Practice Test

Question 1

Contoso company wants to block all traffic based on the network protocol specification (TCP). To do that they want to use Application Security Groups. Will this solve their challenge?

✔ That's correct
❌ That's not correct
👨‍🦱 💬 Application Security Groups are not used to filter traffic based on the network protocol..

Question 2

Network Security Group is an extension of the Application Security Group used to manage the networking component of the application. True or false?

✔ That's correct
❌ That's not correct
👨‍🦱 💬 Network Security Groups are not an extension of Application Security Groups. Both components are used to secure network traffic but they have different use-cases.

Question 3

Network Security Groups a service that is used to …

✔ That's correct
❌ That's not correct
👨‍🦱 💬 Network Security Group is a service that allows customers to filter both inbound (incoming) and outbound (outgoing) traffic from and to resources that are located in the Azure Virtual Network.

Question 4

Customers want to block Remote Desktop Connectivity to their Azure Virtual Machines. Which Azure component should they use?

✔ That's correct
❌ That's not correct
👨‍🦱 💬 Network Security Groups allow customers to allow/deny traffic based on the port, like the one for RDP.

Question 5

Contoso has a subnet with 10 Virtual Machines. 5 of which are Web Servers and 5 are Storage Servers. They need to be able to quickly and effectively manage networking setups (NGSs) for those servers in the future. Which is the most effective way to achieve this in terms of time and maintenance required?

✔ That's correct
❌ That's not correct
👨‍🦱 💬 While a multiple of mentioned ways can work, application security groups were created to help with the management of networking rules by grouping multiple servers together and enabling those groups to be used inside of the network security group rules.

Question 6

What information is required to create a Network Security Group Rule? Choose 4.

✔ That's correct
❌ That's not correct
👨‍🦱 💬 Rules can deny or allow access to the network based on the source/target port, source/target address specification, direction (inbound/outbound) and protocol.
◀ Previous Episode Next Episode ▶

Adam Marczak

Programmer, architect, trainer, blogger, evangelist are just a few of my titles. What I really am, is a passionate technology enthusiast. I take great pleasure in learning new technologies and finding ways in which this can aid people every day. My latest passion is running an Azure 4 Everyone YouTube channel, where I show that Azure really is for everyone!

Did you enjoy the article?

Share it!

More tagged posts