{"id":81420,"date":"2022-03-05T22:04:39","date_gmt":"2022-03-06T03:34:39","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=81420"},"modified":"2022-06-23T06:45:32","modified_gmt":"2022-06-23T12:15:32","slug":"az-700-exam-questions-microsoft-azure","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/","title":{"rendered":"AZ-700 exam questions: Designing and Implementing Microsoft Azure Networking Solutions"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Looking for <a href=\"https:\/\/www.whizlabs.com\/microsoft-azure-exam-az-700\/\">AZ-700 exam questions<\/a>? Our free test questions with explanatory elaborations will guide you in the assessment of the exam. So, go ahead and evaluate your preparation and knowledge of the concepts.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Who_this_exam_is_intended_for\" >Who this exam is intended for?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#What_to_expect_in_this_exam\" >What to expect in this exam?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Core_Networking_Infrastructure\" >Domain : Design and Implement Core Networking Infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing-2\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Secure_and_Monitor_Networks\" >Domain : Secure and Monitor Networks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Private_Access_to_Azure_Services\" >Domain : Design and Implement Private Access to Azure Services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_Implement_and_Manage_Hybrid_Networking\" >Domain : Design, Implement, and Manage Hybrid Networking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Core_Networking_Infrastructure-2\" >Domain : Design and Implement Core Networking Infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing-3\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing-4\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Secure_and_Monitor_Networks-2\" >Domain : Secure and Monitor Networks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_Implement_and_Manage_Hybrid_Networking-2\" >Domain : Design, Implement, and Manage Hybrid Networking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Core_Networking_Infrastructure-3\" >Domain : Design and Implement Core Networking Infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_Implement_and_Manage_Hybrid_Networking-3\" >Domain : Design, Implement, and Manage Hybrid Networking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing-5\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing-6\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Secure_and_Monitor_Networks-3\" >Domain : Secure and Monitor Networks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_Implement_and_Manage_Hybrid_Networking-4\" >Domain : Design, Implement, and Manage Hybrid Networking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Core_Networking_Infrastructure-4\" >Domain : Design and Implement Core Networking Infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Core_Networking_Infrastructure-5\" >Domain : Design and Implement Core Networking Infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing-7\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Routing-8\" >Domain : Design and Implement Routing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Secure_and_Monitor_Networks-4\" >Domain : Secure and Monitor Networks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_and_Implement_Private_Access_to_Azure_Services-2\" >Domain : Design and Implement Private Access to Azure Services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_Implement_and_Manage_Hybrid_Networking-5\" >Domain : Design, Implement, and Manage Hybrid Networking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Domain_Design_Implement_and_Manage_Hybrid_Networking-6\" >Domain : Design, Implement, and Manage Hybrid Networking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/www.whizlabs.com\/blog\/az-700-exam-questions-microsoft-azure\/#Summary\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Who_this_exam_is_intended_for\"><\/span>Who this exam is intended for?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The candidates for the AZ-700 exam are expected to have subject-level expertise in the planning, implementation, and maintenance of Azure Networking Solutions. This includes Connectivity, Routing, Security, Hybrid Networking, and Private Access to Azure Services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To appear and pass this exam, candidates must possess expert-level Azure Administration skills, plus a considerable amount of understanding and experience on Network Security, Hybrid Connections, and Networking.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_to_expect_in_this_exam\"><\/span>What to expect in this exam?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The AZ-700 exam tests a candidate\u2019s ability in ascertaining the following technical tasks,<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Designing, Implementation, and Management of Hybrid Networking<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Designing and implementation of the core Networking Infrastructure and private access to Azure Services<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Designing and implementation of Routing<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitoring and Security of Networks<\/span><\/li>\n<\/ul>\n<p><em>Let&#8217;s start Learning!<\/em><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Core_Networking_Infrastructure\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Core Networking Infrastructure<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q1 : The Domain Name System (DNS) resolves or translates a service name to an IP address. Which of the following records types can\u2019t be used by Azure Private DNS?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>CNAME<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>A<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>AA<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>AAA<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>AAAA<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>F. <\/strong>PTR<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>G. <\/strong>MX<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>H. <\/strong>TXT<\/span><\/p>\n<p><b>Correct Answers: C and D<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure Domain Name Service supports A, AAAA, MX, CNAME, PTR, SRV, SOA, and TXT records.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> CNAME is a valid DNS record type.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. A is a valid DNS record type.<\/span><br \/>\n<b>Option C is correct<\/b><span style=\"font-weight: 400;\">. Azure DNS does not support AA type.<\/span><br \/>\n<b>Option D is correct<\/b><span style=\"font-weight: 400;\">. Azure DNS does not support AAA type.<\/span><br \/>\n<b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. AAAA is a valid DNS record type for Azure DNS.<\/span><br \/>\n<b>Option F is incorrect<\/b><span style=\"font-weight: 400;\">. PTR is a supported record type.<\/span><br \/>\n<b>Option G is incorrect.<\/b><span style=\"font-weight: 400;\"> Azure Domain Name Service supports A, AAAA, MX, CNAME, PTR, SRV, SOA, and TXT records.<\/span><br \/>\n<b>Option H is incorrect<\/b><span style=\"font-weight: 400;\">. Azure Domain Name Service supports A, AAAA, MX, CNAME, PTR, SRV, SOA, and TXT records.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Azure Private DNS, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/dns\/private-dns-overview?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/dns\/private-dns-overview?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q2 : <\/span><span style=\"font-weight: 400;\">While working on Azure PowerShell, some of the values mentioned in the instructions are getting failed. One of your friends suggests that you ensure that you have installed the latest version to avoid such issues. Which of the following cmdlets would you use to find the versions of Azure PowerShell that have been installed on your computer?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Get-Module -ListAvailable Az\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Get-Module -AzList\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Retrieve-Module -ListAvailable Az\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Retrieve-Module -AzList<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">PowerShell cmdlets are updated regularly; if you have not installed the latest version or used the earlier versions, the values defined in the instructions might fail. You can run Get-Module -ListAvailable Az cmdlet to know the version of Azure PowerShell installed on your computer.<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. <\/span><i><span style=\"font-weight: 400;\">Get-Module -ListAvailable Az<\/span><\/i><span style=\"font-weight: 400;\"> is the right cmdlet to be used to know the version of Azure PowerShell installed on the system.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. <\/span><i><span style=\"font-weight: 400;\">Get-Module-AzList<\/span><\/i><span style=\"font-weight: 400;\"> is not the right cmdlet.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> There is no command like <\/span><i><span style=\"font-weight: 400;\">Retrieve-Module -ListAvailable Az.<\/span><\/i><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. There is no such cmdlet in Azure PowerShell.<\/span><\/p>\n<p><b>References: <\/b><span style=\"font-weight: 400;\">To know more about working with Azure PowerShell, please visit the below-given link:<\/span><br \/>\n<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/diagnose-network-routing-problem?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/diagnose-network-routing-problem?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><br \/>\n<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/point-to-site-how-to-radius-ps?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/point-to-site-how-to-radius-ps?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing-2\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q3 : You are the team leader. You are addressing your team about load balancing and various Azure load balancing services. Which of the following statements would you use to describe the Azure Front Door load balancing service?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>A DNS-based traffic load balancing service that allows optimal distribution of the traffic to services across global Azure regions, offering high responsiveness and availability<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>A load balancing option that offers an application delivery controller (ADC) as a service, supporting different Layer 7 load balancing capabilities<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>A high-performance and ultra low-latency Layer 4 load balancing service (inbound &amp; outbound) for all TCP and UDP protocols<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>An application delivery network that offers global load balancing and site acceleration services for web applications with its layer seven capabilities<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure Front Door is an application delivery network that offers global load balancing and site acceleration services for web applications. It provides Layer seven capabilities for applications such as SSL offload, fast failover, path-based routing, caching, etc. to enhance the performance and availability of applications.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> The given statement describes the Traffic Manager, not Front Door.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. The application gateway offers an application delivery controller (ADC) as a service, supporting different Layer 7 load balancing capabilities.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. Azure Load Balancer is a high-performance and ultra low-latency Layer 4 load balancing service (inbound &amp; outbound) for all TCP and UDP protocols.<\/span><br \/>\n<b>Option D is correct<\/b><span style=\"font-weight: 400;\">. The given statement rightly describes the Azure Front Door.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Azure load balancing, please visit the given below link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/guide\/technology-choices\/load-balancing-overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/guide\/technology-choices\/load-balancing-overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Secure_and_Monitor_Networks\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Secure and Monitor Networks<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q4 : Statement: If the 1st network interface allocated to an application security group titled <\/span><span style=\"font-weight: 400;\">ASBGWeb<\/span><span style=\"font-weight: 400;\"> is in the virtual network titled <\/span><span style=\"font-weight: 400;\">VNet1<\/span><span style=\"font-weight: 400;\">, all subsequent network interfaces allocated to <\/span><span style=\"font-weight: 400;\">ASGWeb<\/span><span style=\"font-weight: 400;\"> must exist in <\/span><span style=\"font-weight: 400;\">VNet1<\/span><span style=\"font-weight: 400;\">.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">Is the statement true?<\/span><\/em><\/h4>\n<p><strong>A. <\/strong>Yes<br \/>\n<strong>B. <\/strong>No<\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">All network interfaces allocated to an application security group (ASG) must exist in the same virtual network that the 1st network interface allocated to the application security group (ASG) is present. If the 1st network interface allocated to an application security group titled <\/span><i><span style=\"font-weight: 400;\">AsgWeb<\/span><\/i><span style=\"font-weight: 400;\"> is in the virtual network titled <\/span><i><span style=\"font-weight: 400;\">VNet1<\/span><\/i><span style=\"font-weight: 400;\">, all subsequent network interfaces allocated to <\/span><i><span style=\"font-weight: 400;\">ASGWeb<\/span><\/i><span style=\"font-weight: 400;\"> must exist in <\/span><i><span style=\"font-weight: 400;\">VNet1<\/span><\/i><span style=\"font-weight: 400;\">. You can\u2019t add network interfaces from different virtual networks to the same application security group (ASG).<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Application Security Groups, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/application-security-groups?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/application-security-groups?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Private_Access_to_Azure_Services\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Private Access to Azure Services<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q5 : <\/span><span style=\"font-weight: 400;\">Azure Private Endpoint acts as a network interface to connect you to a service powered by Azure Private Link in a private and secure manner. Being the Private Link resource owner, which of the following actions can you perform over a private endpoint connection?\u00a0\u00a0<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Reviewing all private endpoint connection details<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Approving a private endpoint connection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Rejecting a private endpoint connection<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Deleting a private endpoint connection from any state<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>All the above<\/span><\/p>\n<p><b>Correct Answer: E<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The private link resource owner can perform the below-given actions over a private endpoint connection:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81426 size-full\" title=\"Design and Implement Private Access to Azure Services\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-5.png\" alt=\"Design and Implement Private Access to Azure Services\" width=\"913\" height=\"158\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-5.png 913w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-5-300x52.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-5-768x133.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-5-640x111.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-5-681x118.png 681w\" sizes=\"(max-width: 913px) 100vw, 913px\" \/><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Besides reviewing all private endpoint connection details, the private link resource owner can approve, reject, and even delete a private endpoint connection.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Besides approving a private endpoint connection, the private link resource owner can review, reject, and even delete a private endpoint connection.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. A private link resource owner can review, approve, reject and even delete a private endpoint connection.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Besides deleting a private endpoint connection, the private link resource owner can review, approve, or even reject a private endpoint connection.<\/span><br \/>\n<b>Option E is correct.<\/b><span style=\"font-weight: 400;\"> A private link resource owner can perform all the given actions.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Azure Private Endpoint, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/private-link\/private-endpoint-overview?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/private-link\/private-endpoint-overview?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_Implement_and_Manage_Hybrid_Networking\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design, Implement, and Manage Hybrid Networking<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q6 : There are various configuration options available for VPN gateway connections. One of your friends wants to embrace secure access to Azure virtual networks for remote users.\u00a0 But he is confused about the configuration that will fit the best. He approaches you for suggestions. Which of the following configuration would you suggest to him?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Point-to-Point<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Point-to-Site<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Site-to-Site<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>ExpressRoute<\/span><b>\u00a0<\/b><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">For the use cases like Secure access to Azure virtual networks for remote users, the Point-to-Site connectivity option suits the best. Below is the table to understand the various configuration needs and capabilities of various connectivity options.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81427 size-full\" title=\"Hybrid Networking in Microsoft Azure\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-6.png\" alt=\"Hybrid Networking in Microsoft Azure\" width=\"964\" height=\"513\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-6.png 964w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-6-300x160.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-6-768x409.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-6-789x420.png 789w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-6-640x341.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-6-681x362.png 681w\" sizes=\"(max-width: 964px) 100vw, 964px\" \/><\/p>\n<p><b>Option A is incorrect. <\/b><span style=\"font-weight: 400;\">Point-to-point is not a valid connectivity option.<\/span><br \/>\n<b>Option B is correct<\/b><span style=\"font-weight: 400;\">. For the use cases like Secure access to Azure virtual networks for remote users, the Point-to-Site connectivity option suits the best.<\/span><br \/>\n<b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">For the scenarios as given in the question, the Site-to-Site connectivity is not the right option.<\/span><br \/>\n<b>Option D is incorrect. <\/b><span style=\"font-weight: 400;\">ExpressRoute is not the right option.<\/span><\/p>\n<p><b>Reference<\/b><span style=\"font-weight: 400;\">: <\/span><span style=\"font-weight: 400;\">To know more about VPN Gateway, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-about-vpngateways?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-about-vpngateways?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Core_Networking_Infrastructure-2\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Core Networking Infrastructure<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q7 : You create a DNS zone using the Azure portal. After creating the Zone, you create an &#8216;A&#8217; record to translate a hostname to an IPv4 address. Now, you decide to test DNS name resolution to ensure that everything works fine. Which of the following tools would you use?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Nslookup<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>NsDomainTest<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Azure Traffic Manager<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>NsDNSLookup<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The following is the process to test DNS Name Resolution:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81428 size-full\" title=\"test DNS Name Resolution in Microsoft Azure\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-7.png\" alt=\"test DNS Name Resolution in Microsoft Azure\" width=\"895\" height=\"781\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-7.png 895w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-7-300x262.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-7-768x670.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-7-481x420.png 481w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-7-640x558.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-7-681x594.png 681w\" sizes=\"(max-width: 895px) 100vw, 895px\" \/><\/p>\n<p><b>Option A is correct.\u00a0 <\/b><span style=\"font-weight: 400;\">As seen from the above screenshot, Nslookup is the right command\/tool to use.<\/span><br \/>\n<b>Option B is incorrect. <\/b><span style=\"font-weight: 400;\">There is no such tool\/command like <\/span><i><span style=\"font-weight: 400;\">NsDomainTest.<\/span><\/i><br \/>\n<b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">Azure Traffic Manager is a DNS-based traffic load balancing solution that allows optimal distribution of the traffic to services across global Azure regions, offering high responsiveness and availability. It is not the right tool for the desired purpose.<\/span><br \/>\n<b>Option D is incorrect. <\/b><span style=\"font-weight: 400;\">The right command is Nslookup, not<\/span> <i><span style=\"font-weight: 400;\">NsDNSLookup.<\/span><\/i><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about creating an Azure DNS zone and record via the Azure portal, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/dns\/dns-getstarted-portal?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/dns\/dns-getstarted-portal?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing-3\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q8 : While configuring the TLS termination, you need to provide the listener with the addition of a TLS\/SSL certificate to empower the Application Gateway for deriving a symmetric key as per TLS\/SSL protocol specification. Which of the following types of certificates are supported by the application gateway for TLS termination?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>CA (Certificate Authority) certificate<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>EV (Extended Validation) certificate<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Organization Validated certificates<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Domain Validated certificates<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Wildcard Certificate<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>F. <\/strong>Self-Signed certificates<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>G. <\/strong>All the above<\/span><\/p>\n<p><b>Correct Answers: A, B, E, and F<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Below is the list of certificates supported by the Application gateway for TLS termination:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CA (Certificate Authority) certificate<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EV (Extended Validation) certificate<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Wildcard Certificate<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Self-Signed certificates<\/span><\/li>\n<\/ol>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. Application gateway supports CA certificates. CA is a digital certificate issued by a certificate authority (CA).<\/span><br \/>\n<b>Option B is correct. <\/b><span style=\"font-weight: 400;\">Application gateway supports EV certificates. These certificates conform to industry-standard certificate guidelines.<\/span><br \/>\n<b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">Application gateway does not support organization-validated certificates.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Application gateway does not support domain-validated certificates.<\/span><br \/>\n<b>Option E is correct. <\/b><span style=\"font-weight: 400;\">Wildcard certificates are a specific type of certificate that is supported by the Application gateway.<\/span><br \/>\n<b>Option F is correct<\/b><span style=\"font-weight: 400;\">. Application gateway supports self-signed certificates for TLS termination.<\/span><br \/>\n<b>Option G is incorrect. <\/b><span style=\"font-weight: 400;\">Application gateway does not support organization-validated and domain-validated certificates out of the given options.<\/span><\/p>\n<p><b>Reference<\/b><span style=\"font-weight: 400;\">: <\/span><span style=\"font-weight: 400;\">To know more about TLS termination and supported certificates, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/application-gateway\/ssl-overview?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/application-gateway\/ssl-overview?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing-4\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q9 : <\/span><b>\u00a0<\/b><span style=\"font-weight: 400;\">Microsoft Azure Traffic Manager empowers you to control network traffic distribution to application deployments running in various datacenters. At which of the following layers, Traffic manager does work?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Transport Layer<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Application Layer<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Physical Layer<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Data Link Layer<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Network Layer<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure Traffic Manager empowers you to control network traffic distribution to application deployments running in various datacenters.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When someone tries to connect to any service, it must first translate the DNS name of the service to the IP address. The person then gets connected to that IP address to access that service.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Traffic manager works at the Application layer, not at the Transport layer.<\/span><br \/>\n<b>Option B is correct.<\/b><span style=\"font-weight: 400;\"> Traffic manager operates at the DNS level which exists in the Application layer, i.e., Layer-7.<\/span><br \/>\n<b>Option C is incorrect. <\/b><span style=\"font-weight: 400;\">Traffic manager works at the Application layer, not the Physical layer.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Traffic manager operates at the DNS level which exists in the Application layer, i.e., Layer-7.<\/span><br \/>\n<b>Option E is incorrect.<\/b><span style=\"font-weight: 400;\"> Network Layer is not the correct answer.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about how Traffic Manager works, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-how-it-works\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-how-it-works<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Secure_and_Monitor_Networks-2\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Secure and Monitor Networks<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q10 : <\/span><span style=\"font-weight: 400;\">Andrew Job&#8217;s Car Dealership is an establishment in Sydney, Australia which deals in selling and purchasing automobiles. Andrew has hired you as an experienced consultant. You are leading a team session. There, you need to explain the Azure Firewall. Which of the below statement can you use to describe the Azure Firewall?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>An Azure service that<\/span> <span style=\"font-weight: 400;\">enables the management of virtual machine firewall settings from the Azure portal<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>An Azure Service that filters the inbound and outbound traffic for the Azure Resources<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>An Azure service that blocks malicious traffic from the intruders or attackers<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>An Azure service that allows you to access Azure PaaS Services (for example, Azure Storage and SQL Database) and Azure-hosted customer-owned\/partner services over a private endpoint in your virtual network<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure Firewall is one of the cloud-based, managed network security services that protect Azure Virtual Network resources. Azure firewall enables the clients to filter inbound and outbound traffic for Azure Resources.<\/span><\/p>\n<p><b>Option A is incorrect. <\/b><span style=\"font-weight: 400;\">Azure firewall is not the service that<\/span> <span style=\"font-weight: 400;\">enables the management of virtual machine firewall settings from the Azure portal.<\/span><br \/>\n<b>Option B is correct.<\/b><span style=\"font-weight: 400;\"> Azure firewall enables the clients to filter inbound and outbound traffic for Azure Resources.<\/span><br \/>\n<b>Option C is<\/b> <b>incorrect.<\/b><span style=\"font-weight: 400;\"> Azure Firewall filters the inbound and outbound traffic.<\/span><br \/>\n<b>Option D is incorrect. <\/b><span style=\"font-weight: 400;\">Azure Private Link allows you to access Azure PaaS Services (for example, Azure Storage and SQL Database) and Azure-hosted customer-owned\/partner services over a private endpoint in your virtual network.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Azure Firewall, please visit the below-given link: <\/span><a href=\"https:\/\/aviatrix.com\/learn-center\/cloud-security\/azure-firewall\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/aviatrix.com\/learn-center\/cloud-security\/azure-firewall\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_Implement_and_Manage_Hybrid_Networking-2\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design, Implement, and Manage Hybrid Networking<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q11 : <\/span><span style=\"font-weight: 400;\">You have been assigned the responsibility of connecting an Azure environment and an on-premises network. The solution must utilize ExpressRoute. In case of an ExpressRoute failure, it should support failing over to a Site-to-Site (S2S) VPN connection.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">What would you configure?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Policy-based Routing<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Route-based Routing<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Static Routing<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Weighted Routing<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To configure Site-to-Site (S2S) VPN and ExpressRoute coexisting connections offer several advantages as given below:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A Site-to-Site (S2S) VPN can be configured as a safe failover route for the ExpressRoute.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alternatively, Site-to-Site (S2S) VPNs can be used to connect to the sites that aren\u2019t connected via ExpressRoute.<\/span><\/li>\n<\/ol>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> You need to configure Route-based routing in the given scenario.<\/span><br \/>\n<b>Option B is correct<\/b><span style=\"font-weight: 400;\">. Configuring Site-to-Site (S2S) VPN and ExpressRoute coexisting connections support only route-based VPN gateway.<\/span><b>\u00a0<\/b><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> Configuring static routing is not the right option.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Weight Routing is not a proper term. Therefore, it is not the correct answer.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Configuring ExpressRoute and Site-to-Site (S2S) coexisting connections, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/expressroute\/expressroute-howto-coexist-resource-manager\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/expressroute\/expressroute-howto-coexist-resource-manager<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Core_Networking_Infrastructure-3\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Core Networking Infrastructure<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q12 : <\/span><span style=\"font-weight: 400;\">Here are some statements regarding Azure Domain Name Service (DNS).<\/span><\/em><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\">\n<h4><em><span style=\"font-weight: 400;\">DNS servers within a VNet (Virtual Network) can forward DNS queries to recursive resolvers in Azure.<\/span><\/em><\/h4>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">\n<h4><em><span style=\"font-weight: 400;\">Azure doesn\u2019t provide its own default internal DNS.<\/span><\/em><\/h4>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">\n<h4><em><span style=\"font-weight: 400;\">DNS replaces a private IP with a Public IP.<\/span><\/em><\/h4>\n<\/li>\n<\/ol>\n<h4><em><span style=\"font-weight: 400;\">Choose the correct answer regarding the given statements.<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Only 1<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Only 2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Only 3<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Only 1 and 2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Only 2 and 3<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>F. <\/strong>Only 1 and 3<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>G. <\/strong>1, 2 and 3<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure DNS (Domain Name Service) is a hosting service for DNS domains that offer name resolution through Microsoft Azure infrastructure. You can host your domains in Azure to manage the DNS records with the same credentials, tools, APIs, and billing as any other Azure service.<\/span><\/p>\n<p><b>Option A is correct.<\/b><span style=\"font-weight: 400;\"> The statement \u201cDNS servers within a VNet (Virtual Network) can forward DNS queries to recursive resolvers in Azure\u201d is true. For example, all the DNS queries for its domains can be responded to by the Domain controller in the Azure and the rest of the queries can be forwarded to Azure.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Azure provides its own default internal DNS.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. It is NAT (Network Address Translation), not DNS, that converts a private IP address to a public IP address.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Only statement 1 is true. Statement 2 is false.<\/span><br \/>\n<b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. Only statement 1 is true. Both the statements in the option are false.<\/span><br \/>\n<b>Option F is incorrect<\/b><span style=\"font-weight: 400;\">. Only statement 1 is true. Statement 3 is false.<\/span><br \/>\n<b>Option G is incorrect<\/b><span style=\"font-weight: 400;\">. Statements 2 and 3 are false.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about DNS, please visit the below-given links: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/virtual-networks-name-resolution-for-vms-and-role-instances\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-network\/virtual-networks-name-resolution-for-vms-and-role-instances<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_Implement_and_Manage_Hybrid_Networking-3\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design, Implement, and Manage Hybrid Networking<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q13 : <\/span><span style=\"font-weight: 400;\">You have been assigned the responsibility to configure the ExpressRoute circuits. Meanwhile, you need to retrieve the list of all ExpressRoute circuits in a Resource group. Which of the following cmdlets would you use?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Get-ResourceProvider<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Get-AzExpressRouteCircuit\u00a0<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Get-AzAllExpressRouteCircuit<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Get-AzExpressRouteCircuitStats<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Get-AzAllExpressRouteCircuit cmdlet is used to list all the ExpressRoute circuits in a Resource Group. The syntax for the command is:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81429 size-full\" title=\"Get-AzAllExpressRouteCircuit cmdlet\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-13.png\" alt=\"Get-AzAllExpressRouteCircuit cmdlet\" width=\"493\" height=\"78\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-13.png 493w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-13-300x47.png 300w\" sizes=\"(max-width: 493px) 100vw, 493px\" \/><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Get-ResourceProvider is not a valid Powershell cmdlet.<\/span><br \/>\n<b>Option B is correct<\/b><span style=\"font-weight: 400;\">. Get-AzAllExpressRouteCircuit cmdlet is used to list all the ExpressRoute circuits in a Resource Group.<\/span><br \/>\n<b>Option C is incorrect<\/b><span style=\"font-weight: 400;\">. Get-AzAllExpressRouteCircuit is not the right cmdlet.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Get-AzExpressRouteCircuitStats is used to get the combined primary &amp; secondary path traffic statistics.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about how to verify ExpressRoute connectivity, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/expressroute\/expressroute-troubleshooting-expressroute-overview?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/expressroute\/expressroute-troubleshooting-expressroute-overview?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing-5\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q14 : <\/span><span style=\"font-weight: 400;\">You need to configure an Azure Basic Load Balancer. Your boss has asked you to configure in such a way that the probes are sent every 4 seconds, and a virtual machine (VM) is considered to be down or in an unhealthy condition after two consecutive probe failures. Which of the following settings would you choose?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Interval = 4 and Unhealthy threshold= 2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Unhealthy threshold = 4 and Interval= 2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Protocol = TCP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Hop limit = 4 and threshold = 2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Hop limit = 4 and Unhealthy threshold = 2<\/span><\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Adding health probes<\/span> <span style=\"font-weight: 400;\">is one of the tasks needed to be performed while designing and implementing an Azure load balancer. In this task, the following information is added on the \u201cAdd Health probe\u201d page.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-81430\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.1.png\" alt=\"\" width=\"808\" height=\"161\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.1.png 808w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.1-300x60.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.1-768x153.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.1-640x128.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.1-681x136.png 681w\" sizes=\"(max-width: 808px) 100vw, 808px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Here is the screenshot of what the page looks like:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81431 size-full\" title=\"Design and Implement Routing in Microsoft Azure\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2.png\" alt=\"Design and Implement Routing in Microsoft Azure\" width=\"1048\" height=\"505\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2.png 1048w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2-300x145.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2-1024x493.png 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2-768x370.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2-872x420.png 872w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2-640x308.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-14.2-681x328.png 681w\" sizes=\"(max-width: 1048px) 100vw, 1048px\" \/><\/p>\n<p><b>Option A is correct.<\/b><span style=\"font-weight: 400;\"> As per the scenario requirements, Interval should be assigned a value of 4 and Unhealthy threshold a value of 2, which is also the default value for the Unhealthy threshold.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Unhealthy threshold = 4 and Interval= 2 is not the proper configuration as per the requirements.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> The protocol you choose, TCP or UDP, doesn\u2019t affect the requirement.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. There is nothing like Hop Limit during the probes\u2019 configuration. It is the unhealthy threshold, not only a threshold that should be given a value of 2.<\/span><br \/>\n<b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. There is nothing like Hop Limit during the probes\u2019 configuration.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about designing and implementing Azure Load Balancer using the Azure portal, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/load-balancing-non-https-traffic-azure\/3-design-implement-azure-load-balancer-using-azure-portal?ns-enrollment-type=LearningPath&amp;ns-enrollment-id=learn.wwl.designing-implementing-microsoft-azure-networking-solutions-az-700\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/load-balancing-non-https-traffic-azure\/3-design-implement-azure-load-balancer-using-azure-portal<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing-6\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q15 : <\/span><span style=\"font-weight: 400;\">You are the network engineer and you want to specify different monitoring settings for different endpoints using Azure Traffic Manager. Is that possible?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>No<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>No, it needs using multiple instances of the traffic manager<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Yes, automatically the system provides different monitoring settings for different endpoints<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Yes, choose monitoring protocol as TCP<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Yes, you need to use\u00a0 nested Traffic Manager profiles<\/span><\/p>\n<p><b>Correct Answer: E<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Azure Traffic Manager involves built-in endpoints monitoring and automatic endpoints failover. It enables you to provide applications with higher availability that are resilient to endpoint failure and Azure region failures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All endpoints share the monitoring setting in a Traffic Manager profile. If you desire to specify different monitoring settings for different endpoints, build <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-nested-profiles#example-5-per-endpoint-monitoring-settings\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">nested Traffic Manager profiles<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. It is possible to specify different monitoring settings for different endpoints.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> It is possible to specify<\/span> <span style=\"font-weight: 400;\">different monitoring settings for different endpoints using nested traffic manager profiles.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> By default, the Monitoring setting is shared by all endpoints in a Traffic Manager profile.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> Choosing a TCP protocol won\u2019t help in specifying different monitoring settings for different endpoints.<\/span><br \/>\n<b>Option E is correct.<\/b><span style=\"font-weight: 400;\"> If you desire to specify different monitoring settings for different endpoints, build <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-nested-profiles#example-5-per-endpoint-monitoring-settings\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">nested Traffic Manager profiles<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Traffic Manager endpoint monitoring, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-monitoring\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-monitoring<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Secure_and_Monitor_Networks-3\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Secure and Monitor Networks<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q16 : Statement: Application rules are not applicable on inbound connections. Therefore, if you need to filter HTTP(s) traffic, you should implement a Web Application Firewall.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">Is this statement correct?<\/span><\/em><\/h4>\n<p><strong>A. <\/strong>Yes<br \/>\n<strong>B. <\/strong>No<\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Application rules are not applicable on inbound connections. Therefore, if you need to filter HTTP(s) traffic, you should implement a Web Application Firewall (WAF). You can deploy WAF with services like Azure Front Door, Azure Application Gateway, and Azure Content Delivery Network (CDN).<\/span><\/p>\n<p><b>References: <\/b><span style=\"font-weight: 400;\">To know more about Web Application Firewall, Please visit the below-given links:<\/span><br \/>\n<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/rule-processing\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/firewall\/rule-processing<\/span><\/a><br \/>\n<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/web-application-firewall\/overview\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/web-application-firewall\/overview<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_Implement_and_Manage_Hybrid_Networking-4\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design, Implement, and Manage Hybrid Networking<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q17 : <\/span><span style=\"font-weight: 400;\">You have an Azure subscription \u201cSubscription2\u201d containing two Azure virtual networks (VNets) VNet2 and VNet3. VNet2 has a VPN gateway, \u201cVGW1\u201d which utilizes static routing. There is a site-to-site (S2S) VPN connectivity between VNet2 and your on-premises network.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">On a computer System \u201cClient2\u201d based on Windows 10, you have configured a point-to-site (P2S) VPN connectivity to VNet2.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">You configure VNet peering between VNet2 and VNet3. During the verification, You notice that you can connect to VNet3 from the on-premises network, but not Client2.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">You need to resolve the issue and make sure that Client2 gets connected to VNet3.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">What would you do?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Choose Allow gateway transit on VNet3<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Choose Allow gateway transit on VNet2<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Enable BGP on VGW1<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Download &amp; re-install the VPN client configuration package on Client2<\/span><\/p>\n<p><b>Correct Answer: D<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">How Point-to-Site <\/span><b>(<\/b><span style=\"font-weight: 400;\">P2S) VPN routing behaves depends upon the client Operating System, the protocol involved in VPN connectivity, and how the VNets are connected\/linked to each other.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, Azure supports 2 protocols &#8211; SSTP and IKEv2 for remote access. Many clients Operating systems like Windows, macOS, Linux, iOS, and Android support IKEv2 while only Windows OS supports SSTP.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0If you carried out any changes to your network\u2019s topology and have Windows VPN clients, you must download and install the VPN client package again for Windows clients to apply the changes to the client.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Choosing <\/span><i><span style=\"font-weight: 400;\">Allow gateway transit on VNet3<\/span><\/i><span style=\"font-weight: 400;\"> won\u2019t help in meeting the goal.<\/span><br \/>\n<b>Option B is incorrect.<\/b><span style=\"font-weight: 400;\"> Choosing <\/span><i><span style=\"font-weight: 400;\">Allow gateway transit on VNet2<\/span><\/i><span style=\"font-weight: 400;\"> is not the correct answer.<\/span><br \/>\n<b>Option C is incorrect.<\/b> <i><span style=\"font-weight: 400;\">Enabling BGP on VGW1<\/span><\/i><span style=\"font-weight: 400;\"> won\u2019t ensure that Client2 gets connected to VNet3 in the given scenario.<\/span><br \/>\n<b>Option D is correct.<\/b> <i><span style=\"font-weight: 400;\">Downloading &amp; re-installing the VPN client configuration package on Client2<\/span><\/i><span style=\"font-weight: 400;\"> is the right choice.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Point-to-Site VPN routing, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-about-point-to-site-routing\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/vpn-gateway\/vpn-gateway-about-point-to-site-routing<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Core_Networking_Infrastructure-4\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Core Networking Infrastructure<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q18 : <\/span><span style=\"font-weight: 400;\">While creating a link between a private DNS Zone and a virtual network (VNet), is it possible to make settings so that the DNS records are automatically created for all the VMs (virtual machines) deployed in VNet?<\/span><\/em><\/h4>\n<p><strong>A. <\/strong>Yes<br \/>\n<strong>B. <\/strong>No<\/p>\n<p><b>Correct Answer: A<\/b><\/p>\n<p><b>Explanation:<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While creating a link between a private DNS zone and a VNet, there is an option to enable autoregistration. When you enable this setting, VNet becomes a registration VNet for the private DNS zone. It will automatically create a DNS record for any VMs you deploy in the VNet. DNS records will also be created for virtual machines already deployed in the virtual network.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about virtual network links, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/dns\/private-dns-virtual-network-links\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/dns\/private-dns-virtual-network-links<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Core_Networking_Infrastructure-5\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Core Networking Infrastructure<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q19 : <\/span><span style=\"font-weight: 400;\">Which of the following Resource Groups will be created in the customers\u2019 subscription when they create a network virtual appliance (NVA) in the Virtual WAN hub?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Customer resource group<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Partner Resource Group<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Managed Resource Group<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Virtual Resource Group<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Controlled Resource Group<\/span><\/p>\n<p><b>Correct Answers: A and C<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\"> When you create a network virtual appliance (NVA) in the Virtual WAN hub, two resource groups \u2013 Customer Resource Group and Managed Resource Group are created in your subscription.<\/span><\/p>\n<p><b>Option A is correct<\/b><span style=\"font-weight: 400;\">. Customer Resource Group is one of the two resource groups created when you create a network virtual appliance (NVA) in the Virtual WAN hub.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Partner Resource Group is not created.<\/span><br \/>\n<b>Option C is correct. <\/b><span style=\"font-weight: 400;\">Managed Resource Group is one of the two resource groups created when you create a network virtual appliance (NVA) in the Virtual WAN hub.<\/span><br \/>\n<b>Option D is incorrect. <\/b><span style=\"font-weight: 400;\">Virtual Resource Group is not the right choice.<\/span><br \/>\n<b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. A controlled Resource Group is not the right choice.<\/span><\/p>\n<p><b>Reference<\/b><span style=\"font-weight: 400;\">: <\/span><span style=\"font-weight: 400;\">To know more about NVA in an Azure Virtual WAN Hub, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-wan\/about-nva-hub\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-wan\/about-nva-hub<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing-7\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q20 : <\/span><span style=\"font-weight: 400;\">Statement: In WAF_v2 and Standard_v2 SKU, Application Gateway can run only in the fixed capacity mode, not in autoscaling enabled mode.<\/span><\/em><br \/>\n<em><span style=\"font-weight: 400;\">Choose the correct option regarding the statement above.<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>True<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>False<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In WAF_v2 and Standard_v2 SKU, the Application Gateway can run in both modes- autoscaling enabled and fixed capacity (autoscaling disabled). Fixed capacity mode is preferable\/ recommended for scenarios with predictable and consistent workloads. On the other hand, Autoscaling enabled mode is preferable in applications seeing variance in application traffic.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about Autoscaling and Zone-redundant Application Gateway v2, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/application-gateway\/application-gateway-autoscaling-zone-redundant\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/application-gateway\/application-gateway-autoscaling-zone-redundant<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Routing-8\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Routing<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q21 : <\/span><span style=\"font-weight: 400;\">Azure traffic manager supports six different traffic routing methods suiting different requirements and specifications. Which of the following routing methods would you use to ensure compliance with data sovereignty mandates?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Priority<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Performance<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Geographic<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Multivalue<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>Clustered<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\"> Geographic routing should be used for directing the users to specific endpoints (External, Azure, or Nested) depending upon where their DNS queries initiate from geographically. Also, this method empowers you to comply with scenarios like localization of content &amp; user experience, data sovereignty mandates, and measuring traffic from various regions.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Priority traffic routing method is recommended routing when you are looking to have a primary\/main service endpoint for all traffic.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Performance Routing is recommended when you have endpoints in various geographic locations, and you need end-users to utilize the &#8220;closest&#8221; endpoint for the lowest network latency.<\/span><br \/>\n<b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> The geographic traffic routing method suits the best when you need to comply with data sovereignty mandates.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> MultiValue Routing should be selected<\/span> <span style=\"font-weight: 400;\">for Traffic Manager profiles that can have only IPv6\/ IPv4 addresses as endpoints.<\/span><br \/>\n<b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. Clustered is not a valid traffic routing method in Azure Traffic Manager.<\/span><\/p>\n<p><b>Reference:<\/b> <span style=\"font-weight: 400;\">To know more about Traffic Manager Routing methods, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-routing-methods?WT.mc_id=modinfra-33046-thmaure\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/traffic-manager\/traffic-manager-routing-methods?WT.mc_id=modinfra-33046-thmaure<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Secure_and_Monitor_Networks-4\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Secure and Monitor Networks<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q22 : <\/span><span style=\"font-weight: 400;\">Web Application Firewall offers centralized protection of web applications from common vulnerabilities and exploits. Which of the following is an optional stage in creating a WAF (Web Application Firewall) policy on Azure Front Door using Azure Portal?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Create a Web Application Firewall policy<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Associate the WAF policy with a Front Door profile<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Configure WAF policy settings and rules<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of the above<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Three key stages in creating a WAF (Web Application Firewall) policy on Azure Front Door using Azure Portal are:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-81432 size-full\" title=\"Configure WAF policy settings and rules\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-22.png\" alt=\"Configure WAF policy settings and rules\" width=\"707\" height=\"734\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-22.png 707w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-22-289x300.png 289w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-22-405x420.png 405w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-22-640x664.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-22-681x707.png 681w\" sizes=\"(max-width: 707px) 100vw, 707px\" \/><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> Creating a web application Firewall policy is a mandatory step.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Associate the WAF policy with a Front Door profile is the 2nd key stage in creating a WAF (Web Application Firewall) policy on Azure Front Door using Azure Portal.<\/span><br \/>\n<b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> Configuring WAF policy settings and rules is an optional stage where policy setting, custom rules, and managed rules are configured.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Configuring WAF policy settings and rules is an optional stage.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know about implementing a Web Application Firewall on Azure Front Door, please visit the below-given link:<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/design-implement-network-security-monitoring\/10-implement-web-application-firewall-on-azure-front-door?ns-enrollment-type=LearningPath&amp;ns-enrollment-id=learn.wwl.designing-implementing-microsoft-azure-networking-solutions-az-700\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/design-implement-network-security-monitoring\/10-implement-web-application-firewall-on-azure-front-door<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_and_Implement_Private_Access_to_Azure_Services-2\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design and Implement Private Access to Azure Services<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q23 : <\/span><span style=\"font-weight: 400;\">________ virtual public IP address is utilized for facilitating a communication channel to Azure platform resources.<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>168.63.129.26<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>168.63.129.16<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>164.63.129.16<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>168.0.0.16<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>255.0.0.0<\/span><\/p>\n<p><b>Correct Answer: B<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">168.63.129.16 IP address is a virtual public IP address that is utilized for facilitating a communication channel to Azure platform resources. Any address space can be defined by the customers for their private Vnet in Azure. The Azure platform resources need to be represented as a unique public IP address.<\/span><\/p>\n<p><b>Option A is incorrect.<\/b><span style=\"font-weight: 400;\"> 168.63.129.26 is not the correct IP address.<\/span><br \/>\n<b>Option B is correct.<\/b><span style=\"font-weight: 400;\"> 168.63.129.16 IP address is a virtual public IP address that is utilized for facilitating a communication channel to Azure platform resources.<\/span><br \/>\n<b>Option<\/b> <b>C is incorrect<\/b><span style=\"font-weight: 400;\">. 164.63.129.16 is not the correct answer.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. It is 168.63.129.16, not 168.0.0.16 IP address is a virtual public IP address that is utilized for facilitating a communication channel to Azure platform resources.<\/span><br \/>\n<b>Option E is incorrect<\/b><span style=\"font-weight: 400;\">. 255.0.0.0 is not the correct answer.<\/span><\/p>\n<p><b>Reference:<\/b><span style=\"font-weight: 400;\"> \u00a0<\/span><span style=\"font-weight: 400;\">To know more about Integrating Private Link with DNS, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/design-implement-private-access-to-azure-services\/6-integrate-private-link-dns\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/learn\/modules\/design-implement-private-access-to-azure-services\/6-integrate-private-link-dns<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_Implement_and_Manage_Hybrid_Networking-5\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design, Implement, and Manage Hybrid Networking<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q24 : You are working as a network engineer in your company. You need to configure the communication between two offices of the company located in Delhi and California. Which of the following configuration would you use?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Use a local service provider present in both Delhi and California, and enable GlobalReach to connect to each local service provider location<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Use GlobalReach to connect each location to a private VPN, and use local service providers for P2S (point-to-site) access<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>Use a local service provider in Delhi and a different local service provider in California. Global Reach will connect the branches using ExpressRoute and MS global network<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>None of these<\/span><\/p>\n<p><b>Correct Answer: C<\/b><\/p>\n<p><b>Explanation: <\/b><\/p>\n<p><span style=\"font-weight: 400;\">ExpressRoute Global Reach complements your service provider\u2019s WAN implementation and helps connect your branch offices worldwide. You need to use a local service provider in Delhi and a different local service provider in California in the given scenario. Global Reach will connect the branches using ExpressRoute and MS global network.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Using a local service provider in both Delhi and California, and enabling GlobalReach for connecting to each local service provider location is not the right choice.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. The given solution won\u2019t also help in accomplishing the goal in the given scenario.<\/span><br \/>\n<b>Option C is correct.<\/b><span style=\"font-weight: 400;\"> You need to use a local service provider in Delhi and a different local service provider in California in the given scenario. Global Reach will connect the branches using ExpressRoute and MS global network.<\/span><br \/>\n<b>Option D is incorrect<\/b><span style=\"font-weight: 400;\">. Option C suggests the right solution.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about ExpressRoute Global Reach, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/expressroute\/expressroute-global-reach\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-us\/azure\/expressroute\/expressroute-global-reach<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Domain_Design_Implement_and_Manage_Hybrid_Networking-6\"><\/span><span style=\"font-weight: 400;\">Domain : <\/span><span style=\"font-weight: 400;\">Design, Implement, and Manage Hybrid Networking<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><em><span style=\"font-weight: 400;\">Q25 : Your manager has assigned you the responsibility of changing the bandwidth of an ExpressRoute Circuit. Which of the following tools can you use to change the bandwidth?<\/span><\/em><\/h4>\n<p><span style=\"font-weight: 400;\"><strong>A. <\/strong>Azure Portal<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>B. <\/strong>Rest API<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>C. <\/strong>PowerShell<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>D. <\/strong>Azure CLI<\/span><br \/>\n<span style=\"font-weight: 400;\"><strong>E. <\/strong>All the above<\/span><\/p>\n<p><b>Correct Answer: E<\/b><\/p>\n<p><b>Explanation:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The bandwidth of the ExpressRoute circuit can be changed using the REST API, PowerShell, Azure Portal, or Azure CLI.<\/span><\/p>\n<p><b>Option A is incorrect<\/b><span style=\"font-weight: 400;\">. Any of the given tools, not only the Azure portal can be used to change the bandwidth of an ExpressRoute circuit.<\/span><br \/>\n<b>Option B is incorrect<\/b><span style=\"font-weight: 400;\">. Any of the given tools, not only Rest API can be used to change the bandwidth of an ExpressRoute circuit.<\/span><br \/>\n<b>Option C is incorrect.<\/b><span style=\"font-weight: 400;\"> The bandwidth of the ExpressRoute circuit can be changed using the REST API, PowerShell, Azure Portal, or Azure CLI.<\/span><br \/>\n<b>Option D is incorrect.<\/b><span style=\"font-weight: 400;\"> The bandwidth of the ExpressRoute circuit can be changed using the REST API, PowerShell, Azure Portal, or Azure CLI.<\/span><br \/>\n<b>Option E is correct.<\/b><span style=\"font-weight: 400;\"> Any of the given tools can be used to change the bandwidth of an ExpressRoute circuit.<\/span><\/p>\n<p><b>Reference: <\/b><span style=\"font-weight: 400;\">To know more about ExpressRoute, please visit the below-given link: <\/span><a href=\"https:\/\/docs.microsoft.com\/en-ca\/azure\/expressroute\/expressroute-introduction\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/docs.microsoft.com\/en-ca\/azure\/expressroute\/expressroute-introduction#<\/span><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">We are certain that after going through these free test questions, you must have gained knowledge on the pattern of the AZ-700 exam. To learn and practice more, go through the Practice Tests offered by us on the Whizlabs\u2019 website. Certify and step ahead in your career. Keep learning with us!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Looking for AZ-700 exam questions? Our free test questions with explanatory elaborations will guide you in the assessment of the exam. So, go ahead and evaluate your preparation and knowledge of the concepts. Who this exam is intended for? The candidates for the AZ-700 exam are expected to have subject-level expertise in the planning, implementation, and maintenance of Azure Networking Solutions. This includes Connectivity, Routing, Security, Hybrid Networking, and Private Access to Azure Services. To appear and pass this exam, candidates must possess expert-level Azure Administration skills, plus a considerable amount of understanding and experience on Network Security, Hybrid Connections, [&hellip;]<\/p>\n","protected":false},"author":356,"featured_media":81502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15],"tags":[],"class_list":["post-81420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-azure"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",600,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions-150x150.png",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions-300x158.png",300,158,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",600,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",600,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",600,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",600,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",24,13,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",48,25,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",96,50,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",150,79,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",300,158,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions-250x250.png",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",600,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",96,50,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2022\/03\/az-700-free-questions.png",150,79,false]},"uagb_author_info":{"display_name":"Vasanth Rajan","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/vasanth\/"},"uagb_comment_info":4,"uagb_excerpt":"Looking for AZ-700 exam questions? Our free test questions with explanatory elaborations will guide you in the assessment of the exam. So, go ahead and evaluate your preparation and knowledge of the concepts. Who this exam is intended for? The candidates for the AZ-700 exam are expected to have subject-level expertise in the planning, implementation,&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/356"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=81420"}],"version-history":[{"count":8,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81420\/revisions"}],"predecessor-version":[{"id":81490,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/81420\/revisions\/81490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/81502"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=81420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=81420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=81420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}