway that uses the Standard tier
- an application gateway that uses the WAF tier
- an internal load balancer
- a network security group (NSG)
- a public load balancer
Ensure that communication between the web servers and the business logic tier spreads equally across the virtual machines:
- an internal load balancer
Azure Internal Load Balancer (ILB) provides network load balancing between virtual machines that reside inside a cloud service or a virtual
network with a regional scope.
Protect the web servers from SQL injection attacks:
- an application gateway that uses the WAF tier
Azure Web Application Firewall (WAF) on Azure Application Gateway provides centralized protection of your web applications from common exploits and vulnerabilities. Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities.
Reference:
https://docs.microsoft.com/en-us/azure/web-application-firewall/ag/ag-overview
Your company has three offices. The offices are located in Miami, Los Angeles, and New York. Each office contains datacenter.
You have an Azure subscription that contains resources in the East US and West US Azure regions. Each region contains a virtual network. The virtual networks are peered.
You need to connect the datacenters to the subscription. The solution must minimize network latency between the datacenters.
What should you create?
A. three Azure Application Gateways and one On-premises data gateway
B. three virtual hubs and one virtual WAN
C. three virtual WANs and one virtual hub
D. three On-premises data gateways and one Azure Application Gateway
B. three virtual hubs and one virtual WAN
https://learn.microsoft.com/en-us/azure/virtual-wan/hub-settings
You can have more than one virtual hub in the region
You plan to deploy five virtual machines to a virtual network subnet.
Each virtual machine will have a public IP address and a private IP address.
Each virtual machine requires the same inbound and outbound security rules.
What is the minimum number of network interfaces and network security groups that you require?
Minimum number of network interfaces: 5, 10, 15, 20
Minimum number of network security groups: 1, 2, 5, 10
Minimum number of network interfaces: 5
A public and a private IP address can be assigned to a single network interface.
Minimum number of network security groups: 1
You can associate zero, or one, network security group to each virtual network subnet and network interface in a virtual machine. The same network security group can be associated to as many subnets and network interfaces as you choose.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-network-interface-addresses
You have an Azure subscription that contains the resources shown in the following table.
Name Туре
LB1 Load balancer
VM1 Virtual machine
VM2 Virtual machine
LB1 is configured as shown in the following table.
Name Type Value
bepool1 Backend pool VM1, VM2
LoadBalancerFrontEnd Frontend IP configuration Public IP address
hprobe1 Health probe Protocol: TCP, Port: 80, Interval: 5 seconds, Unhealthy threshold: 2
rule1 Load balancing rule IP version: IPv4, Frontend IP address: LoadBalancerFrontEnd, Port: 80, Backend Port: 80, Backend pool: bepool1, Health probe: hprobel
You plan to create new inbound NAT rules that meet the following requirements:
✑ Provide Remote Desktop access to VM1 from the internet by using port 3389.
✑ Provide Remote Desktop access to VM2 from the internet by using port 3389.
What should you create on LB1 before you can create the new inbound NAT rules?
A. a frontend IP address
B. a load balancing rule
C. a health probe
D. a backend pool
A. a frontend IP address
You have Azure virtual machines that run Windows Server 2019 and are configured as shown in the following table.
Name Private IP address Public IP address Virtual network name DNS suffix configured in Windows Server
VM1 10.1.0.4 52.186.85.63 VNET1 Adatum.com
VM2 10.1.0.5 13.92.168.13 VNET1 Contoso.com
You create a private Azure DNS zone named adatum.com. You configure the adatum.com zone to allow auto registration from VNET1.
Which A records will be added to the adatum.com zone for each virtual machine?
Hot Area:
A records for VM1:
A records for VM2:
None
Private IP address only
Public IP address only
Private IP address and public IP address
A records for VM1:
A records for VM2: Private IP address only
The virtual machines are registered (added) to the private zone as A records pointing to their private IP addresses.
Since both VM1 & VM2 are in same Vnet1 and the Vnet1 is liked under adatum.com domain (Private DNS Zone->Setting->virtual network links).
Reference:
https://docs.microsoft.com/en-us/azure/dns/private-dns-overview
https://docs.microsoft.com/en-us/azure/dns/private-dns-scenarios
You have an Azure virtual network named VNet1 that connects to your on-premises network by using a site-to-site VPN. VNet1 contains one subnet named Sunet1.
Subnet1 is associated to a network security group (NSG) named NSG1. Subnet1 contains a basic internal load balancer named ILB1. ILB1 has three Azure virtual machines in the backend pool.
You need to collect data about the IP addresses that connects to ILB1. You must be able to run interactive queries from the Azure portal against the collected data.
What should you do?
Resource to create:
An Azure Event Grid
An Azure Log Analytics workspace
An Azure Storage account
Resource on which to enable diagnostics:
ILB1
NSG1
The Azure virtual machines
Resource to create: An Azure Log Analytics workspace
In the Azure portal you can set up a Log Analytics workspace, which is a unique Log Analytics environment with its own data repository, data
sources, and solutions
Resource on which to enable diagnostics: ILB1
Reference:
https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-quick-create-workspace
https://docs.microsoft.com/en-us/azure/loadbalancer/load-balancer-standard-diagnostics
You have the Azure virtual networks shown in the following table.
Name Address space Subnet Resource group Azure region
VNet1 10.11.0.0/16 10.11.0.0/17 West US
VNet2 10.11.0.0/17 10.11.0.0/25 West US
VNet3 10.10.0.0/22 10.10.1.0/24 East US
VNet4 192.168.16.0/22 192.168.16.0/24 North Europe
To which virtual networks can you establish a peering connection from VNet1?
A. VNet2 andVNet3 only
B. VNet2 only
C. VNet3 and VNet4 only
D. VNet2, VNet3, and VNet4
C. VNet3 and VNet4 only
VNet1 10.11.0.0/16 = 10.11.0.1 - 10.11.255.255 (overlap VNet2)
VNet2 10.11.0.0/17 = 10.11.0.1 - 10.11.127.254 (overlap VNet1)
VNet3 10.10.0.0/22 = 10.10.0.1 - 10.10.3.254 (no overlap)
VNet4 192.168.16.0/22 = 192.168.16.1 - 192.168.19.254 (no overlap)
Possible peerings are:
VNet1 -> Vnet3
VNet1 -> Vnet4
If a virtual network has address ranges that overlap with another virtual network or on-premises network, the two networks can’t be connected.
You have an Azure subscription that contains a virtual network named VNet1. VNet1 contains four subnets named Gateway, Perimeter, NVA, and Production.
The NVA subnet contains two network virtual appliances (NVAs) that will perform network traffic inspection between the Perimeter subnet and the Production subnet.
You need to implement an Azure load balancer for the NVAs. The solution must meet the following requirements:
✑ The NVAs must run in an active-active configuration that uses automatic failover.
✑ The load balancer must load balance traffic to two services on the Production subnet. The services have different IP addresses.
Which three actions should you perform?
A. Deploy a basic load balancer
B. Deploy a standard load balancer
C. Add two load balancing rules that have HA Ports and Floating IP enabled
D. Add two load balancing rules that have HA Ports enabled and Floating IP disabled
E. Add a frontend IP configuration, a backend pool, and a health probe
F. Add a frontend IP configuration, two backend pools, and a health probe
B. Deploy a standard load balancer
C. Add two load balancing rules that have HA Ports and Floating IP enabled
F. Add a frontend IP configuration, two backend pools, and a health probe
B - HA ports need are not supported by a basic loadbalancer
C - You need a floating ip for the active-active configuration to switch over quickly
F - You need 2 backend pools for the 2 different services
A standard load balancer is required for the HA ports.
Two backend pools are needed as there are two services with different IP addresses.
Floating IP rule is used where backend ports are reused.
Incorrect Answers:
E: HA Ports are not available for the basic load balancer.
Reference:
https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-standard-overview https://docs.microsoft.com/en-us/azure/loadbalancer/load-balancer-multivip-overview
You have an Azure subscription. The subscription contains virtual machines that run Windows Server 2016 and are configured as shown in the following table.
Name Virtual network DNS suffix configured in Windows Server
VM1 VNET2 Contoso.com
VM2 VNET2 None
VM3 VNET2 Adatum.com
You create a public Azure DNS zone named adatum.com and a private Azure DNS zone named contoso.com.
You create a virtual network link for contoso.com as shown in the following exhibit.
link1: contoso.com
Link name: link1
Link state: Completed
Provisioning state: Succeeded
Virtual network: VNET2
Configuration: [+] Enable auto registration
Yes/No
When VM1 starts, a record for VM1 is added to the contoso.com DNS zone.
When VM2 starts, a record for VM2 is added to the contoso.com DNS zone.
When VM3 starts, a record for VM3 is added to the adatum.com DNS zone.
When VM1 starts, a record for VM1 is added to the contoso.com DNS zone. - Yes
Auto registration is enabled for private Azure DNS zone named contoso.com.
When VM2 starts, a record for VM2 is added to the contoso.com DNS zone. - Yes
Auto registration is enabled for private Azure DNS zone named contoso.com.
When VM3 starts, a record for VM3 is added to the adatum.com DNS zone. - No
None of the VM will auto-register to the public Azure DNS zone named adatum.com
All three VMs are in VNET2. Auto registration is enabled for private Azure DNS zone named contoso.com, which is linked to VNET2. So, VM1, VM2 and VM3 will auto-register their host records to contoso.com.
None of the VM will auto-register to the public Azure DNS zone named adatum.com. You cannot register private IPs on the internet (adatum.com)
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances
https://docs.microsoft.com/en-us/azure/dns/private-dns-autoregistration
https://docs.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links
You have an Azure subscription that contains the resources in the following table.
Name Type Azure region Resource group
VNet1 Virtual network West US RG2
VNet2 Virtual network West US RG1
VNet3 Virtual network East US RG1
NSG1 Network security group (NSG) East US RG2
To which subnets can you apply NSG1?
A. the subnets on VNet1 only
B. the subnets on VNet2 and VNet3 only
C. the subnets on VNet2 only
D. the subnets on VNet3 only
E. the subnets on VNet1, VNet2, and VNet3
D. the subnets on VNet3 only
All Azure resources are created in an Azure region and subscription. A resource can only be created in a virtual network that exists in the same
region and subscription as the resource.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-vnet-plan-design-arm
You have an Azure subscription that contains two virtual networks named VNet1 and VNet2. Virtual machines connect to the virtual networks.
The virtual networks have the address spaces and the subnets configured as shown in the following table.
Virtual network Address space Subnet Peering
VNet1 10.1.0.0/16 10.1.0.0/24, 10.1.1.0/26 VNet2
VNet2 10.2.0.0/16 10.2.0.0/24 VNet1
You need to add the address space of 10.33.0.0/16 to VNet1. The solution must ensure that the hosts on VNet1 and VNet2 can communicate.
Which three actions should you perform in sequence?
Select and Place Actions:
Remove VNet1.
Add the 10.33.0.0/16 address space to VNet1.
Create a new virtual network named VNet1.
On the peering connection in VNet2, allow gateway transit.
Recreate peering between VNet1 and VNet2.
On the peering connection in VNet1, allow gateway transit.
Remove peering between VNet1 and VNet2
Remove peering between VNet1 and VNet2.
Add the 10.33.0.0/16 address space to VNet1.
Recreate peering between VNet1 and VNet2.
You can’t add address ranges to, or delete address ranges from a virtual network’s address space once a virtual network is peered with another virtual network.
To add or remove address ranges, delete the peering, add or remove the address ranges, then re-create the peering.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-manage-peering
You have an Azure subscription that contains the resource groups shown in the following table.
Name Location
RG1 West US
RG2 East US
RG1 contains the resources shown in the following table.
Name Type Location
storage1 Storage account West US
VNet1 Virtual network West US
NIC1 Network interface West US
Disk1 Disk West US
VM1 Virtual machine West US
VM1 is running and connects to NIC1 and Disk1. NIC1 connects to VNET1.
RG2 contains a public IP address named IP2 that is in the East US location. IP2 is not assigned to a virtual machine.
Yes/No Statements
You can move storage1 to RG2.
You can move NIC1 to RG2.
If you move IP2 to RG1, the location of IP2 will change.
You can move storage1 to RG2. - Yes
You can move NIC1 to RG2. - Yes
If you move IP2 to RG1, the location of IP2 will change. - No
- You can move the Storage Account to RG2, however it stayed in the West US region. You cannot change the Region, you need to recreate the Storage Account.
- You can move move NIC1 to RG2 which was associated with VM1 and VNET1 subnet1, however it stayed in the West US region. You can move a NIC to a different RG or Subscription by selecting (change) next to the RG or Subscription name. If you move the NIC to a new Subscription, you must move all resources related to the NIC with it. If the network interface is attached to a virtual machine, for example, you must also move the virtual machine, and other virtual machine-related resources.
- You can move IP2 to RG1, as it isn’t associated with any other resource, however it stayed in the East US region. The location will not change.
You have an Azure web app named webapp1.
You have a virtual network named VNET1 and an Azure virtual machine named VM1 that hosts a MySQL database. VM1 connects to VNET1.
You need to ensure that webapp1 can access the data hosted on VM1.
What should you do?
A. Deploy an internal load balancer
B. Peer VNET1 to another virtual network
C. Connect webapp1 to VNET1
D. Deploy an Azure Application Gateway
C. Connect webapp1 to VNET1
You create an Azure VM named VM1 that runs Windows Server 2019.
VM1 is configured as shown in the exhibit. (Click the Exhibit tab.)
Buttons: Connect (is en) Start (is en) Restart (is dis) Stop (is dis)
Status: Stopped (deallocated)
You need to enable Desired State Configuration for VM1.
What should you do first?
A. Connect to VM1.
B. Start VM1.
C. Capture a snapshot of VM1.
D. Configure a DNS name for VM1.
B. Start VM1.
Status is Stopped (Deallocated).
The DSC extension for Windows requires that the target virtual machine is able to communicate with Azure. The VM needs to be started.
Reference:
https://docs.microsoft.com/en-us/azure/virtual-machines/extensions/dsc-windows
You have five Azure virtual machines that run Windows Server 2016. The virtual machines are configured as web servers.
You have an Azure load balancer named LB1 that provides load balancing services for the virtual machines.
You need to ensure that visitors are serviced by the same web server for each request.
What should you configure?
A. Floating IP (direct server return) to Disabled
B. Session persistence to None
C. Floating IP (direct server return) to Enabled
D. Session persistence to Client IP
E. Protocol to UDP
F. a health probe
G. Idle Time-out (minutes) to 20
D. Session persistence to Client IP
(or Session persistence to Client IP and protocol)
With Sticky Sessions when a client starts a session on one of your web servers, session stays on that specific server. To configure An Azure Load-Balancer For Sticky Sessions set Session persistence to Client IP or to Client IP and protocol. Note:
✑ Client IP and protocol specifies that successive requests from the same client IP address and protocol combination will be handled by the
same virtual machine.
✑ Client IP specifies that successive requests from the same client IP address will be handled by the same virtual machine.
Reference:
https://cloudopszone.com/configure-azure-load-balancer-for-sticky-sessions/
Note: This question is part of a series of questions that present the same scenario.
You have an Azure subscription that contains the following resources:
✑ A virtual network that has a subnet named Subnet1
✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1
✑ A virtual machine named VM1 that has the required Windows Server configurations to allow Remote Desktop connections.
NSG-Subnet1 has the default inbound security rules only.
NSG-VM1 has the default inbound security rules and the following custom inbound security rule:
✑ Priority: 100
✑ Source: Any
✑ Source port range: *
✑ Destination: *
✑ Destination port range: 3389
✑ Protocol: UDP
✑ Action: Allow
VM1 has a public IP address and is connected to Subnet1. NSG-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1.
You need to be able to establish Remote Desktop connections from the internet to VM1.
Solution: You add an inbound security rule to NSG-Subnet1 that allows connections from the Any source to the *destination for port range 3389 and uses the TCP protocol. You remove NSG-VM1 from the network interface of VM1.
Does this meet the goal?
A. Yes
B. No
A. Yes
NSG-Subnet 1 is correctly modified with TCP 3389 and NSG-VM1 is removed.
If you have no NSG (Network Security Group) attached to your VM’s network interface (NIC) or subnet, then NSG rules will not block RDP traffic.
- “Another solution: You add an inbound security rule to NSG-Subnet1 and NSG-VM1 that allows connections from the internet source to the VirtualNetwork destination for port range 3389 and uses the TCP protocol.”
Note: This question is part of a series of questions that present the same scenario.
You have an Azure subscription that contains the following resources:
✑ A virtual network that has a subnet named Subnet1
✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1
✑ A virtual machine named VM1 that has the required Windows Server configurations to allow Remote Desktop connections.
NSG-Subnet1 has the default inbound security rules only.
NSG-VM1 has the default inbound security rules and the following custom inbound security rule:
✑ Priority: 100
✑ Source: Any
✑ Source port range: *
✑ Destination: *
✑ Destination port range: 3389
✑ Protocol: UDP
✑ Action: Allow
VM1 has a public IP address and is connected to Subnet1. NSG-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1.
You need to be able to establish Remote Desktop connections from the internet to VM1.
Solution: You add an inbound security rule to NSG-Subnet1 that allows connections from the internet source to the VirtualNetwork destination for port range 3389 and uses the UDP protocol.
Does this meet the goal?
A. Yes
B. No
B. No
The default port for RDP is TCP port 3389.
- “Solution: You add an inbound security rule to NSG-Subnet1 that allows connections from the Any source to the *destination for port range 3389 and uses the TCP protocol. You remove NSG-VM1 from the network interface of VM1.”
Reference:
https://docs.microsoft.com/en-us/azure/virtual-machines/troubleshooting/troubleshoot-rdp-connection
Note: This question is part of a series of questions that present the same scenario.
You have an Azure subscription that contains the following resources:
✑ A virtual network that has a subnet named Subnet1
✑ Two network security groups (NSGs) named NSG-VM1 and NSG-Subnet1
✑ A virtual machine named VM1 that has the required Windows Server configurations to allow Remote Desktop connections.
NSG-Subnet1 has the default inbound security rules only.
NSG-VM1 has the default inbound security rules and the following custom inbound security rule:
✑ Priority: 100
✑ Source: Any
✑ Source port range: *
✑ Destination: *
✑ Destination port range: 3389
✑ Protocol: UDP
✑ Action: Allow
VM1 has a public IP address and is connected to Subnet1. NSG-VM1 is associated to the network interface of VM1. NSG-Subnet1 is associated to Subnet1.
You need to be able to establish Remote Desktop connections from the internet to VM1.
Solution: You add an inbound security rule to NSG-Subnet1 and NSG-VM1 that allows connections from the internet source to the VirtualNetwork destination for port range 3389 and uses the TCP protocol.
Does this meet the goal?
A. Yes
B. No
A. Yes
Both rules on NSG-VM1 allow. And the 101 allows RDP.
- “Another solution: You add an inbound security rule to NSG-Subnet1 that allows connections from the Any source to the *destination for port range 3389 and uses the TCP protocol. You remove NSG-VM1 from the network interface of VM1.”
Reference:
https://docs.microsoft.com/en-us/azure/virtual-machines/troubleshooting/troubleshoot-rdp-connection
You have a virtual network named VNet1 that has the configuration shown in the following exhibit.
addressSpace: “addressPrefixes”: [ “10.2.0.0/16” ]
subnets: “addressPrefixes”: [ “10.2.0.0/24” ]
Drop-downs:
Before a virtual machine on VNet1 can receive an IP address from 192.168.1.0/24, you must first:
Before a virtual machine on VNet1 can receive an IP address from 10.2.1.0/24, you must first:
- add a network interface
- add a subnet
- add an address space
- delete a subnet
- delete an address space
Before a virtual machine on VNet1 can receive an IP address from 192.168.1.0/24, you must first: - add an address space
Before a virtual machine on VNet1 can receive an IP address from 10.2.1.0/24, you must first: - add a subnet
1: add an address space -
Your IaaS virtual machines (VMs) and PaaS role instances in a virtual network automatically receive a private IP address from a range that you specify, based on the address space of the subnet they are connected to. We need to add the 192.168.1.0/24 address space.
Box 2: - add a subnet
The 10.2.0.0/24 subnet exists, the 10.2.1.0/24 doesn’t (first 24 digits reserved for subnet).
Reference:
https://docs.microsoft.com/en-us/office365/enterprise/designing-networking-for-microsoft-azure-iaas
You have an Azure subscription that contains a virtual network named VNET1. VNET1 contains the subnets shown in the following table.
Name Connected VM
Subnet1 VM1, VM2
Subnet2 VM3, VM4
Subnet3 VM5, VM6
Each virtual machine uses a static IP address.
You need to create network security groups (NSGs) to meet following requirements:
✑ Allow web requests from the internet to VM3, VM4, VM5, and VM6.
✑ Allow all connections between VM1 and VM2.
✑ Allow Remote Desktop connections to VM1.
✑ Prevent all other network traffic to VNET1.
What is the minimum number of NSGs you should create?
A. 1
B. 3
C. 4
D. 12
A. 1
NSGs can be associated to subnets, individual VMs (classic), or individual network interfaces (NIC) attached to VMs (Resource Manager). You can associate zero, or one, NSG(s) to each VNet subnet and NIC in a virtual machine. The same NSG can be associated to as many subnets and NICs as you choose.
So, you can create 1 NSG and associate it with all 3 Subnets:
- Allow web requests from internet to VM3, VM4, VM5 and VM 6: You need to add an inbound rule to allow Internet TCP 80 to VM3, VM4, VM5 and VM6 static IP addresses.
- Allow all connections between VM1 & VM2: You do not need an NSG as communication in the same VNet is allowed by default, without even configuring NSG.
- Allow remote desktop to VM1: You need to add an inbound rule to allow RDP 3389 in VM1’s static IP address .
- Prevent all other network traffic to VNET1: You do not need to configure any NSG as the there is explicit deny rule (DenyAllInbound) in every NSG.
You have an Azure subscription that contains the resources shown in the following table.
Name Type Resource group
VNET1 V net RG1
VM1 V mach RG1
The Not allowed resource types Azure policy that has policy enforcement enabled is assigned to RG1 and uses the following parameters:
Microsoft.Network/virtualNetworks
Microsoft.Compute/virtualMachines
In RG1, you need to create a new virtual machine named VM2, and then connect VM2 to VNET1. What should you do first?
A. Remove Microsoft.Compute/virtualMachines from the policy.
B. Create an Azure Resource Manager template
C. Add a subnet to VNET1.
D. Remove Microsoft.Network/virtualNetworks from the policy.
A. Remove Microsoft.Compute/virtualMachines from the policy.
The Not allowed resource types Azure policy prohibits the deployment of specified resource types. You specify an array of the resource types to block. Virtual Networks and Virtual Machines are prohibited.
Reference:
https://docs.microsoft.com/en-us/azure/governance/policy/samples/not-allowed-resource-types
Your company has an Azure subscription named Subscription1.
The company also has two on-premises servers named Server1 and Server2 that run Windows Server 2016. Server1 is configured as a DNS server that has a primary DNS zone named adatum.com. Adatum.com contains 1,000 DNS records.
You manage Server1 and Subscription1 from Server2. Server2 has the following tools installed:
✑ The DNS Manager console
✑ Azure PowerShell
✑ Azure CLI 2.0
You need to move the adatum.com zone to an Azure DNS zone in Subscription1. The solution must minimize administrative effort.
What should you use?
A. Azure CLI
B. Azure PowerShell
C. the Azure portal
D. the DNS Manager console
A - Azure CLI.
https://docs.microsoft.com/en-us/azure/dns/dns-import-export
- Azure DNS supports importing and exporting zone files by using the Azure command-line interface (CLI). Zone file import is not currently supported via Azure PowerShell or the Azure portal.
PrivateDNSMigrationScript is for migrating legacy Azure DNS private zones to the new Azure DNS private zone resource.
You have a public load balancer that balances ports 80 and 443 across three virtual machines named VM1, VM2, and VM3.
You need to direct all the Remote Desktop Protocol (RDP) connections to VM3 only.
What should you configure?
A. an inbound NAT rule
B. a new public load balancer for VM3
C. a frontend IP configuration
D. a load balancing rule
(next 25)
A. an inbound NAT rule
Reference:
https://docs.microsoft.com/en-us/azure/load-balancer/tutorial-load-balancer-port-forwarding-portal https://pixelrobots.co.uk/2017/08/azureload-balancer-for-rds/
You have an on-premises network that you plan to connect to Azure by using a site-so-site VPN.
In Azure, you have an Azure virtual network named VNet1 that uses an address space of 10.0.0.0/16 VNet1 contains a subnet named Subnet1 that uses an address space of 10.0.0.0/24. You need to create a site-to-site VPN to Azure.
Which four actions should you perform in sequence?
Create a local gateway.
Create a VPN gateway.
Create a gateway subnet.
Create a custom DNS server.
Create a VPN connection.
Create an Azure Content Delivery Network (CDN) profile.
(next 28)
Create a gateway subnet.
Create a VPN gateway.
Create a local gateway.
Create a VPN connection.
Always work from the Azure side first, it’s a dependency.