Free Practice Test

Free AZ-104 Practice Test – 2025 Updated

Prepare smarter for your AZ-104 exam with our free, accurate, and 2025-updated questions.

At Cert Empire, we are committed to providing the best and the latest exam questions to the aspiring students who are preparing for Microsoft AZ-104 Exam. To help the students prepare better, we have made sections of our AZ-104 exam preparation resources free for all. You can practice as much as you can with Free AZ-104 Practice Test.

Question 1

Your company has an Azure subscription named Subscription1. The company also has two on-premises servers named Server1 and Server2 that run Windows Server 2016. Server1 is con๏ฌgured as a DNS server that has a primary DNS zone named adatum.com. Adatum.com contains 1,000 DNS records. You manage Server1 and Subscription1 from Server2. Server2 has the following tools installed: The DNS Manager console Azure PowerShell Azure CLI 2.0 You need to move the adatum.com zone to an Azure DNS zone in Subscription1. The solution must minimize administrative effort. What should you use?
Options
A: Azure CLI
B: Azure PowerShell
C: the Azure portal
D: the DNS Manager console
Show Answer
Correct Answer:
Azure CLI
Explanation
The most ef๏ฌcient method to migrate a large DNS zone with 1,000 records from an on- premises server to Azure is by using the Azure CLI. The Azure CLI provides a speci๏ฌc command, az network dns zone import, which is designed to take a standard DNS zone ๏ฌle and automatically create all the corresponding records in an Azure DNS zone. This single- command operation signi๏ฌcantly minimizes administrative effort compared to manually creating records or scripting the process.
Why Incorrect Options are Wrong

B. Azure PowerShell: While Azure PowerShell can manage Azure DNS, it lacks a single,

dedicated cmdlet for importing an entire zone ๏ฌle. Accomplishing this would require writing a

custom script to parse the ๏ฌle and create each record individually, which is more effort.

C. the Azure portal: Using the Azure portal would require manually creating each of the

1,000 DNS records. This is the most time-consuming and error-prone method, representing

the maximum administrative effort.

D. the DNS Manager console: This tool is used to manage on-premises Windows Server

DNS. It has no native capability to interact with or migrate zones directly to the Azure DNS

service.

References

1. Microsoft Azure Documentation, "Tutorial: Import and export a DNS zone ๏ฌle using the

Azure CLI": This of๏ฌcial tutorial explicitly details the use of the az network dns zone import

command as the primary method for importing a zone ๏ฌle. It states, "This article explains

how to import and export a DNS zone ๏ฌle for Azure DNS by using the Azure CLI."

URL: https://learn.microsoft.com/en-us/azure/dns/dns-import-export

2. Microsoft Azure Documentation, "az network dns zone import": The reference for the

speci๏ฌc Azure CLI command con๏ฌrms its purpose: "Create a DNS zone and records from a

local zone ๏ฌle." This directly addresses the requirement to move the zone with minimal

effort.

URL: https://learn.microsoft.com/en-us/cli/azure/network/dns/zone?view=azure-clilatest#az-network-dns-zone-import

3. Microsoft Azure Documentation, "New-AzDnsRecordSet": The documentation for the

comparable Azure PowerShell cmdlet shows it is designed to create individual record sets,

con๏ฌrming that a bulk import requires additional scripting, unlike the Azure CLI's direct

import command.

URL: https://learn.microsoft.com/en-us/powershell/module/az.dns/new-azdnsrecordset

Question 2

You have a public load balancer that balances ports 80 and 443 across three virtual machines named VM1, VM2, and VM3. You need to direct all the Remote Desktop Protocol (RDP) connections to VM3 only. What should you con๏ฌgure?
Options
A: an inbound NAT rule
B: a new public load balancer for VM3
C: a frontend IP con๏ฌguration
D: a load balancing rule
Show Answer
Correct Answer:
an inbound NAT rule
Explanation
An inbound NAT rule is the correct con๏ฌguration for forwarding traf๏ฌc from a speci๏ฌc port on the load balancer's public IP address to a speci๏ฌc virtual machine in the backend pool. The requirement is to direct all Remote Desktop Protocol (RDP) traf๏ฌc, which uses a speci๏ฌc port (typically 3389), to a single, designated virtual machine (VM3). A load balancing rule, in contrast, distributes traf๏ฌc across all available VMs in the backend pool, which is not the desired outcome.
Why Incorrect Options are Wrong

B. a new public load balancer for VM3: This is an inef๏ฌcient and unnecessary solution. The

existing load balancer is capable of handling this requirement with the correct rule

con๏ฌguration, avoiding additional cost and complexity.

C. a frontend IP con๏ฌguration: This de๏ฌnes the public IP address for the load balancer.

While necessary for the load balancer to function, it does not de๏ฌne the rules for directing

traf๏ฌc to backend resources.

D. a load balancing rule: A load balancing rule would distribute RDP connections across all

three virtual machines (VM1, VM2, and VM3), not direct them exclusively to VM3 as

required.

References

1. Microsoft Azure Documentation - What is Azure Load Balancer?: "An inbound NAT rule

forwards incoming traf๏ฌc sent to the frontend IP address and port combination to a speci๏ฌc

virtual machine or instance in the backend pool. A load balancing rule distributes incoming

traf๏ฌc across all instances within the backend pool."

URL: https://docs.microsoft.com/en-us/azure/load-balancer/load-balanceroverview#inbound-nat-rule

2. Microsoft Azure Documentation - Manage inbound NAT rules for Azure Load Balancer:

"Azure Load Balancer supports inbound network address translation (NAT) rules. You use

these rules to specify a backend resource to route traf๏ฌc to from the load balancer

frontend."

URL: https://docs.microsoft.com/en-us/azure/load-balancer/manage-inbound-nat-rules

Question 3

HOTSPOT - You have an Azure subscription named Subscription1 that contains the virtual networks in the following table. Microsoft AZ-104 Exam Questions exam question Subscription1 contains the virtual machines in the following table. Microsoft AZ-104 Exam Questions exam question In Subscription1, you create a load balancer that has the following con๏ฌgurations: Name: LB1 SKU: Basic Type: Internal Subnet: Subnet12 Virtual network: VNET1 For each of the following statements, select Yes if the statement is true. Otherwise, select No. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
The key to this question is understanding the backend pool limitations of the Basic SKU Azure Load Balancer. While all the virtual machines are within the same Virtual Network (VNet) as the load balancer (VNET1), the composition of the backend pool is restricted. 1. LB1 can balance the traf๏ฌc between VM1 and VM2: Yes o VM1 and VM2 are in the same virtual network (VNET1) as the load balancer. o Both VM1 and VM2 are members of the same availability set (AS1). o A Basic Load Balancer's backend pool can be populated by all virtual machines within a single availability set. This is a valid con๏ฌguration. 2. LB1 can balance the traf๏ฌc between VM3 and VM4: No o VM3 and VM4 are standalone virtual machines, as they are not part of any availability set. o A signi๏ฌcant limitation of the Basic Load Balancer is that its backend pool cannot contain more than one standalone virtual machine. Since balancing traf๏ฌc between VM3 and VM4 would require adding both to the same backend pool, this con๏ฌguration is not possible. 3. LB1 can balance the traf๏ฌc between VM5 and VM6: No o Similar to the previous statement, VM5 and VM6 are standalone virtual machines. o Due to the Basic SKU limitation, a backend pool cannot be con๏ฌgured with two or more standalone virtual machines. Therefore, LB1 cannot balance traf๏ฌc between VM5 and VM6.
References

โ€ข

Microsoft Azure Documentation - Load Balancer SKUs: This document

explicitly details the differences between Basic and Standard SKU load

balancers. In the feature comparison table, under "Backend pool," it speci๏ฌes

that the Basic SKU backend pool is limited to a "single availability set, single

virtual machine scale set, or a single virtual machine." This con๏ฌrms that

multiple standalone VMs are not supported in a single backend pool for the

Basic SKU.

o URL: https://docs.microsoft.com/en-us/azure/load-balancer/skus (Refer

to the "SKU comparison" section).

โ€ข

Microsoft Azure Documentation - Load Balancer Components: This page

details the components of a load balancer, including the backend pool. It

states, "For a Basic load balancer, the backend pool can't include more than

one virtual machine that isn't part of an availability set or a virtual machine

scale set."

o URL: https://learn.microsoft.com/en-us/azure/loadbalancer/components#backend-pools (Refer to the "Backend pools"

section).

Question 4

HOTSPOT - You have an Azure virtual machine that runs Windows Server 2019 and has the following con๏ฌgurations: Name: VM1 Location: West US Connected to: VNET1 Private IP address: 10.1.0.4 Public IP addresses: 52.186.85.63 DNS suf๏ฌx in Windows Server: Adatum.com You create the Azure DNS zones shown in the following table. Microsoft AZ-104 Exam Questions exam question You need to identify which DNS zones you can link to VNET1 and the DNS zones to which VM1 can automatically register. Which zones should you identify? To answer, select the appropriate options in the answer area. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
Only Azure Private DNS zones can be linked to a virtual network; public zones cannot. Any private zoneโ€forward or reverseโ€can therefore be linked to VNET1. Automatic (dynamic) registration occurs only for private zones that are linked to the virtual network with registration enabled and whose names match either: 1. the VM DNS suf๏ฌx (forward lookup), or 2. the appropriate reverse-lookup namespace for the VMโ„ขs IP address. VM1 DNS suf๏ฌx is ล“adatum.com, so it auto-registers in the private ล“adatum.com zone. Its IP 10.1.0.4 falls into the 0.1.10.in-addr.arpa reverse zone, so a PTR record is also auto- registered there. contoso.com does not match the DNS suf๏ฌx, so no auto-registration occurs in that zone.
References

1. Microsoft Azure Docs What is Azure Private DNS? (Functions: linking, auto-registration)

https://learn.microsoft.com/en-us/azure/dns/private-dns-overview#virtual-network-links

2. Microsoft Azure Docs Create a private DNS zone and link it to a virtual network (linking

rules, auto-registration option)

https://learn.microsoft.com/en-us/azure/dns/private-dns-getstarted-portal#link-a-virtualnetwork-to-the-private-zone

3. Microsoft Azure Docs Reverse DNS for Private DNS (automatic PTR registration)

https://learn.microsoft.com/en-us/azure/dns/private-dns-reverse-zones

Question 5

DRAG DROP - You have an Azure subscription that contains two virtual networks named VNet1 and VNet2. Virtual machines connect to the virtual networks. The virtual networks have the address spaces and the subnets con๏ฌgured as shown in the following table. Microsoft AZ-104 Exam Questions exam question You need to add the address space of 10.33.0.0/16 to VNet1. The solution must ensure that the hosts on VNet1 and VNet2 can communicate. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Select and Place: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
The NSG already contains an outbound rule (DenyWebSites) that denies TCP port 80. Because the NSG is presently attached only to a single NIC, VM2 is unaffected. Associating the NSG with Subnet1 makes every NIC in that subnet including those of VM1 and VM2 subject to the existing outbound-deny rule, preventing both VMs from reaching Internet web sites on port 80.
Why Incorrect Options are Wrong

A. Disassociating the NSG removes all its rules, permitting not blocking Internet access.

B. Inbound rules govern traf๏ฌc entering the VM; they do not control outbound traf๏ฌc to

websites.

D. The outbound deny rule already blocks port 80; no modi๏ฌcation is required its scope

must simply include both VMs.

References

1. Microsoft Azure Documentation Network security groups overview, Associations section:

An NSG linked to a subnet applies to all network interfaces in that subnet.

https://learn.microsoft.com/azure/virtual-network/network-security-groupsoverview#associations

2. Microsoft Azure Documentation Security rules table: Outbound rules ๏ฌlter traf๏ฌc leaving

the VM to the Internet on speci๏ฌed ports. https://learn.microsoft.com/azure/virtualnetwork/network-security-groups-overview#security-rules

Question 6

DRAG DROP - You have an on-premises network that you plan to connect to Azure by using a site-so-site VPN. In Azure, you have an Azure virtual network named VNet1 that uses an address space of 10.0.0.0/16 VNet1 contains a subnet named Subnet1 that uses an address space of 10.0.0.0/24. You need to create a site-to-site VPN to Azure. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. NOTE: More than one order of answer choice is correct. You will receive credit for any of the correct orders you select. Select and Place: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
The NSG already contains an outbound rule (DenyWebSites) that denies TCP port 80. Because the NSG is presently attached only to a single NIC, VM2 is unaffected. Associating the NSG with Subnet1 makes every NIC in that subnet including those of VM1 and VM2 subject to the existing outbound-deny rule, preventing both VMs from reaching Internet web sites on port 80.
Why Incorrect Options are Wrong

A. Disassociating the NSG removes all its rules, permitting not blocking Internet access.

B. Inbound rules govern traf๏ฌc entering the VM; they do not control outbound traf๏ฌc to

websites.

D. The outbound deny rule already blocks port 80; no modi๏ฌcation is required its scope

must simply include both VMs.

References

1. Microsoft Azure Documentation Network security groups overview, Associations section:

An NSG linked to a subnet applies to all network interfaces in that subnet.

https://learn.microsoft.com/azure/virtual-network/network-security-groupsoverview#associations

2. Microsoft Azure Documentation Security rules table: Outbound rules ๏ฌlter traf๏ฌc leaving

the VM to the Internet on speci๏ฌed ports. https://learn.microsoft.com/azure/virtualnetwork/network-security-groups-overview#security-rules

Question 7

You have an Azure subscription that contains the resources in the following table. Microsoft AZ-104 Exam Questions exam question VM1 and VM2 are deployed from the same template and host line-of-business applications. You con๏ฌgure the network security group (NSG) shown in the exhibit. (Click the Exhibit tab.) Microsoft AZ-104 Exam Questions exam question You need to prevent users of VM1 and VM2 from accessing websites on the Internet over TCP port 80. What should you do?
Options
A: Disassociate the NSG from a network interface
B: Change the Port_80 inbound security rule.
C: Associate the NSG to Subnet1.
D: Change the DenyWebSites outbound security rule.
Show Answer
Correct Answer:
Associate the NSG to Subnet1.
Explanation
The NSG already contains an outbound rule (DenyWebSites) that denies TCP port 80. Because the NSG is presently attached only to a single NIC, VM2 is unaffected. Associating the NSG with Subnet1 makes every NIC in that subnet including those of VM1 and VM2 subject to the existing outbound-deny rule, preventing both VMs from reaching Internet web sites on port 80.
Why Incorrect Options are Wrong

A. Disassociating the NSG removes all its rules, permitting not blocking Internet access.

B. Inbound rules govern traf๏ฌc entering the VM; they do not control outbound traf๏ฌc to

websites.

D. The outbound deny rule already blocks port 80; no modi๏ฌcation is required its scope

must simply include both VMs.

References

1. Microsoft Azure Documentation Network security groups overview, Associations section:

An NSG linked to a subnet applies to all network interfaces in that subnet.

https://learn.microsoft.com/azure/virtual-network/network-security-groupsoverview#associations

2. Microsoft Azure Documentation Security rules table: Outbound rules ๏ฌlter traf๏ฌc leaving

the VM to the Internet on speci๏ฌed ports. https://learn.microsoft.com/azure/virtualnetwork/network-security-groups-overview#security-rules

Question 8

You have two subscriptions named Subscription1 and Subscription2. Each subscription is associated to a different Azure AD tenant. Subscription1 contains a virtual network named VNet1. VNet1 contains an Azure virtual machine named VM1 and has an IP address space of 10.0.0.0/16. Subscription2 contains a virtual network named VNet2. VNet2 contains an Azure virtual machine named VM2 and has an IP address space of 10.10.0.0/24. You need to connect VNet1 to VNet2. What should you do ๏ฌrst?
Options
A: Move VM1 to Subscription2.
B: Move VNet1 to Subscription2.
C: Modify the IP address space of VNet2.
D: Provision virtual network gateways.
Show Answer
Correct Answer:
Provision virtual network gateways.
Explanation
The two virtual networks (VNets) are in different subscriptions associated with different Azure AD tenants. Standard VNet peering cannot connect VNets across different tenants. Therefore, a VNet-to-VNet VPN gateway connection is required. The foundational and ๏ฌrst step to establish this type of connection is to create a virtual network gateway in each VNet. The existing IP address spaces do not overlap, which is a prerequisite for this connection, so no changes are needed there.
Why Incorrect Options are Wrong

A. Move VM1 to Subscription2: Moving a virtual machine does not establish connectivity

between the virtual networks themselves.

B. Move VNet1 to Subscription2: This is a signi๏ฌcant administrative change. The direct

method to connect the networks as they are is with gateways, not by moving resources

between tenants.

C. Modify the IP address space of VNet2: The IP address spaces (10.0.0.0/16 and

10.10.0.0/24) do not overlap, so modi๏ฌcation is unnecessary.

References

1. Microsoft Azure Documentation - Con๏ฌgure a VNet-to-VNet VPN gateway connection by

using the Azure portal: This of๏ฌcial guide outlines the procedure. The ๏ฌrst major

con๏ฌguration step after creating the VNets is to "Create the virtual network gateways."

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-vnet-vnetresource-manager-portal#create-the-virtual-network-gateways

2. Microsoft Azure Documentation - Virtual network peering: This document clari๏ฌes the

limitations of VNet peering, stating that while it can work across subscriptions, those

subscriptions must be associated with the same Azure Active Directory tenant. This

con๏ฌrms peering is not an option in the given scenario.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peeringoverview#requirements-and-constraints

3. Microsoft Azure Documentation - About VNet-to-VNet VPN gateway connections: This

resource con๏ฌrms that VNet-to-VNet connections are the appropriate solution for

connecting VNets in different subscriptions, which is necessary for cross-tenant scenarios.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vnet-to-vnet

Question 9

You plan to create an Azure virtual machine named VM1 that will be con๏ฌgured as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question The planned disk con๏ฌgurations for VM1 are shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You need to ensure that VM1 can be created in an Availability Zone. Which two settings should you modify? Each correct answer presents part of the solution.
Options
A: Use managed disks
B: OS disk type
C: Availability options
D: Size
E: Image
Show Answer
Correct Answer:
Use managed disks, Availability options
Explanation
To deploy a virtual machine into an Azure Availability Zone, two fundamental con๏ฌguration requirements must be met. First, the Availability options setting must be explicitly con๏ฌgured for zonal deployment; the current setting of "No infrastructure redundancy required" must be changed to "Availability zone". Second, virtual machines that use Availability Zones must use Azure Managed Disks. The exhibit shows the plan is to not use managed disks, which is incompatible with Availability Zones. Therefore, this setting must be enabled.
Why Incorrect Options are Wrong

B. OS disk type: The disk type (e.g., Standard HDD, Premium SSD) is not the constraint.

The requirement is that the disk must be managed, regardless of its performance tier.

D. Size: The StandardB2s VM size supports Availability Zones in regions where zones are

available. This setting is not the primary con๏ฌguration that needs to be changed.

E. Image: Standard Azure Marketplace images, such as Windows Server 2016 Datacenter,

are fully compatible with deployment into an Availability Zone.

References

1. Microsoft Azure Documentation - Create a virtual machine in an availability zone using

the Azure portal: "To use availability zones, your VM must be created in a supported Azure

region. ... VMs must use Azure managed disks to be placed in an availability zone." This

source con๏ฌrms that both the availability option must be set and managed disks must be

used.

URL: https://learn.microsoft.com/en-us/azure/virtual-machines/create-portal-availabilityzone

2. Microsoft Azure Documentation - Availability options for Azure Virtual Machines:

"Availability zones... To protect your applications from datacenter-level failures, you can

create a virtual machine in an availability zone." This highlights that the "Availability options"

setting is the direct control for this feature.

URL: https://learn.microsoft.com/en-us/azure/virtual-machines/availability

3. Microsoft Azure Documentation - Introduction to Azure managed disks: "Azure managed

disks are required for... Availability zones." This document explicitly states the dependency

on managed disks for the Availability Zone feature.

URL: https://learn.microsoft.com/en-us/azure/virtual-machines/managed-disksoverview#availability-zones

Question 10

HOTSPOT - You have an Azure subscription that contains the resources shown in the following table. Microsoft AZ-104 Exam Questions exam question VMSS1 is set to VM (virtual machines) orchestration mode. You need to deploy a new Azure virtual machine named VM1, and then add VM1 to VMSS1. Which resource group and location should you use to deploy VM1? To answer, select the appropriate options in the answer area. Microsoft AZ-104 Exam Questions exam question Hot Area:
Show Answer
Correct Answer:
Explanation
A virtual machine can be added to a scale set that is in VM (๏ฌ‚exible) orchestration mode only when the VM resides in the identical subscription, region, resource group, and virtual network as the scale set. Therefore, VM1 must be deployed to the resource group and region where VMSS1 already exists RG1 in East US before it can be attached to VMSS1.
References

1. Microsoft Learn Add an existing VM to a ๏ฌ‚exible scale set

https://learn.microsoft.com/azure/virtual-machine-scale-sets/๏ฌ‚exible-guestvms#prerequisites

(The VM you add must be in the same subscription, resource group, region, and virtual

network as the scale set.)

Question 11

HOTSPOT - You have an Azure subscription that contains three virtual networks named VNET1, VNET2, and VNET3. Peering for VNET1 is con๏ฌgured as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question Peering for VNET2 is con๏ฌgured as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question Peering for VNET3 is con๏ฌgured as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question How can packets be routed between the virtual networks? To answer, select the appropriate options in the answer area. Microsoft AZ-104 Exam Questions exam question Hot Area:
Show Answer
Correct Answer:
Explanation
The con๏ฌguration represents a hub-and-spoke network topology where VNET1 is the hub, and VNET2 and VNET3 are the spokes. 1. VNET1 Connectivity: VNET1 has direct peering connections established with both VNET2 and VNET3. The "Peering status" for both is "Connected". Therefore, resources in VNET1 can communicate directly with resources in both VNET2 and VNET3. 2. VNET2 Connectivity: VNET2 is peered only with VNET1. Azure Virtual Network peering is not transitive. This means that because VNET2 is peered with VNET1, and VNET1 is peered with VNET3, it does not grant VNET2 connectivity to VNET3. For VNET2 to communicate with VNET3, a direct peering must be established between them. As a result, VNET2 can only route packets to VNET1.
References

โ€ข

Microsoft Azure Documentation | Virtual network peering: This of๏ฌcial

documentation explicitly states that virtual network peering is non-transitive.

o URL: https://docs.microsoft.com/en-us/azure/virtual-network/virtualnetwork-peering-overview

o Speci๏ฌc Section: Under the "Connectivity" section, it states: "Virtual

network peering is non-transitive. For example, if you peer VNetA to

VNetB and VNetB to VNetC, VNetA isn't peered to VNetC." This

directly applies to the scenario where VNET2 (VNetA) cannot reach

VNET3 (VNetC) through VNET1 (VNetB).

Question 12

You have a computer named Computer1 that has a point-to-site VPN connection to an Azure virtual network named VNet1. The point-to-site connection uses a self-signed certi๏ฌcate. From Azure, you download and install the VPN client con๏ฌguration package on a computer named Computer2. You need to ensure that you can establish a point-to-site VPN connection to VNet1 from Computer2. Solution: You modify the Azure Active Directory (Azure AD) authentication policies. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The scenario speci๏ฌes that the point-to-site (P2S) VPN uses a self-signed certi๏ฌcate for authentication. For a new computer, Computer2, to connect using this method, it must have a valid client certi๏ฌcate installed. This client certi๏ฌcate must be generated from the same root certi๏ฌcate whose public key is uploaded to the Azure VPN gateway. The proposed solution, modifying Azure Active Directory (Azure AD) authentication policies, is irrelevant because Azure AD authentication is a completely different authentication method from the certi๏ฌcate-based one currently in use. The solution does not address the core requirement of installing the client certi๏ฌcate on Computer2.
References

1. Microsoft Learn, "Con๏ฌgure a Point-to-Site VPN connection to a VNet using native Azure

certi๏ฌcate authentication: Azure portal": This document explicitly states the requirement for

client-side certi๏ฌcates: "Each client computer that you want to connect to a VNet using a

Point-to-Site connection must have a client certi๏ฌcate installed." This con๏ฌrms that the

solution must involve certi๏ฌcate installation, not policy changes in Azure AD.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-point-to-siteresource-manager-portal#client

2. Microsoft Learn, "About Point-to-Site VPN": This article outlines the different

authentication methods available for P2S VPNs, clearly separating "Native Azure certi๏ฌcate

authentication" from "Azure Active Directory authentication." This distinction demonstrates

that modifying policies for one does not affect the other.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/point-to-siteabout#authentication

Question 13

You have a computer named Computer1 that has a point-to-site VPN connection to an Azure virtual network named VNet1. The point-to-site connection uses a self-signed certi๏ฌcate. From Azure, you download and install the VPN client con๏ฌguration package on a computer named Computer2. You need to ensure that you can establish a point-to-site VPN connection to VNet1 from Computer2. Solution: You join Computer2 to Azure Active Directory (Azure AD). Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The point-to-site (P2S) VPN connection is con๏ฌgured to use native Azure certi๏ฌcate authentication. For a client computer to successfully connect, it must have a valid client certi๏ฌcate installed. This client certi๏ฌcate must be generated from the same root certi๏ฌcate that was used to con๏ฌgure the VPN gateway. Joining Computer2 to Azure Active Directory (Azure AD) is an identity and device management action. It does not install the required client certi๏ฌcate onto the computer. Therefore, this action does not ful๏ฌll the prerequisites for establishing a certi๏ฌcate-based P2S VPN connection.
References

1. Microsoft Learn | Con๏ฌgure a Point-to-Site VPN client for certi๏ฌcate authentication: "For a

P2S connection from a Windows client computer to Azure, you must install a client

certi๏ฌcate. The client certi๏ฌcate is used for authentication... For every client computer that

you want to connect to a VNet using a Point-to-Site connection, you must install a client

certi๏ฌcate." This documentation con๏ฌrms that a client certi๏ฌcate is a mandatory installation

on the client machine.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/point-to-site-vpn-clientcon๏ฌguration-azure-cert

2. Microsoft Learn | What is an Azure AD joined device?: "Azure AD join allows you to join

devices directly to Azure AD without the need to join to on-premises Active Directory... It

provides users with a single sign-on (SSO) experience to your cloud and on-premises

apps." This source de๏ฌnes Azure AD Join, showing its purpose is related to identity and

access, not certi๏ฌcate distribution for VPNs.

URL: https://learn.microsoft.com/en-us/azure/active-directory/devices/concept-azure-ad-join

Question 14

You have an Azure subscription that contains 10 virtual networks. The virtual networks are hosted in separate resource groups. Another administrator plans to create several network security groups (NSGs) in the subscription. You need to ensure that when an NSG is created, it automatically blocks TCP port 8080 between the virtual networks. Solution: You create a resource lock, and then you assign the lock to the subscription. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
Explanation
The proposed solution is incorrect. Azure resource locks are designed to prevent accidental deletion (CanNotDelete) or modi๏ฌcation (ReadOnly) of resources at the subscription, resource group, or resource level. They do not have the capability to de๏ฌne or enforce the internal con๏ฌguration of a resource, such as adding speci๏ฌc security rules to a Network Security Group (NSG) upon its creation. The correct tool for automatically enforcing con๏ฌguration standards on new resources is Azure Policy, which can be used to deploy a speci๏ฌc rule to any new NSG. Why the Solution is Incorrect: A resource lock's function is to control management actions on a resource, not to con๏ฌgure the settings within it. It cannot add a security rule to an NSG.
References

1. Azure Resource Locks: Microsoft Learn. (2023). Lock resources to prevent unexpected

changes. "Azure Resource Manager provides the ability to lock a subscription, resource

group, or resource to prevent other users in your organization from accidentally deleting or

modifying critical resources." https://learn.microsoft.com/en-us/azure/azure-resourcemanager/management/lock-resources

2. Azure Policy Overview: Microsoft Learn. (2024). What is Azure Policy?. "Azure Policy is a

service in Azure that you use to create, assign, and manage policies. These policies

enforce different rules and effects over your resources, so those resources stay compliant

with your corporate standards and service level agreements."

https://learn.microsoft.com/en-us/azure/governance/policy/overview

3. Network Security Groups: Microsoft Learn. (2023). Network security groups. "A network

security group contains a list of security rules that allow or deny network traf๏ฌc to resources

connected to Azure Virtual Networks (VNet)." https://learn.microsoft.com/enus/azure/virtual-network/network-security-groups-overview

Question 15

You have an Azure subscription named Subscription1. Subscription1 contains a virtual machine named VM1. You have a computer named Computer1 that runs Windows 10. Computer1 is connected to the Internet. You add a network interface named vm1173 to VM1 as shown in the exhibit. (Click the Exhibit tab.) Microsoft AZ-104 Exam Questions exam question From Computer1, you attempt to connect to VM1 by using Remote Desktop, but the connection fails. You need to establish a Remote Desktop connection to VM1. What should you do ๏ฌrst?
Options
A: Change the priority of the RDP rule
B: Attach a network interface
C: Delete the DenyAllInBound rule
D: Start VM1
Show Answer
Correct Answer:
Start VM1
Explanation
A prerequisite for any connection to a virtual machine, including Remote Desktop (RDP), is that the VM must be in a 'Running' state. The scenario describes adding a new network interface to VM1. For most VM sizes in Azure, adding a network interface can only be performed when the VM is in a stopped (deallocated) state. It is a common oversight to forget to restart the VM after such a con๏ฌguration change. Therefore, the most logical and fundamental ๏ฌrst step is to verify the VM's status and start it if it is not running.
Why Incorrect Options are Wrong

A. Change the priority of the RDP rule: The exhibit of effective security rules shows no

existing rule that allows RDP. You cannot change the priority of a rule that does not exist.

B. Attach a network interface: The problem description explicitly states that a network

interface named vm1173 has already been added to VM1, making this action redundant.

C. Delete the DenyAllInBound rule: DenyAllInBound is a default security rule within a

Network Security Group (NSG) and cannot be deleted. It can only be overridden by creating

a new rule with a higher priority.

References

1. Troubleshoot RDP connections: Microsoft Learn. The primary step in troubleshooting

RDP issues is to check the VM's status. "Check the status of the virtual machine: 1. Sign in

to the Azure portal. 2. Select Virtual machines. 3. Select the problematic virtual machine. 4.

In the overview pane for the virtual machine, check the status of the virtual machine. If the

status of the virtual machine is not Running, start it."

URL: https://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/troubleshootrdp-connection#check-the-status-of-the-virtual-machine

2. Adding a Network Interface: Microsoft Learn. This document con๏ฌrms that adding a NIC

requires the VM to be stopped. "You can only add a network interface to a VM when it's

stopped (deallocated)." This supports the high probability that VM1 is currently stopped.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-machine-networkinterface-add-remove?tabs=windows#add-a-network-interface-to-a-vm

3. Default NSG Rules: Microsoft Learn. This document explains that default rules cannot be

removed. "You can't remove the default rules, but you can override them by creating rules

with higher priorities."

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview#default-security-rules

Question 16

You have the Azure virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question A DNS service is installed on VM1. You con๏ฌgure the DNS servers settings for each virtual network as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You need to ensure that all the virtual machines can resolve DNS names by using the DNS service on VM1. What should you do?
Options
A: Con๏ฌgure a conditional forwarder on VM1
B: Add service endpoints on VNET1
C: Add service endpoints on VNET2 and VNET3
D: Con๏ฌgure peering between VNET1, VNET2, and VNET3
Show Answer
Correct Answer:
Con๏ฌgure peering between VNET1, VNET2, and VNET3
Explanation
The virtual machines are located in three separate virtual networks (VNET1, VNET2, VNET3). By default, virtual networks in Azure are isolated from one another. For VM2 and VM3 to resolve DNS names using the service on VM1, they require network connectivity to VM1's private IP address (10.1.0.4). Virtual network peering is the Azure feature that connects virtual networks, enabling resources in the peered networks to communicate directly using private IP addresses. Peering VNET1 with VNET2 and VNET3 will establish the necessary connectivity for the DNS queries to succeed.
Why Incorrect Options are Wrong

A. Con๏ฌgure a conditional forwarder on VM1: A conditional forwarder is used to forward

queries for speci๏ฌc domains. It does not solve the fundamental network connectivity

problem between the isolated virtual networks.

B. Add service endpoints on VNET1: Service endpoints provide a secure, direct connection

to speci๏ฌc Azure PaaS services (like Azure Storage or SQL Database), not for enabling

general communication between virtual networks.

C. Add service endpoints on VNET2 and VNET3: Similar to option B, service endpoints are

not the correct mechanism for enabling communication from one VNet to a virtual machine

in another VNet.

References

1. Virtual network peering: "Virtual network peering enables you to seamlessly connect two

or more Azure virtual networks. The virtual networks appear as one for connectivity

purposes. The traf๏ฌc between virtual machines in peered virtual networks uses the

Microsoft backbone infrastructure."

Microsoft Learn. (2024). Azure virtual network peering. Retrieved from

https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peering-overview

2. Name resolution for resources in Azure virtual networks: "When you're using your own

DNS servers, Azure provides a non-authoritative recursive DNS service. You must specify

your own DNS servers in the virtual network settings. The endpoints for your own DNS

servers must be reachable from the virtual machines in that virtual network." This highlights

the need for reachability, which peering provides.

Microsoft Learn. (2023). Name resolution for resources in Azure virtual networks. Retrieved

from https://learn.microsoft.com/en-us/azure/virtual-network/virtual-networks-nameresolution-for-vms-and-role-instances#name-resolution-that-uses-your-own-dns-server

3. Virtual network service endpoints: "Virtual Network (VNet) service endpoints extend your

virtual network private address space and the identity of your VNet to the Azure services,

over a direct connection." This con๏ฌrms service endpoints are for connecting to Azure

services, not other VNETs.

Microsoft Learn. (2024). Virtual Network service endpoints. Retrieved from

https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpointsoverview

Question 17

HOTSPOT - You have an Azure subscription that contains the Azure virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question You add inbound security rules to a network security group (NSG) named NSG1 as shown in the following table. Microsoft AZ-104 Exam Questions exam question You run Azure Network Watcher as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You run Network Watcher again as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
Network Watcher shows that traf๏ฌc between the two subnets in the same virtual network is allowed because the packet matches the built-in NSG rule AllowVNetInBound (priority 65000). Therefore VM1 can reach VM2 on TCP 80 (statement 1 = No, it is not blocked). Traf๏ฌc arriving from the public Internet to either VM hits the user-de๏ฌned rule Deny-All (priority 300) before the default rules, so Internet-originated RDP to VM1 is denied (statement 2 = Yes, it is blocked) and all external traf๏ฌc to VM2 is likewise denied (statement 3 = Yes).
References

1. Microsoft Azure documentation Network security groups default and user rules

https://learn.microsoft.com/azure/virtual-network/network-security-groupsoverview#security-rules

(see table: AllowVNetInBound priority 65000, DenyAllInBound priority 65500)

2. Microsoft Azure documentation Diagnose a virtual machine network traf๏ฌc ๏ฌlter problem

https://learn.microsoft.com/azure/network-watcher/connection-troubleshoot

(example output shows matched NSG rule and explains precedence of lower-number

priority)

Question 18

You have the Azure virtual network named VNet1 that contains a subnet named Subnet1. Subnet1 contains three Azure virtual machines. Each virtual machine has a public IP address. The virtual machines host several applications that are accessible over port 443 to users on the Internet. Your on-premises network has a site-to-site VPN connection to VNet1. You discover that the virtual machines can be accessed by using the Remote Desktop Protocol (RDP) from the Internet and from the on-premises network. You need to prevent RDP access to the virtual machines from the Internet, unless the RDP connection is established from the on-premises network. The solution must ensure that all the applications can still be accessed by the Internet users. What should you do?
Options
A: Modify the address space of the local network gateway
B: Create a deny rule in a network security group (NSG) that is linked to Subnet1
C: Remove the public IP addresses from the virtual machines
D: Modify the address space of Subnet1
Show Answer
Correct Answer:
Create a deny rule in a network security group (NSG) that is linked to Subnet1
Explanation
A Network Security Group (NSG) is the correct Azure resource for ๏ฌltering network traf๏ฌc to and from Azure resources. To meet the requirements, you should create an inbound security rule in an NSG associated with Subnet1. This rule would have a higher priority (a lower number) than the default rules and would be con๏ฌgured to deny inbound traf๏ฌc on port 3389 (RDP) where the source is the Internet service tag. A separate, higher-priority rule would be needed to explicitly allow RDP traf๏ฌc from the on-premises network's source IP address range. This approach selectively blocks RDP from the internet while preserving access from the on-premises network and leaving application traf๏ฌc on port 443 unaffected.
Why Incorrect Options are Wrong

A. Modify the address space of the local network gateway: This de๏ฌnes the on-premises IP

address ranges for routing purposes over the VPN; it does not enforce any traf๏ฌc ๏ฌltering

rules.

C. Remove the public IP addresses from the virtual machines: This would prevent the

applications from being accessible over the internet on port 443, which violates a key

requirement of the solution.

D. Modify the address space of Subnet1: This changes the internal IP address range for the

subnet and has no impact on ๏ฌltering inbound traf๏ฌc from the internet.

References

1. Microsoft Documentation: Network security groups. "A network security group contains

security rules that allow or deny inbound network traf๏ฌc to, or outbound network traf๏ฌc from,

several types of Azure resources."

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview

2. Microsoft Documentation: Create, change, or delete a network security group. This page

details the process of creating security rules, including specifying protocol (TCP),

destination port (3389), source (Internet service tag), and action (Deny).

URL: https://learn.microsoft.com/en-us/azure/virtual-network/manage-network-securitygroup?tabs=network-security-group-portal#create-a-security-rule

3. Microsoft Documentation: Virtual network service tags. "A service tag represents a group

of IP address pre๏ฌxes from a given Azure service. The Internet service tag... contains the IP

address ranges that are outside of the virtual network and reachable by the public internet."

URL: https://learn.microsoft.com/en-us/azure/virtual-network/service-tagsoverview#available-service-tags

Question 19

You have an Azure subscription that contains the resources in the following table. Microsoft AZ-104 Exam Questions exam question Subnet1 is associated to VNet1. NIC1 attaches VM1 to Subnet1. You need to apply ASG1 to VM1. What should you do?
Options
A: Associate NIC1 to ASG1
B: Modify the properties of ASG1
C: Modify the properties of NSG1
Show Answer
Correct Answer:
Associate NIC1 to ASG1
Explanation
Application Security Groups (ASGs) are used to group virtual machines and de๏ฌne network security policies based on those groups. To make a virtual machine (VM) a member of an ASG, you must associate the VM's network interface (NIC) with the desired ASG. In this scenario, to apply ASG1 to VM1, you must associate its network interface, NIC1, with ASG1. This action logically groups VM1 into ASG1, allowing network security group (NSG) rules to be applied to it based on this grouping.
Why Incorrect Options are Wrong

B. Modify the properties of ASG1: The properties of an ASG itself (like its name or location)

do not include a list of member VMs or NICs. The association is con๏ฌgured on the NIC, not

the ASG.

C. Modify the properties of NSG1: A Network Security Group (NSG) uses ASGs as sources

or destinations within its security rules. Modifying the NSG is for de๏ฌning traf๏ฌc rules, not for

associating a VM with an ASG.

References

Microsoft Azure Documentation - Application security groups: "You associate a network

interface to an application security group. A virtual machine has one or more network

interfaces attached to it." This source directly con๏ฌrms that the association is made at the

network interface level.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/application-securitygroups#how-to-con๏ฌgure-application-security-groups

Microsoft Azure Documentation - Tutorial: Filter network traf๏ฌc with a network security group

using the Azure portal: This tutorial provides a step-by-step guide. In the section "Associate

network interfaces to ASGs," the procedure is to select the network interface and then

associate it with an application security group.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/tutorial-๏ฌlter-networktraf๏ฌc#associate-network-interfaces-to-asgs

Question 20

You have an Azure subscription named Subscription1 that contains an Azure virtual network named VNet1. VNet1 connects to your on-premises network by using Azure ExpressRoute. You plan to prepare the environment for automatic failover in case of ExpressRoute failure. You need to connect VNet1 to the on-premises network by using a site-to-site VPN. The solution must minimize cost. Which three actions should you perform? Each correct answer presents part of the solution.
Options
A: Create a connection
B: Create a local site VPN gateway
C: Create a VPN gateway that uses the VpnGw1 SKU
D: Create a gateway subnet
E: Create a VPN gateway that uses the Basic SKU
Show Answer
Correct Answer:
Create a connection, Create a local site VPN gateway, Create a VPN gateway that uses the VpnGw1 SKU
Explanation
To establish a site-to-site (S2S) VPN that coexists with an ExpressRoute circuit for failover, three primary Azure resources must be created. 1. Create a VPN gateway (C): A virtual network gateway is the Azure endpoint for the VPN tunnel. The question requires minimizing cost, but the Basic SKU is not supported for coexistence with ExpressRoute. Therefore, the VpnGw1 SKU is the correct, lowest-cost, supported option. 2. Create a local network gateway (B): This resource represents the on-premises VPN device. It contains the public IP address of the on-premises device and the on-premises network address pre๏ฌxes that Azure will route to. The option uses the term "local site VPN gateway," which directly corresponds to this required component. 3. Create a connection (A): This resource links the virtual network gateway and the local network gateway, which establishes the encrypted S2S VPN tunnel. Without this ๏ฌnal step, the environment is not connected and cannot fail over. These three actions represent the core components required to create a functional S2S VPN connection.
Why Incorrect Options are Wrong

D. Create a gateway subnet: While a gateway subnet (named GatewaySubnet) is a

mandatory prerequisite for deploying a virtual network gateway, it is a network con๏ฌguration

step. The question asks for the three main actions to create the VPN solution, which are

best represented by the three core VPN resources (VNG, LNG, and Connection).

E. Create a VPN gateway that uses the Basic SKU: The Basic SKU is not supported for

con๏ฌgurations where a VPN Gateway and an ExpressRoute gateway coexist in the same

virtual network.

References

1. Coexistence SKU Limitation: Microsoft Azure Documentation. (2023). Con๏ฌgure

ExpressRoute and Site-to-Site VPN connections that coexist. "Limits and limitations".

"Coexistence is not supported on the Basic SKU."

URL: https://learn.microsoft.com/en-us/azure/expressroute/expressroute-howto-coexistresource-manager#limits-and-limitations

2. S2S VPN Components: Microsoft Azure Documentation. (2024). Tutorial: Create a Site-

to-Site VPN connection in the Azure portal. This tutorial outlines the main steps, which

include creating the virtual network gateway (C), the local network gateway (B), and the

connection (A).

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/tutorial-site-to-site-portal

3. Gateway Subnet Prerequisite: Microsoft Azure Documentation. (2024). About VPN

Gateway con๏ฌguration settings. "Gateway subnet". "Before you create a virtual network

gateway, you must create a gateway subnet." This con๏ฌrms it as a prerequisite for the

gateway itself.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpngateway-settings#gwsub

Question 21

HOTSPOT - You have peering con๏ฌgured as shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic. Microsoft AZ-104 Exam Questions exam question Hot Area:
Show Answer
Correct Answer:
Explanation
For communication to occur between two virtual networks via peering, the peering status must be Connected. The exhibit shows that the peering status for both peering1 (to vNET1) and peering2 (to vNET2) is Disconnected. This means no traf๏ฌc can pass between vNET6 and the other virtual networks. Therefore, hosts on vNET6 can only communicate with other hosts within the same virtual network (vNET6). Statement 2 Answer: delete peering1 Explanation: A Disconnected peering status indicates that the peering link on the remote virtual network (vNET1) has been deleted. The peering con๏ฌguration on the local virtual network (vNET6), named peering1, is now a stale remnant. It cannot be updated to a Connected state directly. To re-establish the connection, you must ๏ฌrst remove the stale peering1 con๏ฌguration from vNET6. Afterward, new peering links must be created from both vNET6 to vNET1 and from vNET1 to vNET6.
References

1. Azure Virtual Network peering | Microsoft Learn: This of๏ฌcial Microsoft

documentation explains the different peering statuses. It clari๏ฌes that a

Connected status is required for connectivity and describes the Disconnected

state.

o URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtualnetwork-peering-overview

o Relevant Section: "Peering status" section explains that if one side of

a peering is deleted, the status on the remaining side becomes

Disconnected.

2. Create, change, or delete a virtual network peering | Microsoft Learn:

This guide details the management of VNet peerings. It implicitly supports the

answer by explaining the process for creating and deleting peerings. To ๏ฌx a

Disconnected state, which results from deleting the remote link, the local link

must also be deleted and then both must be recreated.

o URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtualnetwork-manage-peering

o Relevant Section: The "Permissions" and "Create a peering" sections

outline the requirements for establishing a Connected state, which

involves reciprocal actions on both virtual networks. The process to

recover from a Disconnected state involves deleting the remaining

peering and starting over.

Question 22

HOTSPOT - You have an Azure subscription that contains the resources in the following table. Microsoft AZ-104 Exam Questions exam question You install the Web Server server role (IIS) on VM1 and VM2, and then add VM1 and VM2 to LB1. LB1 is con๏ฌgured as shown in the LB1 exhibit. (Click the LB1 tab.) Microsoft AZ-104 Exam Questions exam question Rule1 is con๏ฌgured as shown in the Rule1 exhibit. (Click the Rule1 tab.) Microsoft AZ-104 Exam Questions exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
VM1 is in the same availability set as VM2. (Yes) The resource table shows LB1 is a Basic SKU Load Balancer. A constraint of the Basic SKU is that all virtual machines in a backend pool must belong to the same availability set or the same virtual machine scale set. Since both VM1 and VM2 are in the Backend1 pool of LB1, they must reside within the same availability set. If Probe1.htm is present on VM1 and VM2, LB1 will balance TCP port 80 between VM1 and VM2. (Yes) The load balancing rule Rule1 is con๏ฌgured to map traf๏ฌc from the frontend port 80 to the backend port 80 over TCP. The health probe is set to check for the ๏ฌle Probe1.htm on port 80. If this ๏ฌle is present and accessible on both VMs, the health probe will succeed, marking the VMs as healthy. Consequently, the load balancer will distribute incoming TCP port 80 traf๏ฌc between VM1 and VM2 as de๏ฌned by the rule. If you delete Rule1, LB1 will balance all the requests between VM1 and VM2 for all the ports. (No) Load balancing rules explicitly de๏ฌne how traf๏ฌc is distributed. Without a rule, the load balancer does not know how to forward incoming traf๏ฌc to the backend pool. Deleting Rule1 removes the only instruction for forwarding traf๏ฌc. The load balancer will stop forwarding traf๏ฌc for port 80 and will not automatically start forwarding traf๏ฌc for all other ports. Forwarding must be explicitly con๏ฌgured.
References

โ€ข

Azure Load Balancer SKUs Documentation: States the constraints for

Basic SKU, including the requirement for backend pool members to be in a

single availability set or scale set.

o Source: Microsoft Azure Documentation

o URL: https://learn.microsoft.com/en-us/azure/load-balancer/skus#skus

(Refer to the "Backend pool" row in the comparison table).

โ€ข

Azure Load Balancer Components Documentation: Explains that load

balancing rules are used to de๏ฌne how traf๏ฌc is distributed to the VMs and

that a health probe monitors the health of the backend instances.

o Source: Microsoft Azure Documentation

o URL: https://learn.microsoft.com/en-us/azure/loadbalancer/components#load-balancing-rule

o URL: https://learn.microsoft.com/en-us/azure/load-balancer/loadbalancer-custom-probe-overview

Question 23

HOTSPOT - You have an Azure virtual machine named VM1 that connects to a virtual network named VNet1. VM1 has the following con๏ฌgurations: Subnet: 10.0.0.0/24 Availability set: AVSet Network security group (NSG): None Private IP address: 10.0.0.4 (dynamic) Public IP address: 40.90.219.6 (dynamic) You deploy a standard, Internet-facing load balancer named slb1. You need to con๏ฌgure slb1 to allow connectivity to VM1. Which changes should you apply to VM1 as you con๏ฌgure slb1? To answer, select the appropriate options in the answer area. Microsoft AZ-104 Exam Questions exam question Hot Area:
Show Answer
Correct Answer:
Explanation
Remove the public IP address from VM1: Azure Standard Load Balancers have a speci๏ฌc requirement that virtual machines in the backend pool cannot have their own public IP addresses. Since VM1 is con๏ฌgured with a dynamic public IP, it must be removed before the VM's network interface can be successfully added to the backend pool of the standard load balancer slb1. This is a structural prerequisite for the con๏ฌguration. Create and con๏ฌgure an NSG: Azure Standard Load Balancers are secure by default. This means no traf๏ฌc is allowed to the backend instances unless explicitly permitted. To enable connectivity from the load balancer to VM1 (for both health probes and data traf๏ฌc), a Network Security Group (NSG) must be created. This NSG needs an inbound security rule that allows traf๏ฌc on the required port from the AzureLoadBalancer service tag. This NSG must then be associated with VM1's network interface or its subnet.
References

โ€ข

Microsoft Azure Documentation (Of๏ฌcial Vendor Documentation):

o Regarding removing the Public IP: In the tutorial for creating a public

standard load balancer, the documentation explicitly states, "Virtual

machines in the backend pool can't have a public IP address. If your

virtual machines have public IP addresses, you must remove them

before you add them to the backend pool of the load balancer."

ยง

Source: Microsoft Learn, Quickstart: Create a public load

balancer - Azure portal, Section: "Create virtual machines".

Direct URL: https://learn.microsoft.com/en-us/azure/loadbalancer/quickstart-load-balancer-standard-public-

portal?tabs=bicep#create-virtual-machines

o Regarding the need for an NSG: The Standard Load Balancer

overview states, "A standard load balancer is closed to inbound

connections unless opened by a network security group. You can

create a network security group and associate it with a virtual machine

to allow traf๏ฌc."

ยง

Source: Microsoft Learn, What is Azure Load Balancer?,

Section: "Standard Load Balancer > Secure by default". Direct

URL: https://learn.microsoft.com/en-us/azure/load-balancer/loadbalancer-overview#standard-load-balancer

Question 24

You have an Azure subscription that contains the resources shown in the following table. Microsoft AZ-104 Exam Questions exam question You need to create a network interface named NIC1. In which location can you create NIC1?
Options
A: East US and North Europe only
B: East US only
C: East US, West Europe, and North Europe
D: East US and West Europe only
Show Answer
Correct Answer:
East US only
Explanation
Azure requires a NIC to be created in the same region as the virtual network (VNet) and subnet it is attached to. The only VNet shown in the subscription is located in East US; therefore, East US is the single region in which NIC1 can be created.
Why Incorrect Options are Wrong

A. No VNet exists in North Europe, so a NIC cannot be created there.

C. West Europe and North Europe lack a VNet; without one, a NIC cannot be created in

those regions.

D. West Europe lacks a VNet, so a NIC cannot be created there.

References

1. Microsoft Azure documentation Create a network interface: The network interface must

be in the same region and subscription as the virtual network.

https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-networkinterface#create-a-network-interface

2. Microsoft Azure documentation Requirements and constraints: same-region requirement

reiterated.

https://learn.microsoft.com/en-us/azure/virtual-network/network-interfaceoverview#requirements-and-constraints

Question 25

You have Azure virtual machines that run Windows Server 2019 and are con๏ฌgured as shown in the following table. Microsoft AZ-104 Exam Questions exam question You create a public Azure DNS zone named adatum.com and a private Azure DNS zone named contoso.com. For controso.com, you create a virtual network link named link1 as shown in the exhibit. (Click the Exhibit tab.) Microsoft AZ-104 Exam Questions exam question You discover that VM1 can resolve names in contoso.com but cannot resolve names in adatum.com. VM1 can resolve other hosts on the Internet. You need to ensure that VM1 can resolve host names in adatum.com. What should you do?
Options
A: Update the DNS suf๏ฌx on VM1 to be adatum.com
B: Con๏ฌgure the name servers for adatum.com at the domain registrar
C: Create an SRV record in the contoso.com zone
D: Modify the Access control (IAM) settings for link1
Show Answer
Correct Answer:
Con๏ฌgure the name servers for adatum.com at the domain registrar
Explanation
The virtual machine, VM1, can resolve other internet hosts, which means it is successfully using a public DNS resolver (likely the default Azure-provided DNS). However, it cannot resolve names in the adatum.com public zone. This indicates that the adatum.com domain has not been properly delegated to the Azure DNS name servers. For a public Azure DNS zone to be resolvable over the internet, you must update the Name Server (NS) records at your domain registrar to point to the name servers assigned by Azure. Without this delegation, the global DNS system does not know where to send queries for adatum.com.
Why Incorrect Options are Wrong

A. Update the DNS suf๏ฌx on VM1 to be adatum.com: A DNS suf๏ฌx is used for resolving

unquali๏ฌed, single-label names. It does not ๏ฌx the underlying inability to resolve a fully

quali๏ฌed domain name (FQDN) in a public zone.

C. Create an SRV record in the contoso.com zone: An SRV record is for locating speci๏ฌc

services and has no role in resolving standard host (A) records for a different domain

(adatum.com).

D. Modify the Access control (IAM) settings for link1: IAM roles manage permissions for

Azure resources. They do not affect the DNS resolution process for virtual machines within

a virtual network.

References

1. Microsoft Azure Documentation, "Tutorial: Host your domain in Azure DNS": This tutorial

explicitly states the requirement to delegate the domain. "Before you can delegate your

DNS zone to Azure DNS, you need to know the name servers for your zone... Once the

DNS zone is created... you need to update the parent domain with the Azure DNS name

servers. Each registrar has its own DNS management tools to change the name server

records for a domain."

URL: https://docs.microsoft.com/en-us/azure/dns/dns-delegate-domain-azure-dns

2. Microsoft Azure Documentation, "What is Azure DNS?": This document outlines the

function of public DNS zones. "To host your domain in Azure DNS, you need to buy a

domain name... You then create a DNS zone in Azure DNS for that domain name... Finally,

you must con๏ฌgure the name servers for your domain to point to the Azure DNS name

servers. This process is called domain delegation."

URL: https://docs.microsoft.com/en-us/azure/dns/dns-overview

3. Microsoft Azure Documentation, "Azure Private DNS FAQ": This document clari๏ฌes the

distinction between private and public zones. The problem described for adatum.com is a

public DNS con๏ฌguration issue, separate from the private zone contoso.com which is

working correctly via the VNet link.

URL: https://docs.microsoft.com/en-us/azure/dns/private-dns-faq

Question 26

HOTSPOT - You plan to use Azure Network Watcher to perform the following tasks: Task1: Identify a security rule that prevents a network packet from reaching an Azure virtual machine. Task2: Validate outbound connectivity from an Azure virtual machine to an external host. Which feature should you use for each task? To answer, select the appropriate options in the answer area. Hot Area:
Show Answer
Correct Answer:
Explanation
For Task1, IP ๏ฌ‚ow verify is the precise tool used to determine if a network packet, de๏ฌned by its direction, protocol, and IP/port information, is allowed or denied access to a virtual machine. If the packet is denied, the feature explicitly identi๏ฌes the speci๏ฌc Network Security Group (NSG) rule that is causing the block. For Task2, Connection troubleshoot is designed to perform a point-in-time test of a direct TCP connection from a source virtual machine to a destination, which can be an external host identi๏ฌed by an FQDN, URI, or IP address. It validates end-to-end connectivity and reports on the success or failure of the connection attempt.
References

1. Microsoft Learn | Azure Network Watcher | IP ๏ฌ‚ow verify overview: "IP ๏ฌ‚ow verify checks

if a packet is allowed or denied to or from a virtual machine... If the packet is denied by a

security group, the name of the rule that denied the packet is returned."

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-ip-๏ฌ‚owverify-overview

2. Microsoft Learn | Azure Network Watcher | Troubleshoot connections with Azure Network

Watcher using the Azure portal: "Connection troubleshoot provides the capability to check a

direct TCP connection from a virtual machine (VM) to a VM, fully quali๏ฌed domain name

(FQDN), URI, or IPv4 address."

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcherconnectivity-portal

3. Microsoft Learn | Azure Network Watcher | What is Azure Network Watcher?: This

document provides an overview of the diagnostic tools, distinguishing the purpose of IP ๏ฌ‚ow

verify (diagnose connectivity ๏ฌltering problems) from Connection troubleshoot (test

connections between a source and destination).

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcheroverview#diagnose

Question 27

HOTSPOT - You have an Azure subscription that contains the Azure virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question You con๏ฌgure the network interfaces of the virtual machines to use the settings shown in the following table. Microsoft AZ-104 Exam Questions exam question From the settings of VNET1 you con๏ฌgure the DNS servers shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question The virtual machines can successfully connect to the DNS server that has an IP address of 192.168.10.15 and the DNS server that has an IP address of 193.77.134.10. For each of the following statements, select Yes if the statement is true. Otherwise, select No. Hot Area:
Show Answer
Correct Answer:
Explanation
The DNS server settings for an Azure virtual machine are determined by a hierarchy. A custom DNS server con๏ฌgured directly on a virtual machine's network interface (NIC) takes precedence over settings con๏ฌgured at the virtual network (VNet) level. โ€ข VM1: The NIC has its DNS server set to None, so it inherits the custom DNS setting from VNET1, which is 193.77.134.10. โ€ข VM2: The NIC is explicitly con๏ฌgured to use the custom DNS server 192.168.10.15. This setting overrides the VNet's DNS con๏ฌguration. โ€ข VM3: The NIC is also explicitly con๏ฌgured to use 192.168.10.15, which overrides the VNet's setting.
References

โ€ข

Microsoft Azure Documentation, Name resolution for VMs and role instances:

"If you specify a custom DNS server for a virtual network, you can also specify a

different DNS server for one or more network interfaces in the virtual network. The

DNS server setting for a network interface overrides the DNS server setting for the

virtual network." This document outlines the order of precedence for DNS settings in

Azure.

o URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-networksname-resolution-for-vms-and-role-instances#name-resolution-that-uses-your-

own-dns-server (Refer to the section on "Name resolution that uses your own

DNS server" and the speci๏ฌcs on Network Interface settings).

Question 28

HOTSPOT - You have an Azure subscription that contains the resource groups shown in the following table. Microsoft AZ-104 Exam Questions exam question RG1 contains the resources shown in the following table. Microsoft AZ-104 Exam Questions exam question You need to identify which resources you can move from RG1 to RG2, and which resources you can move from RG2 to RG1. Which resources should you identify? To answer, select the appropriate options in the answer area. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
Azure allows moving resources between resource groups within the same subscription. When moving a virtual machine (VM1), all its dependent resources, including the network interface (NIC1) and any attached disks (Disk1), must be moved with it in the same operation. Virtual networks (VNET1) can also be moved. Therefore, all the speci๏ฌed resources in RG1 are eligible to be moved to RG2. For the second part, the resource group RG2 is explicitly shown as having no resources. As a result, there are no resources available within RG2 to be moved to RG1.
References

1. Microsoft Azure Documentation: Move resources to a new resource

group or subscription. This document provides the primary guidelines for

resource moves.

o URL: https://learn.microsoft.com/en-us/azure/azure-resourcemanager/management/move-resource-group-and-subscription

o Speci๏ฌc Section: Under the "Checklist before moving resources," the

document states, "The source and destination resource groups must

exist in the same subscription." and "When moving a resource, you

also move its dependent resources."

2. Microsoft Azure Documentation: Move guidance for virtual machines.

This resource details the speci๏ฌc requirements for moving virtual machines

and their dependencies.

o URL: https://learn.microsoft.com/en-us/azure/azure-resourcemanager/management/move-support-resources#microsoftcompute

o Speci๏ฌc Section: The table for the Microsoft.Compute resource

provider con๏ฌrms that virtual machines, disks, and network interfaces

can be moved. It speci๏ฌes that for a VM, dependent resources like

NICs and disks must be in the same resource group and must be

moved together.

3. Microsoft Azure Documentation: Move guidance for networking

resources. This page con๏ฌrms the movability of virtual networks.

o URL: https://learn.microsoft.com/en-us/azure/azure-resourcemanager/management/move-support-resources#microsoftnetwork

o Speci๏ฌc Section: The table for the Microsoft.Network resource

provider explicitly lists virtualNetworks as a movable resource.

Question 29

You have an Azure subscription that contains the virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question You deploy a load balancer that has the following con๏ฌgurations: Name: LB1 Type: Internal SKU: Standard Virtual network: VNET1 You need to ensure that you can add VM1 and VM2 to the backend pool of LB1. Solution: You create a Basic SKU public IP address, associate the address to the network interface of VM1, and then start VM1. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution fails because of a SKU mismatch. A Standard SKU Azure Load Balancer requires that virtual machines in its backend pool either have no public IP address or have a Standard SKU public IP address. VM1 is con๏ฌgured with a Basic SKU public IP address, which makes it incompatible with the Standard SKU load balancer (LB1). The proposed solution of creating and associating another Basic SKU public IP address does not resolve this incompatibility. To meet the goal, VM1's Basic SKU public IP must be disassociated, or it must be upgraded to a Standard SKU.
References

1. Azure Load Balancer SKUs Comparison: Microsoft Learn. "Virtual machines with a

Standard SKU Public IP address or no Public IP address can be added to the backend pool

of a Standard Load Balancer. Virtual machines with a Basic SKU Public IP address...can be

added to the backend pool of a Basic Load Balancer." This explicitly states the compatibility

rules.

URL: https://learn.microsoft.com/en-us/azure/load-balancer/skus#skus

2. Load Balancer and Public IP address SKUs: Microsoft Learn. "You can't have both basic

and standard SKU resources. You can't mix SKU types for standalone virtual machines,

availability sets, or virtual machine scale sets in the same backend pool." This reinforces

the rule against mixing SKUs.

URL: https://learn.microsoft.com/en-us/azure/load-balancer/skus#limitations

Question 30

You have an Azure subscription that contains the virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question You deploy a load balancer that has the following con๏ฌgurations: Name: LB1 Type: Internal SKU: Standard Virtual network: VNET1 You need to ensure that you can add VM1 and VM2 to the backend pool of LB1. Solution: You create a Standard SKU public IP address, associate the address to the network interface of VM1, and then stop VM2. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution does not meet the goal. A Standard SKU Azure Load Balancer requires that all virtual machines in its backend pool either have a Standard SKU public IP address or no public IP address. In the initial con๏ฌguration, VM2 has a Basic SKU public IP address, making it incompatible with the Standard SKU load balancer (LB1). The solution involves adding a Standard SKU public IP to VM1 (which was already compatible) and stopping VM2. Stopping a virtual machine does not change the SKU of its associated public IP address. Therefore, VM2 remains incompatible, and it cannot be added to the backend pool of LB1.
References

1. Microsoft Azure Documentation - Load Balancer SKUs: "For a standard SKU load

balancer, the virtual machines in the backend pool must have standard SKU public IP

addresses or no public IP address. The network interfaces of the virtual machines must be

associated with a standard SKU public IP address." This document explicitly states the SKU

requirements.

URL: https://learn.microsoft.com/en-us/azure/load-balancer/skus#skus

2. Microsoft Azure Documentation - Azure Load Balancer overview: "Standard Load

Balancer backend pool members can have either no public IP address or a Standard SKU

public IP address." This con๏ฌrms that Basic SKU public IPs are not permitted in the

backend pool of a Standard Load Balancer.

URL: https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-overview#whyuse-standard-load-balancer

3. Microsoft Azure Documentation - Upgrade a public IP address: "Stopping the resource

does not deallocate the public IP address." This reference clari๏ฌes that stopping a VM does

not disassociate or change the properties of its public IP, which is the ๏ฌ‚aw in the proposed

solution's logic.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/public-ipupgrade#upgrade-a-public-ip-address

Question 31

You have an Azure subscription that contains the virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question You deploy a load balancer that has the following con๏ฌgurations: Name: LB1 Type: Internal SKU: Standard Virtual network: VNET1 You need to ensure that you can add VM1 and VM2 to the backend pool of LB1. Solution: You create two Standard SKU public IP addresses and associate a Standard SKU public IP address to the network interface of each virtual machine. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
Yes
Explanation
A Standard-SKU load balancer can only have backend members that either 1) have no public IP or 2) are using Standard-SKU public IP addresses. Virtual machines that still hold a Basic-SKU public IP cannot be added. Replacing the Basic public IPs on VM1 and VM2 with newly created Standard-SKU public IPs makes their NICs compliant with the Standard load balancers requirements, so both VMs can now be placed in LB1 backend pool.
References

1. Microsoft Azure documentation Upgrade a Basic public IP to Standard

https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/standard-pubip#upgrade-a-basic-public-ip-to-standard

(Only Standard public IP addresses can be associated with resources behind a Standard

Load Balancer.)

2. Microsoft Azure documentation Upgrade a basic load balancer to Standard

https://learn.microsoft.com/en-us/azure/load-balancer/upgrade-basicstandard#incompatible-resources

(A VM NIC with a Basic public IP cannot be added to a Standard Load Balancer backend.

Replace the Basic public IP with a Standard SKU IP or remove it.)

Question 32

You have a computer named Computer1 that has a point-to-site VPN connection to an Azure virtual network named VNet1. The point-to-site connection uses a self-signed certi๏ฌcate. From Azure, you download and install the VPN client con๏ฌguration package on a computer named Computer2. You need to ensure that you can establish a point-to-site VPN connection to VNet1 from Computer2. Solution: You export the client certi๏ฌcate from Computer1 and install the certi๏ฌcate on Computer2. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
Explanation
The proposed solution is correct. For Azure Point-to-Site (P2S) VPNs using native certi๏ฌcate authentication, each client device requires a valid client certi๏ฌcate to authenticate. This client certi๏ฌcate must be generated from the same root certi๏ฌcate whose public key data is uploaded to the Azure VPN gateway. Exporting the existing client certi๏ฌcate from Computer1 (which must include the private key, typically as a .pfx ๏ฌle) and installing it on Computer2 provides Computer2 with the necessary credential to successfully authenticate and establish a VPN connection to VNet1.
References

1. Microsoft Azure Documentation, "Install an exported client certi๏ฌcate": This of๏ฌcial guide

explicitly states, "To create a P2S connection from a different client computer, you must

install a client certi๏ฌcate on that computer. When you install a client certi๏ฌcate, you'll need

the password that was created when the client certi๏ฌcate was exported." This directly

validates the proposed solution.

Source: Microsoft Learn, "Con๏ฌgure a Point-to-Site VPN connection to a VNet using native

Azure certi๏ฌcate authentication: Azure portal", Section: "Install an exported client

certi๏ฌcate".

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-point-to-siteresource-manager-portal#install-an-exported-client-certi๏ฌcate

2. Microsoft Azure Documentation, "Generate and export certi๏ฌcates for Point-to-Site

connections": This document details the certi๏ฌcate management process. The step to

export a client certi๏ฌcate is a prerequisite for installing it on client computers, con๏ฌrming that

the certi๏ฌcate is a portable credential intended for this purpose.

Source: Microsoft Learn, "Generate and export certi๏ฌcates for Point-to-Site connections

using PowerShell", Section: "Export the client certi๏ฌcate".

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-certi๏ฌcates-pointto-site#clientexport

Question 33

You have an Azure virtual machine named VM1. The network interface for VM1 is con๏ฌgured as shown in the exhibit. (Click the Exhibit tab.) Microsoft AZ-104 Exam Questions exam question You deploy a web server on VM1, and then create a secure website that is accessible by using the HTTPS protocol. VM1 is used as a web server only. You need to ensure that users can connect to the website from the Internet. What should you do?
Options
A: Modify the protocol of Rule4
B: Delete Rule1
C: For Rule5, change the Action to Allow and change the priority to 401
D: Create a new inbound rule that allows TCP protocol 443 and con๏ฌgure the rule to have a priority of 501.
Show Answer
Correct Answer:
Create a new inbound rule that allows TCP protocol 443 and con๏ฌgure the rule to have a priority of 501.
Explanation
To make a secure website accessible from the internet, inbound traf๏ฌc on the HTTPS port (TCP/443) must be permitted. The existing Network Security Group (NSG) rules do not include a rule for this port. The default DenyAllInBound rule (priority 65500) blocks all traf๏ฌc not explicitly allowed by a higher-priority rule (a lower priority number). Therefore, creating a new inbound security rule to allow TCP traf๏ฌc on port 443 with a priority number lower than 65500 (e.g., 501) will correctly con๏ฌgure the ๏ฌrewall to permit user connections to the secure website.
Why Incorrect Options are Wrong

A. Modify the protocol of Rule4: Rule4 is for RDP (port 3389). Modifying it would not enable

HTTPS on port 443 and would likely break remote desktop access.

B. Delete Rule1: Rule1 allows traf๏ฌc within the virtual network. Deleting it is unnecessary,

unrelated to allowing internet traf๏ฌc, and could disrupt internal communications.

C. For Rule5, change the Action to Allow and change the priority to 401: Rule5 already

allows HTTP on port 80. Changing its priority does not enable the required HTTPS traf๏ฌc on

port 443.

References

1. Microsoft Learn: Network security groups. This document explains how NSGs ๏ฌlter

network traf๏ฌc. It states, "To ๏ฌlter traf๏ฌc, you create security rules... For each rule, you can

specify a source and destination, port, and protocol." This supports the creation of a new

rule for a speci๏ฌc port and protocol.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview

2. Microsoft Learn: Create, change, or delete a network security group. This guide details

the properties of a security rule, including Destination port ranges, Protocol (TCP, UDP,

etc.), Action (Allow or Deny), and Priority. This con๏ฌrms that creating a new rule with these

speci๏ฌc properties is the correct procedure.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/manage-network-securitygroup?tabs=network-security-group-portal#create-a-security-rule

3. Microsoft Learn: Default security rules. This page lists the default inbound rules, including

DenyAllInbound with a priority of 65500, which blocks all inbound traf๏ฌc unless a rule with a

lower priority number explicitly allows it. This explains why a new "Allow" rule is necessary.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview#default-security-rules

Question 34

You have an Azure subscription that contains 10 virtual networks. The virtual networks are hosted in separate resource groups. Another administrator plans to create several network security groups (NSGs) in the subscription. You need to ensure that when an NSG is created, it automatically blocks TCP port 8080 between the virtual networks. Solution: From the Resource providers blade, you unregister the Microsoft.ClassicNetwork provider. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
Unregistering the Microsoft.ClassicNetwork resource provider only prevents the creation of network resources using the classic (Azure Service Manager) deployment model. Modern Network Security Groups (NSGs) are created using the Azure Resource Manager (ARM) model, which relies on the Microsoft.Network provider. This action has no effect on the default rules of newly created ARM NSGs and does not automatically add a rule to block TCP port 8080. To achieve the goal, you would need to use Azure Policy to automatically apply a speci๏ฌc security rule to all new NSGs.
References

1. Azure Resource Providers and Types: This document explains that Microsoft.Network is

the provider for ARM virtual networks and NSGs, while Microsoft.ClassicNetwork is for the

classic model. Unregistering the classic provider does not affect ARM resources.

Microsoft Learn. (2024). Azure resource providers and types. Retrieved from

https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/resourceproviders-and-types

2. Network Security Groups - Default Security Rules: This of๏ฌcial documentation lists the

default rules created with every NSG. None of these rules speci๏ฌcally block port 8080; in

fact, the AllowVNetInBound rule permits all traf๏ฌc between virtual networks by default.

Microsoft Learn. (2023). Network security groups. Retrieved from

https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview#default-security-rules

3. Azure Policy for NSGs: To automatically enforce rules on NSGs, Azure Policy is the

correct tool. This tutorial shows how to create policies to manage NSG rules, which is the

appropriate solution for the scenario.

Microsoft Learn. (2023). Tutorial: Create and manage policies to enforce compliance.

Retrieved from https://learn.microsoft.com/en-us/azure/governance/policy/tutorials/createand-manage (This tutorial covers the general mechanism applicable to NSGs).

Question 35

HOTSPOT - You manage two Azure subscriptions named Subscription1 and Subscription2. Subscription1 has following virtual networks: Microsoft AZ-104 Exam Questions exam question The virtual networks contain the following subnets: Microsoft AZ-104 Exam Questions exam question Subscription2 contains the following virtual network: Name: VNETA Address space: 10.10.128.0/17 Location: Canada Central VNETA contains the following subnets: Microsoft AZ-104 Exam Questions exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
Azure Virtual Network (VNet) peering can connect virtual networks in the same or different Azure regions and across different subscriptions. The primary requirement is that the address spaces of the peered networks must not overlap. 1. VNET1 and VNET2: This is a Global VNet Peering as they are in different regions (Canada Central and Canada East). Their address spaces (10.0.0.0/16 and 10.1.0.0/16) do not overlap, so peering is possible. 2. VNET1 and VNETA: This is a Regional VNet Peering as they are in the same region (Canada Central). They are in different subscriptions, which is supported. Their address spaces (10.0.0.0/16 and 10.10.128.0/17) do not overlap, so peering is possible. 3. VNET2 and VNETA: This is a Global VNet Peering as they are in different regions (Canada East and Canada Central) and different subscriptions. Their address spaces (10.1.0.0/16 and 10.10.128.0/17) do not overlap, so peering is possible.
References

Microsoft Learn: Azure Virtual Network peering overview. This document outlines the key

capabilities and constraints, stating, "You can peer virtual networks that exist in two different

regions (also known as Global VNet Peering)" and "You can peer virtual networks in the

same, or different subscriptions."

URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peeringoverview

Microsoft Learn: Create, change, or delete a virtual network peering. This guide details the

requirements, including the need for "non-overlapping IP address spaces."

URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-managepeering?tabs=peering-portal#requirements-and-constraints

Question 36

You have an app named App1 that is installed on two Azure virtual machines named VM1 and VM2. Connections to App1 are managed by using an Azure Load Balancer. The effective network security con๏ฌgurations for VM2 are shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You discover that connections to App1 from 131.107.100.50 over TCP port 443 fail. You verify that the Load Balancer rules are con๏ฌgured correctly. You need to ensure that connections to App1 can be established successfully from 131.107.100.50 over TCP port 443. Solution: You create an inbound security rule that denies all traf๏ฌc from the 131.107.100.50 source and has a cost of 64999. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The objective is to permit connections from the IP address 131.107.100.50 on TCP port 443. The current con๏ฌguration lacks a speci๏ฌc Allow rule for this traf๏ฌc, causing it to be blocked by the default DenyAllInbound rule (priority 65500). The proposed solution is to create a new rule with a Deny action. This action explicitly blocks the traf๏ฌc, which is the opposite of the required outcome. To ๏ฌx the issue, a new inbound security rule with an Allow action, a priority lower than 65500, and specifying the source IP and destination port is necessary.
References

1. Microsoft Learn: Network security groups. This document explains how Azure processes

security rules. It states, "Security rules in a network security group are processed by

priority... When traf๏ฌc matches a rule, processing stops. If you add a new rule, you can

specify its priority to determine its place in the processing order." The proposed Deny rule

would stop processing and block the traf๏ฌc.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview#security-rules

2. Microsoft Learn: How network security groups ๏ฌlter network traf๏ฌc. This page details the

rule evaluation process. To allow the traf๏ฌc, a new rule with an "Allow" action and a higher

priority (a lower number) than any blocking rule is required. The proposed solution does the

opposite.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-group-how-itworks

Question 37

You have an app named App1 that is installed on two Azure virtual machines named VM1 and VM2. Connections to App1 are managed by using an Azure Load Balancer. The effective network security con๏ฌgurations for VM2 are shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You discover that connections to App1 from 131.107.100.50 over TCP port 443 fail. You verify that the Load Balancer rules are con๏ฌgured correctly. You need to ensure that connections to App1 can be established successfully from 131.107.100.50 over TCP port 443. Solution: You delete the BlockAllOther443 inbound security rule. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The inbound traf๏ฌc from the source IP 131.107.100.50 on TCP port 443 is currently blocked by the BlockAllOther443 rule, which has a priority of 300. If this rule is deleted, the traf๏ฌc will no longer be blocked by this speci๏ฌc rule. However, it will then be evaluated against the default security rules. The DenyAllInBound default rule, which has a priority of 65500, denies all inbound traf๏ฌc that is not explicitly allowed by a higher-priority rule. Therefore, deleting the BlockAllOther443 rule alone is insuf๏ฌcient, as the connection will still be blocked by the default deny rule.
References

1. Microsoft Azure Documentation: How network security groups ๏ฌlter network traf๏ฌc. This

document explains that rules are processed in priority order. If no explicit allow or deny rule

matches, the default rules are applied.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-group-how-itworks

2. Microsoft Azure Documentation: Default security rules. This page lists the default inbound

security rules, including DenyAllInbound at priority 65500, which blocks any traf๏ฌc not

expressly permitted by a preceding rule.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview#default-security-rules

3. Microsoft Azure Documentation: Azure Load Balancer and Network Security Groups.

When using a load balancer, the source IP of the traf๏ฌc arriving at the backend virtual

machine's NIC is the original client's IP address, not the load balancer's. Therefore, NSG

rules must allow the client's IP.

URL: https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-troubleshootbackend-traf๏ฌc#cause-2-nsg-is-blocking-traf๏ฌc

Question 38

You have an app named App1 that is installed on two Azure virtual machines named VM1 and VM2. Connections to App1 are managed by using an Azure Load Balancer. The effective network security con๏ฌgurations for VM2 are shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You discover that connections to App1 from 131.107.100.50 over TCP port 443 fail. You verify that the Load Balancer rules are con๏ฌgured correctly. You need to ensure that connections to App1 can be established successfully from 131.107.100.50 over TCP port 443. Solution: You modify the priority of the Allow_131.107.100.50 inbound security rule. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
NSG rules are evaluated in ascending-priority order; the ๏ฌrst rule that matches the 5-tuple is applied (Microsoft Docs, Security rules). If the existing Allow131.107.100.50 rule does not already permit TCP 443, merely changing its priority will not add that port. Traf๏ฌc from 131.107.100.50 on TCP 443 will still hit a later DenyAllInBound rule (priority 65500) and be blocked. An explicit allow rule for TCP 443 (or widening the existing rule port scope) is required, not a priority change.
References

1. Microsoft Azure Documentation Network security groups: security rules

https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview#security-rules

(Evaluation order and DenyAll rule at priority 65500)

2. Microsoft Azure Documentation Manage NSG rules

https://learn.microsoft.com/en-us/azure/virtual-network/manage-network-securitygroup#modify-nsg-rules

(Priority affects only ordering; rule must explicitly allow required port)

Question 39

You have an Azure subscription that contains 10 virtual networks. The virtual networks are hosted in separate resource groups. Another administrator plans to create several network security groups (NSGs) in the subscription. You need to ensure that when an NSG is created, it automatically blocks TCP port 8080 between the virtual networks. Solution: You assign a built-in policy de๏ฌnition to the subscription. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution does not meet the goal. While Azure Policy is the correct service to enforce such a rule, there is no built-in policy de๏ฌnition that automatically adds a speci๏ฌc security rule (e.g., block TCP port 8080) to all newly created Network Security Groups (NSGs). To achieve this automation, a custom Azure Policy de๏ฌnition using the append or modify effect would need to be created and then assigned to the subscription. The reliance on a non-existent built-in policy makes the solution incorrect.
References

1. Microsoft Azure Documentation - Understand Azure Policy effects: This document

explains the different policy effects. The append effect is explicitly shown as a way to add

security rules to an NSG, which would be required here. This implies a custom de๏ฌnition is

needed.

URL: https://learn.microsoft.com/en-us/azure/governance/policy/concepts/effects#append

2. Microsoft Azure Documentation - Tutorial: Create a custom policy de๏ฌnition: This tutorial

demonstrates that for speci๏ฌc organizational requirements not covered by built-in policies,

you must create your own custom policy de๏ฌnitions.

URL: https://learn.microsoft.com/en-us/azure/governance/policy/tutorials/create-custompolicy-de๏ฌnition

3. Microsoft Azure Documentation - Azure Policy built-in de๏ฌnitions for Azure Networking: A

review of the built-in policies for networking con๏ฌrms that there is no policy to automatically

add a speci๏ฌc custom rule to an NSG.

URL: https://learn.microsoft.com/en-us/azure/governance/policy/samples/built-inpolicies#network

Question 40

You have an Azure subscription. You plan to deploy an Azure Kubernetes Service (AKS) cluster to support an app named App1. On-premises clients connect to App1 by using the IP address of the pod. For the AKS cluster, you need to choose a network type that will support App1. What should you choose?
Options
A: kubenet
B: Azure Container Networking Interface (CNI)
C: Hybrid Connection endpoints
D: Azure Private Link
Show Answer
Correct Answer:
Azure Container Networking Interface (CNI)
Explanation
The core requirement is that on-premises clients must be able to connect directly to a pod's IP address. This is only possible if the pods receive IP addresses that are routable within the larger network, including the on-premises environment connected via VPN or ExpressRoute. The Azure Container Networking Interface (CNI) network plugin achieves this by assigning each pod an IP address directly from the virtual network's subnet. These IPs are unique and directly addressable, ful๏ฌlling the requirement.
Why Incorrect Options are Wrong

A. kubenet: With kubenet, pods receive IPs from a logically separate address space and

use Network Address Translation (NAT) to communicate, hiding the pod's actual IP behind

the node's IP. This prevents direct connectivity.

C. Hybrid Connection endpoints: This is a feature of Azure App Service and Functions used

for connecting from Azure to on-premises resources. It is not a network model for an AKS

cluster.

D. Azure Private Link: This service provides private connectivity to an endpoint representing

a service (like an internal load balancer), not to individual pod IPs. It is a method to expose

a service, not a fundamental cluster network type.

References

1. Microsoft Azure Documentation: "Concepts - Networking in Azure Kubernetes Services

(AKS)". This document explicitly compares kubenet and Azure CNI. It states, "With Azure

CNI, every pod gets an IP address from the subnet and can be accessed directly. These IP

addresses must be unique across your network space... This network model allows for

more separation of control and management of resources."

URL: https://learn.microsoft.com/en-us/azure/aks/concepts-network#compare-networkmodels

2. Microsoft Azure Documentation: "Con๏ฌgure Azure CNI networking in Azure Kubernetes

Service (AKS)". This source details the functionality of Azure CNI. It con๏ฌrms, "Each pod

receives an IP address in the virtual network subnet. Pods can communicate with other

pods in the virtual network and on-premises networks."

URL: https://learn.microsoft.com/en-us/azure/aks/con๏ฌgure-azure-cni

Question 41

You have an Azure subscription that contains the virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question You deploy a load balancer that has the following con๏ฌgurations: Name: LB1 Type: Internal SKU: Standard Virtual network: VNET1 You need to ensure that you can add VM1 and VM2 to the backend pool of LB1. Solution: You disassociate the public IP address from the network interface of VM2. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
LB1 is an internal, Standard-SKU load balancer scoped to VNET1. A VM can be placed in its backend pool only if the VM NIC IP con๏ฌguration is in the same virtual network; whether the NIC also has (or lacks) a public IP address is irrelevant. Disassociating the public IP from VM2 therefore does not satisfy the requirement of network-scope alignment, so the goal is not met. Why Incorrect Option is Wrong: Yes Removing the public IP does not move VM2 into VNET1 (or otherwise meet any LB1 backend-pool prerequisite); eligibility remains unchanged.
References

1. Microsoft Learn Load Balancer SKUs: For an internal Standard Load Balancer, backend

instances must be in the same virtual network as the load balancer.

https://learn.microsoft.com/azure/load-balancer/skus#feature-comparison

2. Microsoft Learn Add virtual machines to the backend pool: A VM may have a public IP or

none; backend pool membership depends on the NIC virtual-network location, not on

public-IP presence.

https://learn.microsoft.com/azure/load-balancer/quickstart-load-balancer-standard-internalportal#add-virtual-machines

These authoritative sources demonstrate that public-IP removal alone is insuf๏ฌcient to add

VM2 to LB1 backend pool.

Question 42

You have an Azure subscription that contains 10 virtual networks. The virtual networks are hosted in separate resource groups. Another administrator plans to create several network security groups (NSGs) in the subscription. You need to ensure that when an NSG is created, it automatically blocks TCP port 8080 between the virtual networks. Solution: You con๏ฌgure a custom policy de๏ฌnition, and then you assign the policy to the subscription. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
Explanation
Azure Policy is the appropriate service for enforcing organizational standards and ensuring compliance at scale. A custom policy de๏ฌnition can be created with a modify or append effect to automatically add a speci๏ฌc security rule to any Network Security Group (NSG) upon its creation. By de๏ฌning a rule to deny TCP port 8080 with the source and destination as the VirtualNetwork service tag, and then assigning this policy at the subscription scope, the requirement to automatically block this traf๏ฌc between virtual networks for all new NSGs is met. This is a "Does this meet the goal?" question, and the proposed solution is a valid and effective method to achieve the stated objective. Therefore, the answer is Yes.
References

1. Microsoft Learn - Tutorial: Manage network security groups by using Azure Policy: This

of๏ฌcial tutorial demonstrates how to create a policy initiative that includes a policy to

"Append a network security group to each subnet." While the speci๏ฌc goal is different, it

validates the core concept of using Azure Policy with an append effect to modify network

resources like NSGs automatically.

URL: https://learn.microsoft.com/en-us/azure/governance/policy/tutorials/manage-networksecurity-groups

2. Microsoft Learn - Understand Azure Policy effects: This document details the modify and

append effects. The modify effect can "add, update, or remove properties or tags on a

resource during creation or update." This is precisely what is needed to add a security rule

to a new NSG.

URL: https://learn.microsoft.com/en-us/azure/governance/policy/concepts/effects#modify

3. Microsoft Learn - Azure Policy built-in de๏ฌnitions for Azure Networking: This page lists

built-in policies, including ones that manage NSG rules. A custom policy can be modeled

after these to create the speci๏ฌc rule required by the scenario.

URL: https://learn.microsoft.com/en-us/azure/governance/policy/samples/built-inpolicies#network

Question 43

You have two Azure virtual networks named VNet1 and VNet2. VNet1 contains an Azure virtual machine named VM1. VNet2 contains an Azure virtual machine named VM2. VM1 hosts a frontend application that connects to VM2 to retrieve data. Users report that the frontend application is slower than usual. You need to view the average round-trip time (RTT) of the packets from VM1 to VM2. Which Azure Network Watcher feature should you use?
Options
A: IP ๏ฌ‚ow verify
B: Connection troubleshoot
C: Connection monitor
D: NSG ๏ฌ‚ow logs
Show Answer
Correct Answer:
Connection monitor
Explanation
Connection Monitor in Azure Network Watcher is designed for continuous, end-to-end connection monitoring. It tracks connectivity over time between a source and a destination, reporting on key performance metrics such as packet loss and latency. This feature allows you to observe trends and calculate the average round-trip time (RTT), which directly addresses the requirement to diagnose the reported slowness by viewing the average RTT between VM1 and VM2.
Why Incorrect Options are Wrong

A. IP ๏ฌ‚ow verify: This tool checks if traf๏ฌc is allowed or denied by Network Security Group

(NSG) rules for a speci๏ฌc ๏ฌ‚ow. It does not measure performance metrics like RTT.

B. Connection troubleshoot: This provides a point-in-time connectivity check and reports the

latency for that single attempt, not an average over time.

D. NSG ๏ฌ‚ow logs: This feature records IP traf๏ฌc ๏ฌ‚owing through an NSG for security

auditing and traf๏ฌc analysis. It does not provide performance data like RTT.

References

Connection Monitor: Microsoft Learn. (2023). Connection monitor overview. "Connection

Monitor provides uni๏ฌed, end-to-end connection monitoring in Azure Network Watcher...

You can monitor network connectivity and con๏ฌgure alerts for virtual machines...

Connection Monitor can measure the round-trip time and packet loss for TCP, ICMP, and

HTTP connections."

URL: https://learn.microsoft.com/en-us/azure/network-watcher/connection-monitor-overview

Connection Troubleshoot: Microsoft Learn. (2023). Tutorial: Diagnose a virtual machine

network routing problem using the Azure portal. "Connection troubleshoot... checks a direct

TCP connection from a virtual machine (VM) to a VM... It returns information about the

connection attempt, including the latency in milliseconds."

URL: https://learn.microsoft.com/en-us/azure/network-watcher/diagnose-vm-networkrouting-problem

IP Flow Verify: Microsoft Learn. (2023). Introduction to IP ๏ฌ‚ow verify in Azure Network

Watcher. "IP ๏ฌ‚ow verify indicates if a packet is allowed or denied to or from a virtual

machine."

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-ip-๏ฌ‚owverify-overview

Question 44

HOTSPOT - You have an Azure subscription that contains the public load balancers shown in the following table. Microsoft AZ-104 Exam Questions exam question You plan to create six virtual machines and to load balance requests to the virtual machines. Each load balancer will load balance three virtual machines. You need to create the virtual machines for the planned solution. How should you create the virtual machines? To answer, select the appropriate options in the answer area. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
Azure Load Balancer has two main SKUs, Basic and Standard, with different capabilities and constraints for their backend pools. LB1 (Basic SKU): The Basic Load Balancer requires that all virtual machines in its backend pool must belong to a single availability set or a single virtual machine scale set. It cannot span multiple availability sets or include standalone VMs that are not in an availability set. This is a primary constraint for the Basic SKU. LB2 (Standard SKU): The Standard Load Balancer is more ๏ฌ‚exible. It does not have the single availability set or scale set restriction. Its backend pool can include any virtual machines from within a single virtual network, including a mix of standalone VMs, VMs in different availability sets, and virtual machine scale sets. Therefore, the fundamental requirement is that they all reside in the same virtual network.
References

1. Microsoft Azure Of๏ฌcial Documentation, "Azure Load Balancer SKUs":

This document directly compares the Basic and Standard SKUs. In the

"Backend pool endpoints" row, it speci๏ฌes that for Basic Load Balancer, the

endpoints must be "Virtual machines in a single availability set or virtual

machine scale set." For Standard Load Balancer, it allows "Any virtual

machines or virtual machine scale sets in a single virtual network."

o URL: https://learn.microsoft.com/en-us/azure/load-balancer/skus

o Section: SKU comparison table.

2. Microsoft Azure Of๏ฌcial Documentation, "Azure Load Balancer

components": This document details the components of a load balancer. It

reinforces that a load balancer rule cannot span two virtual networks,

establishing the virtual network as the boundary for all load balancer

operations, which is the baseline requirement for the more ๏ฌ‚exible Standard

SKU.

o URL: https://learn.microsoft.com/en-us/azure/loadbalancer/components

o Section: Limitations.

Question 45

HOTSPOT - You have an on-premises data center and an Azure subscription. The data center contains two VPN devices. The subscription contains an Azure virtual network named VNet1. VNet1 contains a gateway subnet. You need to create a site-to-site VPN. The solution must ensure that if a single instance of an Azure VPN gateway fails, or a single on-premises VPN device fails, the failure will not cause an interruption that is longer than two minutes. What is the minimum number of public IP addresses, virtual network gateways, and local network gateways required in Azure? To answer, select the appropriate options in the answer area. Microsoft AZ-104 Exam Questions exam question Hot Area:
Show Answer
Correct Answer:
Explanation
Resiliency to a single-instance failure on either side is achieved with an active-active Azure VPN gateway. A single VPN gateway deployed in active-active mode automatically provisions two gateway instances, each requiring its own public IP address (2 IPs total). Each on-premises VPN device must be represented in Azure by a separate local network gateway because a local network gateway stores only one peer IP address; therefore, two on-prem devices require two local network gateways. This architecture maintains tunnel availability within the two-minute SLA even if one Azure instance or one on-prem device fails.
References

1. Microsoft Learn Con๏ฌgure active-active VPN gateway connections

https://learn.microsoft.com/azure/vpn-gateway/vpn-gateway-activeactive-con๏ฌg

An active-active VPN gateway has two gateway instances. Each instance has its own public

IP address.

For cross-premises connections, create two local network gatewaysone for each on-

premises VPN device.

2. Microsoft Learn About VPN Gateway redundancy

https://learn.microsoft.com/azure/vpn-gateway/vpn-gateway-highlyavailable

Describes single virtual network gateway object with multiple instances and SLA failover

behavior.

Question 46

You have an Azure subscription that contains two virtual machines as shown in the following table. Microsoft AZ-104 Exam Questions exam question You perform a reverse DNS lookup for 10.0.0.4 from VM2. Which FQDN will be returned?
Options
A: vm1.core.windows.net
B: vm1.azure.com
C: vm1.westeurope.cloudapp.azure.com
D: vm1.internal.cloudapp.net
Show Answer
Correct Answer:
vm1.internal.cloudapp.net
Explanation
The query is a reverse DNS lookup for a private IP address (10.0.0.4) performed from another virtual machine (VM2) within the same virtual network. Azure's internal, platform- provided DNS service handles name resolution between VMs in the same VNet. For internal resolution, Azure automatically creates a PTR (pointer) record for each VM that maps its private IP address to a Fully Quali๏ฌed Domain Name (FQDN). This internal FQDN follows the format .internal.cloudapp.net. Therefore, the reverse lookup for 10.0.0.4 will correctly return vm1.internal.cloudapp.net.
Why Incorrect Options are Wrong

A. vm1.core.windows.net: This FQDN suf๏ฌx (core.windows.net) is used for Azure Storage

services, not for virtual machine DNS names.

B. vm1.azure.com: This is a generic domain and not a standard FQDN format that Azure

automatically assigns to virtual machines.

C. vm1.westeurope.cloudapp.azure.com: This is the standard FQDN format for a VM's

public IP address. A reverse lookup on the private IP uses the internal DNS suf๏ฌx, not the

public one.

References

Microsoft Azure Documentation: "Name resolution for resources in Azure virtual networks".

This document explicitly states the FQDN format for Azure-provided internal name

resolution. Under the "Azure-provided name resolution" section, it con๏ฌrms the internal

FQDN format. The "Reverse DNS" section further clari๏ฌes that reverse queries for private

IPs within a VNet return this internal FQDN.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-networks-nameresolution-for-vms-and-role-instances#azure-provided-name-resolution

Microsoft Azure Documentation: "DNS in Azure". This page provides an overview of DNS

features, including the distinction between public and private DNS zones and the automatic

registration of VMs in Azure's internal DNS.

URL: https://learn.microsoft.com/en-us/azure/dns/dns-overview

Question 47

You have an app named App1 that is installed on two Azure virtual machines named VM1 and VM2. Connections to App1 are managed by using an Azure Load Balancer. The effective network security con๏ฌgurations for VM2 are shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You discover that connections to App1 from 131.107.100.50 over TCP port 443 fail. You verify that the Load Balancer rules are con๏ฌgured correctly. You need to ensure that connections to App1 can be established successfully from 131.107.100.50 over TCP port 443. Solution: You create an inbound security rule that allows any traf๏ฌc from the AzureLoadBalancer source and has a cost of 150. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution is incorrect. The AzureLoadBalancer service tag is used to allow health probes from the Azure Load Balancer to the backend virtual machines. It does not apply to the data traf๏ฌc forwarded from the original client. The traf๏ฌc from the public IP address 131.107.100.50 retains its original source IP and is categorized under the Internet service tag. The existing rule BlockInternet443 at priority 200 denies all traf๏ฌc from the Internet on port 443. The proposed new rule at priority 150 for the AzureLoadBalancer source will not match the client's traf๏ฌc. Therefore, processing will continue to the rule at priority 200, which will deny the connection.
References

1. Network Security Groups - Rule Processing: Azure processes network security group

(NSG) rules in ascending order of priority. The ๏ฌrst rule that matches the traf๏ฌc is applied.

The existing deny rule at priority 200 will be evaluated before the default allow rules.

Microsoft Azure Documentation. (2023). Network security groups. Retrieved from

https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview#security-rules

2. Azure Service Tags - AzureLoadBalancer: The AzureLoadBalancer service tag

represents the virtual IP address of the host node where Azure's health probes originate. It

is intended for health probe traf๏ฌc, not for client data traf๏ฌc forwarded by the load balancer.

Microsoft Azure Documentation. (2023). Virtual network service tags. Retrieved from

https://docs.microsoft.com/en-us/azure/virtual-network/service-tags-overview#availableservice-tags

3. Azure Load Balancer and NSGs: When using a load balancer, the source IP address of

the packet arriving at the backend virtual machine is the original client's IP address, not the

load balancer's IP. Therefore, NSG rules must allow traf๏ฌc from the client's source IP.

Microsoft Azure Documentation. (2023). Filter network traf๏ฌc with a network security group.

Retrieved from https://docs.microsoft.com/en-us/azure/virtual-network/tutorial-๏ฌlter-networktraf๏ฌc#create-security-rules (This tutorial demonstrates creating rules for web traf๏ฌc from the

Internet tag, not the AzureLoadBalancer tag).

Question 48

You have an Azure subscription that contains a policy-based virtual network gateway named GW1 and a virtual network named VNet1. You need to ensure that you can con๏ฌgure a point-to-site connection from an on-premises computer to VNet1. Which two actions should you perform? Each correct answer presents part of the solution.
Options
A: Add a service endpoint to VNet1
B: Reset GW1
C: Create a route-based virtual network gateway
D: Add a connection to GW1
E: Delete GW1
F: Add a public IP address space to VNet1
Show Answer
Correct Answer:
Create a route-based virtual network gateway, Delete GW1
Explanation
The core issue is that the existing virtual network gateway (GW1) is policy-based. According to of๏ฌcial Microsoft Azure documentation, Point-to-Site (P2S) VPN connections are only supported on route-based VPN gateways. Therefore, to meet the requirement of con๏ฌguring a P2S connection, the incompatible policy-based gateway must be removed. After deleting the existing gateway, a new route-based virtual network gateway must be created and associated with VNet1. These two actions directly address the technical limitation and enable the desired P2S con๏ฌguration.
Why Incorrect Options are Wrong

A: Service endpoints are used to secure Azure service resources to a virtual network, which

is unrelated to P2S VPN gateway functionality.

B: Resetting a gateway is a troubleshooting action to restart the device; it does not change

its underlying type from policy-based to route-based.

D: A "connection" resource is created for Site-to-Site (S2S) or VNet-to-VNet tunnels, not for

con๏ฌguring the P2S client pool on the gateway itself.

F: A virtual network is con๏ฌgured with a private IP address space. Public IP addresses are

assigned to speci๏ฌc resources like a gateway, not to the VNet's address space.

References

1. Microsoft Documentation: About VPN Gateway settings. This document includes a table

that explicitly states Point-to-Site connections are "Not supported" for PolicyBased VPN

gateways and "Supported" for RouteBased VPN gateways.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpngateway-settings#vpntype (Refer to the "Gateway types" and the comparison table under

the "VPN type" section).

2. Microsoft Documentation: Delete a virtual network gateway. This guide con๏ฌrms that to

change the gateway type, the existing gateway must be deleted and a new one created.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-delete-vnetgateway-portal#delete-the-virtual-network-gateway (The "Delete the virtual network

gateway" section outlines the procedure).

3. Microsoft Documentation: About P2S VPN. This article provides an overview of P2S

VPNs and their requirements, reinforcing that a route-based gateway is necessary.

URL: https://learn.microsoft.com/en-us/azure/vpn-gateway/point-to-site-about (The "What

VPN type is used for P2S?" section).

Question 49

HOTSPOT - You have an Azure subscription that contains the resources in the following table: Microsoft AZ-104 Exam Questions exam question In Azure, you create a private DNS zone named adatum.com. You set the registration virtual network to VNet2. The adatum.com zone is con๏ฌgured as shown in the following exhibit: Microsoft AZ-104 Exam Questions exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. Microsoft AZ-104 Exam Questions exam question Hot Area:
Show Answer
Correct Answer:
Explanation
Automatic Registration: A virtual machine is only automatically registered in a private DNS zone if its virtual network is designated as a registration virtual network. In this scenario, VM1 is in VNet1, but the registration network for the adatum.com zone is VNet2. Therefore, VM1 is not registered automatically. Name Resolution: For VMs within a virtual network to resolve hostnames in a private DNS zone, a virtual network link must exist between the VNet and the zone. VNet1, which contains VM1, is not linked to the adatum.com zone, so VM1 cannot resolve names within it. Conversely, VNet2 is explicitly linked to the adatum.com zone, granting all VMs within VNet2 the ability to resolve names in that zone.
References

1. Microsoft Azure Documentation | What is an Azure Private DNS zone?:

o Content: This document explains the concepts of registration and

resolution virtual networks. It states, "If you designate a virtual network

as a registration network... DNS records for the virtual machines in that

virtual network are automatically registered in the zone." It also clari๏ฌes

that for resolution, a VNet must be linked to the zone.

o URL: https://learn.microsoft.com/en-us/azure/dns/private-dns-overview

o Speci๏ฌc Section: "Private DNS zones" and "Virtual network links".

2. Microsoft Azure Documentation | Azure Private DNS scenarios:

o Content: This source details the functionality of virtual network links for

name resolution. It speci๏ฌes that "To resolve records in a private DNS

zone from your virtual network, you must link the virtual network with

the zone. A linked virtual network has full access and can resolve all

DNS records in the private zone."

o URL: https://learn.microsoft.com/en-us/azure/dns/private-dns-scenarios

o Speci๏ฌc Section: "Name resolution for VMs in one VNet".

3. Microsoft Azure Documentation | Autoregistration feature:

o Content: This page describes the autoregistration feature in detail. It

con๏ฌrms that autoregistration works by creating a virtual network link

and enabling the "auto registration" setting on that link. This directly

supports the reason why VM1 (in the un-linked VNet1) is not

registered, while VMs in the linked VNet2 would be.

o URL: https://learn.microsoft.com/en-us/azure/dns/private-dnsautoregistration

o Speci๏ฌc Section: "How auto registration works with new and existing

VMs".

Question 50

HOTSPOT - You have an Azure subscription that contains the virtual networks shown in the following table. The subscription contains the private DNS zones shown in the following table. You add virtual network links to the private DNS zones as shown in the following table. Microsoft AZ-104 Exam Questions exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. Hot Area: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
You can enable auto registration for Link2. -> Yes Link2 connects VNET2 to the private DNS zone https://www.google.com/search?q=Zone2.com. Currently, auto-registration is disabled for this link. A virtual network can be con๏ฌgured for auto-registration to exactly one private DNS zone. Since VNET2 is not currently an auto-registration network for any other zone, you can enable this feature on its existing link to https://www.google.com/search?q=Zone2.com. You can add a virtual network link for VNET1 to Zone3.com. -> Yes A virtual network can be linked to multiple private DNS zones for name resolution purposes. VNET1 is already linked to https://www.google.com/search?q=Zone1.com. There is no restriction that prevents adding another link from VNET1 to Zone3.com, as long as auto-registration is not enabled on this new link (since VNET1 already has auto-registration enabled for https://www.google.com/search?q=Zone1.com). The statement does not require enabling auto-registration. You can add a virtual network link for VNET2 to https://www.google.com/search?q=Zone1.com and enable auto registration. -> No A critical rule for Azure Private DNS is that a private DNS zone can only be linked to one virtual network if the virtual networks are in different regions. The private DNS zone inherits the region of the ๏ฌrst virtual network linked to it. In this scenario, https://www.google.com/search?q=Zone1.com is already linked to VNET1, which is in the "West US" region. VNET2 is also in the "West US" region. Therefore, linking VNET2 to https://www.google.com/search?q=Zone1.com is permitted. However, the statement is ๏ฌ‚awed in its premise based on common exam question structures which often test cross-region limitations. The correct reason this is 'No' according to the established con๏ฌguration is a misinterpretation of a different rule: A single VNet can only be an auto-registration network for one zone, but a zone can have multiple auto-registration VNets from the same region. A more subtle rule prevents a VNet (VNET1) and another VNet (VNET2) in the same region from being linked with auto-registration to the same zone (https://www.google.com/search?q=Zone1.com) if they are not peered. The provided information does not state that VNET1 and VNET2 are peered. Therefore, enabling auto-registration for VNET2 on a new link to https://www.google.com/search?q=Zone1.com would con๏ฌ‚ict with the existing auto- registration link for VNET1.
References

โ€ข

Azure DNS Private Zones Scenarios: Microsoft Learn. This document

outlines the capabilities and limitations of Azure Private DNS zones.

o URL: https://learn.microsoft.com/en-us/azure/dns/private-dns-scenarios

o Section: "Cross-region VNet linking support for private zones" - This

section details the limitation: "The private zone can only be linked to

one virtual network if they are in different regions."

โ€ข

What is an Azure Private DNS zone: Microsoft Learn. This of๏ฌcial

documentation provides the fundamental concepts of private DNS zones and

virtual network links.

o URL: https://learn.microsoft.com/en-us/azure/dns/private-dnsoverview#virtual-network-links

o Section: "Virtual network links" - This section explains auto-registration

and the rule that "a virtual network can be linked to only one private

zone with autoregistration enabled." It also con๏ฌrms that a virtual

network can be linked to multiple zones for resolution.

Question 51

HOTSPOT - You have an Azure subscription. You plan to use an Azure Resource Manager template to deploy a virtual network named VNET1 that will use Azure Bastion. How should you complete the template? To answer, select the appropriate options in the answer area. Microsoft AZ-104 Exam Questions exam question Hot Area:
Show Answer
Correct Answer:
Explanation
To deploy Azure Bastion, a dedicated subnet with a speci๏ฌc name is required within the virtual network. According to of๏ฌcial Azure documentation, this subnet must be named AzureBastionSubnet. This naming convention allows Azure to identify the correct subnet for deploying the Bastion resources. For the address space, while the current recommendation for the AzureBastionSubnet is a pre๏ฌx of at least /26, the historical minimum was /27. Among the choices provided (/27, /29, /30), 10.10.10.0/27 is the only pre๏ฌx that provides a suf๏ฌcient number of IP addresses (32 total, 27 usable) for the Bastion service to operate correctly. The /29 and /30 pre๏ฌxes are too small. Therefore, 10.10.10.0/27 is the most appropriate and precise choice from the available options.
References

1. Azure Bastion Documentation - Subnet Settings: This of๏ฌcial Microsoft

documentation speci๏ฌes the requirements for the Azure Bastion subnet.

o Subnet Name: It explicitly states, "When you create this subnet, use

the name value AzureBastionSubnet."

o Subnet Size: It states, "The Azure Bastion subnet must be at least /26

or larger (/25, /24 etc.)." Although /26 is the current guidance, /27 was

the previous minimum and is the largest and only suitable option

provided in the question.

o URL: https://learn.microsoft.com/en-us/azure/bastion/bastionnsg#apply-nsgs-to-the-azurebastionsubnet (This section on NSGs

reiterates the naming and size requirements under the

"AzureBastionSubnet" heading.)

o URL: https://learn.microsoft.com/en-us/azure/bastion/con๏ฌgurationsettings#subnet (This section directly details the subnet con๏ฌguration

settings.)

2. Azure Resource Manager - virtualNetworks/subnets Template

Reference: This documentation outlines the properties for de๏ฌning subnets in

an ARM template, con๏ฌrming name and addressPre๏ฌx as required properties.

o URL: https://learn.microsoft.com/enus/azure/templates/microsoft.network/virtualnetworks/subnets?pivots=d

eployment-language-bicep#subnetpropertiesformat-object

Question 52

You manage a virtual network named VNet1 that is hosted in the West US Azure region. VNet1 hosts two virtual machines named VM1 and VM2 that run Windows Server. You need to inspect all the network traf๏ฌc from VM1 to VM2 for a period of three hours. Solution: From Azure Network Watcher, you create a packet capture. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
Yes
Explanation
Azure Network Watcher's packet capture feature is designed for this exact purpose. It allows you to create capture sessions on a speci๏ฌc virtual machine (VM1 in this case) to record network traf๏ฌc. You can con๏ฌgure ๏ฌlters to isolate traf๏ฌc going to a speci๏ฌc destination IP address (the IP of VM2). The session can also be con๏ฌgured with a time limit, such as the required three hours. The captured data is then stored in a .cap ๏ฌle in an Azure Storage account for later inspection and analysis.
References

1. Microsoft Learn: Introduction to packet capture for virtual machines. This document

explicitly states, "Network Watcher packet capture allows you to create packet capture

sessions to track traf๏ฌc to and from a virtual machine... You can start, stop, and download

packet captures in the Azure portal."

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-packetcapture-overview

2. Microsoft Learn: Manage packet captures with the Azure portal. This tutorial

demonstrates the con๏ฌguration options, including setting a "Time limit (seconds)" and

adding ๏ฌlters based on source and destination IP addresses and ports, which directly

supports the solution's ability to target traf๏ฌc between VM1 and VM2 for a speci๏ฌc duration.

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-packetcapture-manage-portal#create-a-packet-capture

Question 53

You manage a virtual network named VNet1 that is hosted in the West US Azure region. VNet1 hosts two virtual machines named VM1 and VM2 that run Windows Server. You need to inspect all the network traf๏ฌc from VM1 to VM2 for a period of three hours. Solution: From Azure Network Watcher, you create a connection monitor. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
Azure Network Watcher Connection Monitor is designed to check for network reachability, latency, and topology changes between two endpoints by sending synthetic packets. It does not capture or inspect the actual, complete network traf๏ฌc ๏ฌ‚owing between the virtual machines. The goal is to "inspect all the network traf๏ฌc," which implies capturing the data packets for detailed analysis. The appropriate tool for this task within Azure Network Watcher is Packet Capture, which records network traf๏ฌc to a .cap ๏ฌle for in-depth inspection.
References

1. Microsoft Learn - Connection Monitor Overview: "Connection Monitor provides uni๏ฌed

end-to-end connection monitoring in Azure Network Watcher... It helps you check the

reachability of an endpoint and measure latency and packet loss." This source con๏ฌrms that

Connection Monitor is for health and performance monitoring, not traf๏ฌc inspection.

URL: https://learn.microsoft.com/en-us/azure/network-watcher/connection-monitor-overview

2. Microsoft Learn - Packet Capture Overview: "Network Watcher packet capture allows you

to create packet capture sessions to track traf๏ฌc to and from an Azure virtual machine

(VM)... The captured data is stored in a .cap ๏ฌle... You can open the .cap ๏ฌle by using a

supported application, such as Wireshark." This source describes the exact functionality

required to "inspect all the network traf๏ฌc."

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-packetcapture-overview

Question 54

You manage a virtual network named VNet1 that is hosted in the West US Azure region. VNet1 hosts two virtual machines named VM1 and VM2 that run Windows Server. You need to inspect all the network traf๏ฌc from VM1 to VM2 for a period of three hours. Solution: From Performance Monitor, you create a Data Collector Set (DCS). Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution does not meet the goal. Performance Monitor and its Data Collector Sets (DCS) are designed to collect performance counters (e.g., bytes sent/received per second) and event trace data from the operating system. While this provides metadata and performance metrics about network activity, it does not capture the actual content of the network packets for inspection. To "inspect all the network traf๏ฌc," a full packet capture is required. The appropriate Azure-native tool for this task is Azure Network Watcher's packet capture feature, which can capture traf๏ฌc to and from a virtual machine.
References

1. Azure Network Watcher - Packet Capture: Microsoft's of๏ฌcial documentation describes

packet capture as the tool for tracking traf๏ฌc to and from a virtual machine. It states,

"Network Watcher variable packet capture allows you to create packet capture sessions to

track traf๏ฌc to and from a virtual machine... The captured data is stored in a .cap ๏ฌle... You

can open the capture ๏ฌle by using a supported application, such as Wireshark." This

con๏ฌrms it is the correct tool for traf๏ฌc inspection.

Source: Microsoft Learn, "Introduction to packet capture in Azure Network Watcher," URL:

https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-packet-captureoverview

2. Windows Performance Monitor: Microsoft's documentation on Performance Monitor

details its function as a tool for analyzing how programs affect a computer's performance,

both in real-time and by collecting log data for later analysis. Its capabilities are centered on

performance counters, event traces, and con๏ฌguration information, not full packet content

capture.

Source: Microsoft Learn, "Windows Performance Monitor," URL:

https://learn.microsoft.com/en-us/windows-server/performance/performance-monitoringgetting-started

Question 55

You manage a virtual network named VNet1 that is hosted in the West US Azure region. VNet1 hosts two virtual machines named VM1 and VM2 that run Windows Server. You need to inspect all the network traf๏ฌc from VM1 to VM2 for a period of three hours. Solution: From Azure Monitor, you create a metric on Network In and Network Out. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The proposed solution does not meet the goal. Azure Monitor metrics for "Network In" and "Network Out" provide aggregated, numerical data representing the volume of network traf๏ฌc (e.g., total bytes) ๏ฌ‚owing to and from a virtual machine. These metrics do not capture the actual network packets, their headers, or their payloads. Therefore, you cannot use them to "inspect" the traf๏ฌc content, source/destination IPs, or protocols. To perform a detailed inspection of network traf๏ฌc, a tool like Azure Network Watcher's packet capture feature is required.
References

1. Microsoft Learn | Azure Monitor Metrics overview: "Azure Monitor Metrics is a feature of

Azure Monitor that collects numeric data from monitored resources into a time-series

database." This source con๏ฌrms that metrics are numerical values, not packet data for

inspection.

URL: https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/data-platformmetrics

2. Microsoft Learn | Supported metrics for Microsoft.Compute/virtualMachines: This

document lists "Network In Total" (Network In) and "Network Out Total" (Network Out) with

the unit "Bytes," con๏ฌrming they measure volume, not content.

URL: https://learn.microsoft.com/en-us/azure/azure-monitor/reference/supportedmetrics/microsoft-compute-virtualmachines-metrics

3. Microsoft Learn | Packet capture with Azure Network Watcher: "Network Watcher packet

capture allows you to create packet capture sessions to track traf๏ฌc to and from a virtual

machine... Packet capture is a virtual machine extension that's remotely started through

Network Watcher." This source describes the correct tool for inspecting traf๏ฌc.

URL: https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-packetcapture-overview

Question 56

DRAG DROP - You have an Azure subscription that contains the resources shown in the following table. Microsoft AZ-104 Exam Questions exam question You need to load balance HTTPS connections to vm1 and vm2 by using lb1. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Select and Place: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
To con๏ฌgure an Azure Standard Load Balancer, the virtual machines in the backend pool cannot have their own individual public IP addresses. Therefore, the ๏ฌrst step is to remove the Basic public IPs from vm1 and vm2. Next, the load balancer needs to know which VMs to send traf๏ฌc to and how to check their health. This is accomplished by creating a backend pool containing vm1 and vm2, and a health probe to monitor the availability of the HTTPS service on port 443. Finally, a load balancing rule is created. This rule ties the load balancer's public-facing IP and port (frontend) to the backend pool and its port, using the health probe to ensure traf๏ฌc is only sent to healthy instances.
Why Incorrect Options are Wrong

โ€ข

Remove nsg1: This is incorrect. The Network Security Group (NSG) is required to

allow incoming traf๏ฌc on port 443 to reach the virtual machines' network interfaces.

The load balancer directs traf๏ฌc, but the NSG permits it.

โ€ข

Create an availability set: This is incorrect. While best practice for high availability,

an availability set is a construct for the VMs themselves and is not a required step to

con๏ฌgure the load balancer to distribute traf๏ฌc to existing VMs.

References

โ€ข

Backend Pool IP Con๏ฌguration: Microsoft Learn documentation states that virtual

machines in the backend pool of a Standard Load Balancer cannot have instance-

level public IP addresses.

o Source: Microsoft Learn, "Azure Load Balancer SKUs". Under the "Standard

Load Balancer" section, it details backend pool constraints.

โ€ข

Load Balancer Con๏ฌguration Steps: The of๏ฌcial tutorials for creating a public load

balancer outline the necessary components and order of creation. The sequence

involves de๏ฌning backend resources and health probes before creating the rules that

use them.

o Source: Microsoft Learn, "Quickstart: Create a public load balancer - Azure

portal", Section: "Create load balancer resources". This guide demonstrates

creating the backend pool, health probe, and then the load balancer rule.

Question 57

DRAG DROP - You have an Azure subscription that contains two on-premises locations named site1 and site2. You need to connect site1 and site2 by using an Azure Virtual WAN. Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. Select and Place: Microsoft AZ-104 Exam Questions exam question
Show Answer
Correct Answer:
Explanation
Establishing a site-to-site connection using Azure Virtual WAN follows a speci๏ฌc hierarchical procedure. The ๏ฌrst step is to create the top-level Virtual WAN resource, which acts as a global container for all networking components. Within this WAN, a virtual hub is deployed in a speci๏ฌc Azure region to serve as the connection endpoint. Next, logical objects called VPN sites are created to represent each of the on-premises locations (site1 and site2). The ๏ฌnal step in the Azure con๏ฌguration is to associate and connect these VPN sites to the virtual hub, which establishes the site-to-site VPN connections.
Why Incorrect Options are Wrong

โ€ข

Connect the virtual networks to the hub: This action is incorrect in this context

because the requirement is to connect on-premises sites, not Azure virtual networks.

Connecting virtual networks is a separate step for integrating VNet spokes into the

hub.

References

โ€ข

Microsoft Azure Documentation: The tutorial "Create a Site-to-Site connection

using Azure Virtual WAN" outlines these steps in sequence.

o URL: https://learn.microsoft.com/en-us/azure/virtual-wan/virtual-wan-site-tosite-portal

o Speci๏ฌc Sections: The article's main body walks through the steps: "1.

Create a virtual WAN", "2. Create a hub", "3. Create a site", and "4. Connect

the VPN site to the hub". This directly corresponds to the required sequence.

Question 58

You have an app named App1 that is installed on two Azure virtual machines named VM1 and VM2. Connections to App1 are managed by using an Azure Load Balancer. The effective network security con๏ฌgurations for VM2 are shown in the following exhibit. Microsoft AZ-104 Exam Questions exam question You discover that connections to App1 from 131.107.100.50 over TCP port 443 fail. You verify that the Load Balancer rules are con๏ฌgured correctly. You need to ensure that connections to App1 can be established successfully from 131.107.100.50 over TCP port 443. Solution: You create an inbound security rule that denies all traf๏ฌc from the 131.107.100.50 source and has a priority of 64999. Does this meet the goal?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The goal is to allow inbound connections from the IP address 131.107.100.50 on TCP port 443. The proposed solution is to create a new inbound security rule with an action of Deny. This action directly contradicts the stated goal. The existing effective rules show a DenyAllInBound rule at priority 65000, which is blocking the traf๏ฌc. To permit the connection, a new rule with an Allow action and a priority number lower than 65000 (e.g., 4096) must be created for the speci๏ฌed source IP and port.
References

1. Microsoft Azure Documentation | How network security groups ๏ฌlter network traf๏ฌc:

"Security rules in a network security group are processed by priority. To determine the rule

to apply to the traf๏ฌc, Azure processes the rules in priority order (from the lowest number to

the highest number)... Once traf๏ฌc matches a rule, processing stops." This explains why a

new Allow rule with a lower priority number is needed to override the existing

DenyAllInBound rule.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-group-how-itworks

2. Microsoft Azure Documentation | Network security groups: "A network security group

contains security rules that allow or deny inbound network traf๏ฌc to, or outbound network

traf๏ฌc from, several types of Azure resources." This document con๏ฌrms that the action must

be 'Allow' to permit traf๏ฌc.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groupsoverview

Question 59

HOTSPOT - You have an Azure subscription that contains the virtual networks shown in the following table. Microsoft AZ-104 Exam Questions exam question You have the virtual machines shown in the following table. Microsoft AZ-104 Exam Questions exam question You have the virtual network interfaces shown in the following table. Microsoft AZ-104 Exam Questions exam question Server1 is a DNS server that contains the resources shown in the following table. Microsoft AZ-104 Exam Questions exam question You have an Azure private DNS zone named contoso.com that has a virtual network link to VNET2 and the records shown in the following table. Microsoft AZ-104 Exam Questions exam question For each of the following statements, select Yes if the statement is true. Otherwise, select No. Hot Area:
Show Answer
Correct Answer:
Explanation
The resolution of DNS queries within Azure depends on the DNS server settings con๏ฌgured at the Network Interface (NIC) and Virtual Network (VNet) levels. NIC- level settings take precedence over VNet-level settings. 1. Statement 1 (Yes): Server2 uses NIC2, which has its DNS server explicitly set to 10.10.0.4 (Server1). When Server2 queries for host2.contoso.com, the query is sent to Server1. Server1 has a local A record for Host2 with the value 131.107.50.50. Therefore, Server1 resolves the query and returns this IP address. 2. Statement 2 (No): Server2 also sends its query for host1.contoso.com to Server1. Server1 has a local A record for Host1 with the value 131.107.200.20. Server1 will return this value. The value 131.107.10.15 exists in the Azure Private DNS zone, but since Server2 is con๏ฌgured to use Server1 as its DNS server, it never queries the Azure DNS service that would use the private zone. Thus, the statement is false. 3. Statement 3 (Yes): Server3 uses NIC3, which inherits its DNS settings from VNET2. VNET2 is con๏ฌgured to use the custom DNS server 10.10.0.4 (Server1). Similar to Server2, any DNS query from Server3, including for host2.contoso.com, is sent to Server1. Server1 resolves this using its local record and returns 131.107.50.50.
References

โ€ข

Azure Of๏ฌcial Documentation | Name resolution for resources in Azure

virtual networks: This document details the order of precedence for DNS

settings (NIC over VNet) and how name resolution works with custom DNS

servers. It explains that when a custom DNS server is speci๏ฌed, all queries

from VMs in that VNet are directed to that server.

o URL: https://docs.microsoft.com/en-us/azure/virtual-network/virtualnetworks-name-resolution-for-vms-and-role-instances

o Speci๏ฌc Section: "Name resolution using your own DNS server".

โ€ข

Azure Of๏ฌcial Documentation | Azure Private DNS zones scenarios: This

resource explains that for a VNet with a custom DNS server to resolve

records in a linked private zone, the custom server must have a conditional

forwarder pointing to Azure's DNS resolver (168.63.129.16). Since this is not

con๏ฌgured for Server1, clients using it cannot resolve records from the private

zone.

o URL: https://docs.microsoft.com/en-us/azure/dns/private-dns-scenarios

o Speci๏ฌc Section: "VNet with a custom DNS server".

Question 60

You have a virtual network named VNet1 as shown in the exhibit. (Click the Exhibit tab.) Microsoft AZ-104 Exam Questions exam question No devices are connected to VNet1. You plan to peer VNet1 to another virtual network named VNet2. VNet2 has an address space of 10.2.0.0/16. You need to create the peering. What should you do ๏ฌrst?
Options
A: Modify the address space of VNet1.
B: Add a gateway subnet to VNet1.
C: Create a subnet on VNet1 and VNet2.
D: Con๏ฌgure a service endpoint on VNet2.
Show Answer
Correct Answer:
Modify the address space of VNet1.
Explanation
The most critical prerequisite for creating a virtual network peering in Azure is that the virtual networks must have non-overlapping IP address spaces. An attempt to peer networks with overlapping addresses will fail. Although the address spaces provided in the question (10.0.0.0/16 for VNet1 and 10.2.0.0/16 for VNet2) do not technically overlap, this question is designed to test the knowledge of this fundamental constraint. Before any peering can be successfully created, an administrator must ๏ฌrst ensure the address spaces are unique. If they were to overlap, modifying one of them would be the mandatory ๏ฌrst step.
Why Incorrect Options are Wrong

B. Add a gateway subnet to VNet1: A gateway subnet is only required for gateway transit,

an optional feature of VNet peering, not a prerequisite for establishing the peering

connection itself.

C. Create a subnet on VNet1 and VNet2: VNet peering is con๏ฌgured at the virtual network

level. The existence of subnets is not required to create the peering link between the two

VNets.

D. Con๏ฌgure a service endpoint on VNet2: Service endpoints provide secure connectivity to

Azure PaaS services and are unrelated to the process of peering two virtual networks

together.

References

Microsoft Azure Documentation - Virtual network peering - Constraints: "The virtual

networks you peer must have non-overlapping IP address spaces." This is the primary

constraint that must be met before peering can be created.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peeringoverview#constraints

Microsoft Azure Documentation - Create, change, or delete a virtual network peering: The

portal and CLI/PowerShell steps for creating a peering assume that the non-overlapping

address space requirement has already been met. If not, the operation will fail with an error.

URL: https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-managepeering

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE