You are setting up resources in Azure and need to filter traffic based on source IP address and port, destination IP address and port, and protocol between your on-premises network and Azure. Which of the following meets these minimum requirements?

Chapter 4 Rev

Quiz
•
Computers
•
University
•
Hard
Momo Gargantilla
FREE Resource
42 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ExpressRoute
Azure Firewall
Application security groups
User-defined routes
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Is the underlined portion of the following statement true, or does it need to be replaced with
one of the other fragments that appear below?
You are evaluating moving a web application that you host on-premises to Azure. The solution
comprises three VMs—a web front end, an application server, and a database server. You
need to ensure that your administrators can access all of the VMs for remote management on
port 3389, but only the web front end should be accessible over port 80. You decide to deploy
an application security group to protect the web server and enable access to the other servers.
deploy Web Application Firewall to filter and route traffic to the web server and deploy
network security groups to enable RDP to all three VMs.
deploy Web Application Firewall to filter the traffic and meet both requirements.
deploy a network security group to filter traffic and meet both requirements.
No change is needed.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You have deployed a VM to a subnet in Azure and need to ensure that only your and one other individual can connect to the VM using RDP on port 3389 to manage it. No other access from outside the subnet should be allowed at this time on any other ports. Which of the following should you use?
(Choose all that apply.)
Use a network security group to filter traffic and only allow port 3389 to the VM.
Apply an Azure policy to the subnet to limit access on port 3389 to only your and your
peer’s accounts.
Create a policy initiative that restricts access to the server based on your and your peer’s
roles, and to port 3389 for the IP address of the VM.
Use role-based access control (RBAC) to ensure that only you and your peer can access
the server.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are considering deploying a key web application to Azure. You decide to deploy Web Application Firewall with Application Gateway as part of the project. Which of the following correctly describes the function of Web Application Firewall in this scenario?
When properly configured, it ensures that traffic reaches the application only on port 80
for HTTP traffic.
It protects the web application from common web-based attacks.
It ensures that users can reach the web service on port 80 and administrators can RDP
to the VMs on port 3389.
None of the above.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization hosts a VM that performs a security-related function. For both security and auditing purposes, you need to ensure that all traffic reaches the VM from a single IP address in another subnet, regardless of source. Which of the following solutions meets this requirement?
Create a network security group (NSG) that directs all traffic for the VM to the
designated IP address and then apply the NSG to all subnets as required.
Create an application security group (ASG) that directs all traffic for the VM to the
designated IP address and apply the ASG to all subnets in the virtual network.
Create a user-defined route as a custom routing table and apply the table to all subnets
in the virtual network.
Use rules in Azure Firewall to route traffic to the target VM based on source and target
IP addresses.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following describes Azure DDoS Protection Standard?
Choose all that apply.
It protects against volumetric, protocol, and resource layer attacks.
It alerts you when an attack is happening.
DDoS Standard protects all resources on a virtual network as soon as the service is
enabled.
It provides mitigation reports.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Your organization has made the decision to move workloads into Azure. As the Directory Services administrator, you need to explain authentication and authorization in Azure to the program managers leading the project. Which of the following are correct statements?
Identifying a user by a username and password is a form of authorization.
Validating that a user account has the necessary permissions to access a resource is an
example of authorization.
Authentication identifies a user but does not provide access to resources.
Providing a password to access a shared resource is a form of authorization.
Create a free account and access millions of resources
Similar Resources on Wayground
44 questions
AWS Certified Cloud Practitioner

Quiz
•
5th Grade - Professio...
39 questions
COOS 295_quiz 2

Quiz
•
University
40 questions
Cloud Computing

Quiz
•
University
40 questions
SC-900 Exam (Part 1)

Quiz
•
University
40 questions
System Monitoring Tools Quiz

Quiz
•
12th Grade - University
45 questions
AEIC 326 3 Quiz

Quiz
•
University
40 questions
Midterm: Information Assurance and Security

Quiz
•
University
45 questions
CSC 308 ISA MIDTERM EXAM

Quiz
•
University
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade