Microsoft Azure AZ-700 Exam Questions 2025

Updated:

Our AZ-700 Exam Questions provide accurate, up-to-date preparation for the Microsoft Azure Network Engineer Associate certification. All questions are validated by network professionals and include verified answers with straightforward explanations and references, ensuring strong coverage of routing, security, and hybrid connectivity. Strengthen your readiness with free sample questions and our online exam simulator at Cert Empire.

 

Exam Questions

Question 1

HOTSPOT You have an Azure subscription that contains a dual-stack virtual network named VNet1. VNet1 has the following IP address spaces: โ€ข IPv4:192.168.0.0/24 โ€ข IPv6: fd0adbftdeca: deed: y48 You plan to deploy an Azure VPN gateway and multiple virtual machines to VNet1. You need to configure the subnet masks for VNet1. The solution must meet the following requirements: โ€ข Maximize the number of usable IP addresses. โ€ข Support the deployment of the VPN gateway and the virtual machines. Which subnet mask should you use for each address space? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. AZ-700 exam question
Show Answer
Correct Answer:
IPV4 SUBNET MASK: /27 IPV6 SUBNET MASK: /64
Explanation
For the IPv4 address space, an Azure VPN Gateway requires a dedicated subnet, conventionally named GatewaySubnet. Official Azure documentation recommends a GatewaySubnet size of /27 or larger to accommodate various gateway SKUs and potential future scaling. Using a /27 prefix meets this critical requirement while maximizing the number of subnets that can be created within the /24 VNet space, thereby optimizing address space utilization. For the IPv6 address space, Azure Virtual Network imposes a mandatory requirement that all IPv6 subnets must have a fixed prefix length of /64. This is a non-negotiable constraint for dual-stack network configurations in Azure.
References

1. Microsoft Learn, Azure VPN Gateway documentation, "Gateway subnet" section. It states, "For the most future-proof configuration, we recommend that you create a gateway subnet of /27 or larger (/27, /26, /25 etc.)." This directly supports the selection of /27 for the IPv4 subnet.

2. Microsoft Learn, "Overview of IPv6 for Azure Virtual Network," Subnetting section. The documentation explicitly states, "The IPv6 subnet size must be /64." This confirms the mandatory prefix length for all IPv6 subnets in an Azure VNet.

3. Microsoft Learn, "Virtual network and subnets," Subnets section. This document explains that a virtual network is segmented into one or more subnets, and each subnet must have a unique address range specified in CIDR format. This provides the foundational context for the subnetting decisions in the question.

Question 2

HOTSPOT You have an on-premises network. You have an Azure subscription that contains the resources shown in the following table. AZ-700 exam question You need to ensure that on-premises devices can communicate with Azure resources that are connected to Subnet4. What should you do on each resource? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. AZ-700 exam question

Show Answer
Correct Answer:

SERVER1: DEPLOY THE ON-PREMISES EXTENDED-NETWORK GATEWAY APPLIANCE.

VM2: DEPLOY THE ROUTING AND REMOTE ACCESS SERVICE.


Explanation

The core issue is the IP address space overlap between the on-premises Subnet1 (10.1.1.0/24) and the Azure Subnet4 (10.1.1.0/24). A standard Site-to-Site (S2S) VPN cannot route traffic between networks with identical address ranges.

The intended solution is to use Azure Extended Network, a feature designed specifically to stretch an on-premises subnet into Azure, creating a single Layer 2 network segment. This allows virtual machines in Azure to have IP addresses from the on-premises subnet and communicate as if they were on the local network.

  1. On Server1 (On-premises): To enable Azure Extended Network, a gateway virtual machine must be deployed in the on-premises environment. The option Deploy the On-Premises Extended-Network Gateway appliance directly corresponds to this requirement. Server1, as an on-premises Windows Server, would act as the host for this gateway.
  2. On VM2 (Azure): When an Azure VM joins an extended network, its default gateway is reconfigured to point to the on-premises gateway. While this enables communication with the on-premises network, it can isolate the VM from other subnets within its own Azure VNet (like Subnet3). To resolve this, VM2 needs advanced routing capabilities. By deploying the Routing and Remote Access service (RRAS), VM2 can be configured to act as a router. This allows for the creation of static routes to properly direct traffic to both the on-premises network and other Azure resources, overcoming the routing limitations.

References

Azure Extended Network Documentation (Microsoft Learn): This document explains the feature and its architecture. It explicitly states the need for a gateway VM on-premises to stretch the network.

Reference: Microsoft Corporation. (2023). "Stretch an on-premises subnet into Azure using extended network for Azure". Microsoft Learn. Section: "How it works".

Routing and Remote Access Service (RRAS) Documentation (Microsoft Learn): This documentation details how RRAS turns a Windows Server into a software router, capable of managing complex traffic flows with static routes, which is what is needed on VM2 to handle the new routing complexity.

Reference: Microsoft Corporation. (2021). "Routing and Remote Access Service (RRAS)". Microsoft Learn. Section: "Software-defined networking (SDN) router".

Question 3

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen. You have an Azure subscription that contains an Azure Virtual WAN named VWAN1. VWAN1 contains a hub named Hub1. Hub1 has a security status of Unsecured. You need to ensure that the security status of Hub1 is marked as Secured. Solution: You implement Azure Web Application Firewall (WAF). Does this meet the requirement?
Options
A: Yes
B: No
Show Answer
Correct Answer:
No
Explanation
The security status of an Azure Virtual WAN hub changes from "Unsecured" to "Secured" only when a network security service, such as Azure Firewall or a supported third-party Network Virtual Appliance (NVA), is deployed within the hub via Azure Firewall Manager. This action converts the standard hub into a "Secured Virtual Hub." Azure Web Application Firewall (WAF) is a Layer 7 security service designed to protect web applications from common vulnerabilities. It is deployed with services like Azure Application Gateway or Azure Front Door, not directly within a Virtual WAN hub to change its fundamental security status. Therefore, implementing WAF does not meet the requirement.
Why Incorrect Options are Wrong

A. Yes: This is incorrect. Azure WAF protects web applications and does not fulfill the specific requirement of deploying a network firewall within the Virtual WAN hub to change its status to "Secured."

References

1. Microsoft Learn | Azure Firewall Manager | What is a secured virtual hub?

Section: "What is a secured virtual hub?"

Content: "A secured virtual hub is an Azure Virtual WAN Hub with associated security and routing policies configured by Azure Firewall Manager. Use secured virtual hubs to easily create hub-and-spoke and transitive architectures with native security services for traffic governance and protection." This document explicitly states that a hub becomes "secured" by integrating security services like Azure Firewall via Firewall Manager.

2. Microsoft Learn | Azure Web Application Firewall | What is Azure Web Application Firewall?

Section: "Overview"

Content: "Azure Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. WAF can be deployed with Azure Application Gateway, Azure Front Door, and Azure Content Delivery Network (CDN) service from Microsoft." This reference clarifies that WAF's purpose and deployment model are distinct from securing a Virtual WAN hub's infrastructure.

3. Microsoft Learn | Azure Virtual WAN | Create a secured virtual hub using Azure portal

Section: "Prerequisites" and "Create a secured virtual hub"

Content: The tutorial steps demonstrate that creating a secured virtual hub involves selecting the "Include gateway" option and then configuring Azure Firewall within the hub's settings. This confirms that Azure Firewall is the required component, not WAF.

Question 4

HOTSPOT You have an Azure subscription that contains the resources shown in the following table. AZ-700 exam question You plan to deploy an app named App1 to meet the following requirements. โ€ข External users must be able to access App1 from the internet. โ€ข App1 will be load balanced across all the virtual machines. โ€ข App1 will be hosted on VM1, VM2. VM3. and VM4. โ€ข App1 must be available if an Azure region fails. โ€ข Costs must be minimized. You need to implement a global load balancer solution for App. What should you configure? To answer, select the appropriate options in the answer area NOTE: Bach correct answer is worth one point. AZ-700 exam question

Show Answer
Correct Answer:

NUMBER AND TYPE OF LOAD BALANCERS: ONE CROSS-REGION LOAD BALANCER AND TWO REGIONAL LOAD BALANCERS ONLY LOAD BALANCER SKU: STANDARD

Explanation

The scenario requires a load-balanced solution for an application (App1) deployed across virtual machines in two different Azure regions (West Europe and East US). A key requirement is that the application must remain available even if an entire Azure region fails.

To meet this requirement for high availability across regions, a global load balancing solution is necessary. The Azure Cross-region Load Balancer is specifically designed for this purpose.

The architecture for a cross-region load balancer consists of:

  1. A single cross-region load balancer with a static, global anycast public IP address to act as the primary entry point for traffic.
  2. A backend pool for the cross-region load balancer that contains the front-end configurations of regional load balancers.

In this case, one regional load balancer is needed in the West Europe region to manage traffic for VM1 and VM2, and a second regional load balancer is needed in the East US region for VM3 and VM4. This results in a total of one cross-region load balancer and two regional load balancers.

Regarding the SKU, the cross-region load balancer functionality is only available with the Standard SKU. Furthermore, any regional load balancers added to the backend pool of a cross-region load balancer must also be of the Standard SKU. The Basic SKU does not support cross-region deployments and lacks the necessary availability features.

References

Microsoft Azure Documentation, "What is Cross-region Load Balancer?". Microsoft Learn, Retrieved September 19, 2025.

Section: Why use Cross-region load balancer?: "Cross-region load balancer provides a static global anycast public IP address for your multi-region application...If a region fails, you can direct traffic to the next closest healthy region."

Section: Architecture: "The backend pool of a cross-region load balancer contains one or more regional load balancers."

Section: Cross-region load balancer and regional load balancer: "A cross-region load balancer is a Standard SKU public load balancer...The regional load balancers you add to the backend of the cross-region load balancer must be a Standard SKU load balancer."

Microsoft Azure Documentation, "Azure Load Balancer SKUs". Microsoft Learn, Retrieved September 19, 2025.

Table: SKU comparison: This table explicitly states that the Basic SKU has "No SLA" and is not recommended for production workloads, while the Standard SKU has a 99.99% SLA and supports features like Availability Zones, which are critical for high-availability scenarios. It also notes that cross-region load balancing is a feature of the Standard SKU.

Question 5

You have an Azure Private Link service named PL1 that uses an Azure load balancer named LB1. You need to ensure that PL1 can support a higher volume of outbound traffic. What should you do?
Options
A: Redeploy LB1 with a different SKU.
B: Increase the number of NAT IP addresses assigned to PL1.
C: Deploy an Azure Application Gateway v2 instance to the source NAT subnet.
D: Increase the number of frontend IP configurations for LB1.
Show Answer
Correct Answer:
Increase the number of NAT IP addresses assigned to PL1.
Explanation
The Azure Private Link service uses Source Network Address Translation (SNAT) for traffic originating from the service provider's virtual network and destined for the private endpoint in the consumer's network. The source IP of these packets is translated to a NAT IP address allocated from the provider's VNet. To support a higher volume of outbound traffic and avoid SNAT port exhaustion, you must scale the number of available SNAT ports. This is achieved by increasing the number of NAT IP addresses configured for the Private Link service. Each additional NAT IP address provides more available ports for translation.
Why Incorrect Options are Wrong

A. The load balancer SKU (Standard is required for Private Link) does not control the dedicated outbound NAT capacity of the Private Link service itself.

C. An Azure Application Gateway is a Layer 7 web traffic load balancer and is not used to scale the outbound NAT of a Layer 4 Private Link service.

D. Frontend IP configurations on the load balancer are for receiving inbound traffic, not for scaling the Private Link service's outbound NAT capabilities.

References

1. Microsoft Learn | What is Azure Private Link service?: Under the section "Source Network Address Translation (SNAT)", it states, "To scale, add more NAT IP addresses to your Private Link service. Each new NAT IP address adds 64,000 more available SNAT ports."

2. Microsoft Learn | Troubleshoot Azure Private Link service connectivity problems: In the section "Private Link service has SNAT port exhaustion", the recommended solution is: "The Private Link service has up to 8 NAT IPs that can be used for SNAT. Each NAT IP can assign 64k ports. Add more NAT IPs to the Private Link service to avoid SNAT port exhaustion."

Question 6

You have an Azure subscription that contains a virtual network named VNet1. VNet1 contains the following subnets. โ€ข AzureFirewallSubnet โ€ข GatewaySubnet โ€ข Subnet 1 โ€ข Subnet2 โ€ข Subnet3 Subnet2 has a delegation to the Microsoft.Web/serverfarms service. The subscription contains the resources shown in the following table. AZ-700 exam question You need to implement an Azure application gateway named AG1 that will be integrated with an Azure Web Application Firewall (WAF). AG1 will be used to publish VMSS1. To which subnet should you connect AG1?
Options
A: Subrwt2
B: Subnet 1
C: Subnet3
D: AzureFjrewall Subnet
E: GatewaySubnet
Show Answer
Correct Answer:
Subnet3
Explanation
Azure Application Gateway requires a dedicated subnet within the virtual network. This subnet cannot be shared with any other resources. GatewaySubnet and AzureFirewallSubnet are reserved names for their specific gateway and firewall services, respectively, and cannot be used for an Application Gateway. Subnet2 is delegated to the Microsoft.Web/serverfarms service, which means it can only host resources of that type and is therefore unavailable. Subnet1 already contains the VMSS1 resource, so it cannot be used as the dedicated subnet for the Application Gateway. This leaves Subnet3 as the only available and valid option, as it is not reserved, not delegated, and does not contain other resources.
Why Incorrect Options are Wrong

A. Subnet2: This subnet is delegated to the Microsoft.Web/serverfarms service and cannot be used for deploying an Application Gateway.

B. Subnet1: This subnet already contains the VMSS1 resource. An Application Gateway requires its own dedicated subnet.

D. AzureFirewallSubnet: This is a reserved subnet name and can only be used for deploying an Azure Firewall.

E. GatewaySubnet: This is a reserved subnet name and can only be used for deploying virtual network gateways (VPN or ExpressRoute).

References

1. Microsoft Learn | Azure Application Gateway infrastructure configuration | Subnet: "The application gateway needs a dedicated subnet. The subnet can contain only application gateways. No other resources are allowed in the subnet."

2. Microsoft Learn | What is subnet delegation? | Constraints on delegation: "You can't deploy resources from different services into a delegated subnet." This rule disqualifies Subnet2.

3. Microsoft Learn | GatewaySubnet: "When you create a virtual network gateway, you must specify the gateway subnet that you want to deploy it to... Don't deploy any other resources (for example, VMs) to the gateway subnet." This rule disqualifies GatewaySubnet.

4. Microsoft Learn | Azure Firewall FAQ | Why does Azure Firewall need a dedicated subnet?: "Azure Firewall must be deployed in a dedicated subnet. It can't be deployed in a subnet with other resources. The name of this subnet must be AzureFirewallSubnet." This rule disqualifies AzureFirewallSubnet.

Question 7

DRAG DROP You have an Azure subscription that contains the resources shown in the following table. You discover that users connect directly to App1. You need to meet The following requirements: โ€ข Administrators must only access App1 by using a private endpoint. โ€ข All user connections to App1 must be routed through FD1. โ€ข The downtime of connections to App1 must be minimized. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. NOTE: More than one order of answer choices is correct. You will receive credit for any of the correct orders you select. AZ-700 exam question

Show Answer
Correct Answer:

1: IN THE SETTINGS OF FD1, CONFIGURE THE ORIGIN GROUP TO ENABLE THE AZURE PRIVATE LINK SERVICE.

2: IN THE SETTINGS OF APP1, APPROVE A PENDING PRIVATE ENDPOINT CONNECTION.

3: CHANGE THE DNS RECORD OF HTTPS://WWW.GOOGLE.COM/URL?SA=E&SOURCE=GMAIL&Q=APP1.CONTOSO.COM TO RESOLVE TO THE FQDN OF FD1.


Explanation

This sequence correctly establishes a new, private traffic path from Azure Front Door (FD1) to the App Service (App1) before redirecting live user traffic, which is crucial for minimizing downtime.

  1. Configure FD1 to use Private Link: The first step is to configure the origin group in the Azure Front Door Premium instance to connect to the App Service origin using the Azure Private Link service. This action initiates a request to create a private endpoint connection on the App Service.
  2. Approve the connection on App1: The private endpoint connection created by Front Door will be in a "Pending" state. You must navigate to the App Service's networking settings and approve this pending connection. This completes the setup of the secure, private path between Front Door and the App Service. At this stage, the new path is operational, but user traffic is still going directly to App1.
  3. Change the DNS record: The final step is to perform the traffic cutover. By changing the public DNS CNAME record for app1.contoso.com to point to the FQDN of the Front Door instance (FD1), you redirect all user traffic to flow through Front Door. Since the private backend connection is already established, there is no interruption in service.

This order ensures the new infrastructure is fully functional before it receives live traffic, fulfilling the requirement to minimize downtime.

References

Microsoft Learn, Azure Front Door Documentation: The official documentation on securing origin with Private Link in Azure Front Door Premium outlines this exact procedure. It specifies that you first enable Private Link on the Front Door origin, which creates a pending private endpoint connection that must then be approved on the origin resource.

Reference: Secure your Origin with Private Link in Azure Front Door Premium. See the sections "Enable Private Link to an App service" and "Approve the private endpoint connection from the web app." This guide confirms the sequence of enabling the service in Front Door first, followed by approving the connection on the App Service.

Microsoft Learn, Tutorial: Connect to a web app using an Azure Private Endpoint: This tutorial provides general information on private endpoints for web apps. It explains that "When you create a private endpoint... a connection approval workflow is required." This supports the necessity of the approval step after the connection is initiated.

Reference: Connect to a web app using an Azure Private Endpoint. Refer to the "Create a private endpoint" section, which details the approval process.

Question 8

You have an instance of Azure Web Application Firewall (WAF) on Azure Front Door. You plan to create a WAF rule that will block high rates of requests from a single IP address. You need to query Log Analytics to identify the optimal threshold for the rule. Which table should you query in Log Analytics?
Options
A: AZFWThreatlnte1
B: AzureDiagnostics
C: SecurityDetection
D: AGWFirewallLogs
Show Answer
Correct Answer:
AzureDiagnostics
Explanation
Azure Web Application Firewall (WAF) on Azure Front Door integrates with Azure Monitor to store its logs in a Log Analytics workspace. When using the classic Azure Diagnostics settings, these logs are sent to the AzureDiagnostics table. This table contains detailed information for each request evaluated by the WAF, including the clientIps field, which records the source IP address. To determine an optimal threshold for a rate-limiting rule, you can execute a Kusto Query Language (KQL) query against this table to count the number of requests per clientIps over a specific time interval.
Why Incorrect Options are Wrong

A. AZFWThreatlnte1: This table stores threat intelligence logs specifically for the Azure Firewall service, not for WAF on Azure Front Door.

C. SecurityDetection: This table is used by Microsoft Defender for Cloud to store security alerts and detections, not the raw request logs needed for rate analysis.

D. AGWFirewallLogs: This is a resource-specific table for logs from WAF on Azure Application Gateway (AGW), not Azure Front Door.

References

1. Microsoft Learn, Azure Web Application Firewall documentation. "Azure Web Application Firewall monitoring and logging". This document explicitly states, "Log Analytics logs are stored in the AzureDiagnostics table." It also provides a sample query for WAF logs that queries the AzureDiagnostics table.

Reference: Section "Logs and metrics", Paragraph 2.

2. Microsoft Learn, Azure Front Door documentation. "Data reference for monitoring Azure Front Door". This page details the schema for Azure Front Door logs sent to Log Analytics. For the FrontdoorWebApplicationFirewallLog category, it lists the columns available in the AzureDiagnostics table, including clientIps, which is essential for the task described.

Reference: Section "AzureDiagnostics table", Subsection "FrontdoorWebApplicationFirewallLog".

3. Microsoft Learn, Azure Firewall documentation. "Azure Firewall logs and metrics". This document describes the tables used for Azure Firewall logging, confirming that AZFWThreatIntel is for threat intelligence logs from Azure Firewall.

Reference: Section "Log Analytics tables", Row "AZFWThreatIntel".

4. Microsoft Learn, Azure Application Gateway documentation. "Resource logs for Azure Application Gateway". This source details the logging options for Application Gateway, specifying that AGWFirewallLogs is the resource-specific table for its WAF logs.

Reference: Section "Resource-specific tables", Table "Resource-specific".

Question 9

You have the Azure subscriptions shown in the following table. AZ-700 exam question Each virtual network contains 20 internet-accessible resources that are assigned public IP addresses. You need to implement Azure DDoS Network Protection to protect the resources. The solution must minimize costs. What is the minimum number of DDoS Network Protection plans you should deploy?
Options
A: 1
B: 2
C: 3
D: 6
Show Answer
Correct Answer:
2
Explanation
An Azure DDoS Network Protection (formerly DDoS Standard) plan is billed once per plan and can be linked to as many as 10 virtual networks that reside in subscriptions belonging to the same Azure AD tenant. Virtual networks that belong to a different tenant cannot be linked to that plan; a separate plan is required for each tenant. The table shows the six virtual networks are spread across two different Azure AD tenants. Therefore, to cover all 40 public IP resources while minimising cost, you need exactly one plan per tenant, i.e., two plans in total.
Why Incorrect Options are Wrong

A. 1 โ€“ A single plan cannot be linked to virtual networks in two different Azure AD tenants.

C. 3 โ€“ No technical or billing requirement forces a third plan; tenants, not regions or subscriptions, dictate the minimum.

D. 6 โ€“ One plan per virtual network is unnecessary; multiple VNets in the same tenant can share a single plan.

References

1. Microsoft Azure documentation, โ€œDDoS protection plans โ€“ associate or dissociate a virtual network,โ€ learn.microsoft.com/en-us/azure/ddos-protection/manage-ddos-protection?tabs=azure-portal#associate-a-virtual-network (see โ€œAll virtual networks must belong to subscriptions that are associated with the same Azure Active Directory tenantโ€).

2. Microsoft Azure documentation, โ€œAzure DDoS Protection Standard overview,โ€ learn.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview#pricing (section โ€œBilling and limitsโ€ โ€“ fixed monthly charge per plan; plan can protect multiple VNets).

3. Microsoft Azure documentation, โ€œBest practices for Azure DDoS Protection,โ€ learn.microsoft.com/en-us/azure/ddos-protection/ddos-best-practices (paragraph โ€œReuse existing plans across virtual networks in the same tenantโ€).

Question 10

HOTSPOT You plan to implement an Azure Virtual WAN named VWAN1 that will contain a hub named Hub1. VWAN1 will include the virtual networks shown in the following table. AZ-700 exam question You need to ensure that hosts connected to VNet1 can communicate with hosts connected to VNet3. How should you configure the routing tables for VWAN1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. AZ-700 exam question

Show Answer
Correct Answer:

DEFAULT ROUTE TABLE: FROM DESTINATION 10.2.3.0/24 TO NEXT HOP 10.2.0.5

ROUTE TABLE FOR CONN1: FROM DESTINATION 10.2.3.0/24 TO NEXT HOP 10.2.0.5

Explanation

To enable communication from VNet1 to VNet3, traffic must be routed through the Network Virtual Appliance (NVA) located in VNet2.

  1. Traffic originating from VNet1 arrives at the virtual hub (Hub1) via its connection, Conn1.
  2. The hub must have a route to direct traffic destined for VNet3's address space (10.2.3.0/24) to the NVA's IP address (10.2.0.5).
  3. This is achieved by adding a static route to the hub's routing table. The Default route table is used by all connected VNets by default. Therefore, the static route (10.2.3.0/24 -> 10.2.0.5) must be added to it.
  4. The "Route table for Conn1" represents the routing context for that specific connection. It must also contain this route to ensure traffic from VNet1 is forwarded correctly. Since the other options are invalid or would bypass the NVA, the same static route is the only correct choice.

References

Microsoft Docs, Azure Virtual WAN: "How to configure virtual hub routing". This document explains how to add static routes to a virtual hub's route table. In the section "To add/update a static route," it specifies that the "Next hop IP address" should be the IP address of the NVA.

Microsoft Docs, Azure Virtual WAN Scenarios: "Route traffic through an NVA". This official documentation describes the exact scenario presented. It confirms that to route traffic from a spoke VNet to another network via an NVA, a static route must be configured on the virtual hub's route table. The route's destination prefix is the target network (10.2.3.0/24), and the next hop is the IP address of the NVA (10.2.0.5) in the connected VNet.

Sale!
Total Questions294
Last Update Check October 04, 2025
Online Simulator PDF Downloads
50,000+ Students Helped So Far
$30.00 $60.00 50% off
Rated 5 out of 5
5.0 (1 reviews)

Instant Download & Simulator Access

Secure SSL Encrypted Checkout

100% Money Back Guarantee

What Users Are Saying:

Rated 5 out of 5

โ€œThe practice questions were spot on. Felt like I had already seen half the exam. Passed on my first try!โ€

Sarah J. (Verified Buyer)

Download Free Demo PDF Free AZ-700 Practice Test
Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE