exam questions

Exam AZ-700 All Questions

View all questions & answers for the AZ-700 exam

Exam AZ-700 topic 4 question 5 discussion

Actual exam question from Microsoft's AZ-700
Question #: 5
Topic #: 4
[All AZ-700 Questions]

HOTSPOT -
You have an Azure subscription that contains the virtual machines shown in the following table.

Subnet1 and Subnet2 are associated to a network security group (NSG) named NSG1 that has the following outbound rule:
✑ Priority: 100
✑ Port: Any
✑ Protocol: Any
✑ Source: Any
✑ Destination: Storage
✑ Action: Deny
You create a private endpoint that has the following settings:
✑ Name: Private1
✑ Resource type: Microsoft.Storage/storageAccounts
✑ Resource: storage1
✑ Target sub-resource: blob
✑ Virtual network: Vnet1
✑ Subnet: Subnet1
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:
Reference:
https://docs.microsoft.com/en-us/azure/private-link/disable-private-endpoint-network-policy

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
WorkHardBeProud
Highly Voted 3 years, 3 months ago
Correct! Service Tag "storage" represents Azure Storage Accounts and can only be applied on the Outbound direction. Here the NSG is denying the access to any Storage account ( direction is Outbound, read well) and it is applied on the Subnet level not on the NIC level. No - VM2 being on the subnet 2 not on subnet 1 will be deny Yes - VM1 and Private 1 are in the same subnet so VM1 will have access N0 - VM2 has been denied the access by the NSG
upvoted 53 times
Pamban
3 years, 2 months ago
Wrong. Lab tested. answer is YES YES YES There is no block between subnets.
upvoted 22 times
waqas
3 years, 1 month ago
You are wrong. Answer must be NYN. When u configure Private Endpoint then you always mention the Vnet alongwith Subnet. Here Subnet1 is selected for Private endpoint deployment not Subnet2. So According to this article https://docs.microsoft.com/en-us/azure/storage/common/storage-private-endpoints#network-security-group-rules-for-subnets-with-private-endpoints "NSG rules applied to the subnet hosting the private endpoint are not applied to the private endpoint". So VM1 would use private endpoint without any NSG filtering. Whereas Subnet2 will use NSG which has a Deny action. There is no linkage of Subnet 2 Subnet communication as the only subnet configured to Private Endpoint is Subnet1. Thats why the answer is NYN.
upvoted 30 times
Sergovladi
3 weeks ago
NYN, however, in our exhibit NSG rules are applicable because they are (can be) enabled in network policy. Generally speaking, any VM from a VNET may have access to a Storage without Private Endpoint or Service Endpoint over public network if configured. In our case NSG takes precedence https://learn.microsoft.com/en-us/azure/private-link/disable-private-endpoint-network-policy?tabs=network-policy-portal
upvoted 1 times
Sergovladi
3 weeks ago
NNN, sorry for mistyping
upvoted 1 times
...
...
leotoronto123
3 years, 1 month ago
thanks Waqas ..
upvoted 2 times
...
...
sapien45
2 years, 4 months ago
You did no Lab.
upvoted 7 times
...
Pamban
3 years, 2 months ago
appeared on exam 5th Dec 2021
upvoted 2 times
Takloy
3 years ago
What's that supposed to mean if it appeared on the exam? I don't think it proves your answer is correct.
upvoted 7 times
...
...
...
...
christianpageqc
Highly Voted 3 years, 4 months ago
According to this article https://docs.microsoft.com/en-us/azure/storage/common/storage-private-endpoints#network-security-group-rules-for-subnets-with-private-endpoints "NSG rules applied to the subnet hosting the private endpoint are not applied to the private endpoint". So VM1 would use private endpoint without any NSG filtering.
upvoted 17 times
Roman_Rabodzey
3 years, 3 months ago
The same is for VM2. There is no rule to deny subnet-to-subnet communication which is open by default. It will have access to a storage account because it uses private endpoint
upvoted 8 times
srikanth1987
3 years, 3 months ago
I agree with you @Roman. It's subnet to subnet communication, the source has no idea whether the destination PE belongs to storage or sql or whatever.
upvoted 2 times
...
RandomUser
3 years, 3 months ago
That gives us 3 yes. And it makes sense as the Service Tag essentially is just a collection of public IP addresses. And we do not use any of PIPs to connect to the storage.
upvoted 7 times
...
sapien45
2 years, 4 months ago
Well answered Sir
upvoted 1 times
...
...
Bharat
3 years, 4 months ago
Yes. You are correct.
upvoted 1 times
...
WorkHardBeProud
3 years, 3 months ago
Be careful guys it is not the case anymore. https://docs.microsoft.com/en-us/azure/private-link/disable-private-endpoint-network-policy
upvoted 3 times
Ajdlfasudfo0
2 years, 2 months ago
this feature is now available, but you still have to opt-in manually
upvoted 2 times
...
Morgana
3 years, 3 months ago
NSG for private endpoints are "public preview only" I still think the Answer are YES.YES.YES.
upvoted 14 times
...
...
...
Saba53
Most Recent 2 days, 7 hours ago
Guys! Stop arguing. It's obviously YNY ChatGPT Approved!
upvoted 1 times
...
MostafaNawar
1 year ago
1. From VM2, you can create a container in storage1: No The NSG's outbound rule blocks any traffic from any source to the Storage service, including creating containers. The private endpoint is only for accessing blob storage and doesn't override NSG rules for other storage operations. 2. From VM1, you can upload data to a blob storage container in storage1: Yes The private endpoint in Subnet1 provides a private IP address for VM1 to access blob storage in storage1. Traffic to the private endpoint bypasses NSG rules, allowing VM1 to upload data to blobs. 3. From VM2, you can upload data to a blob storage container in storage1: No VM2 is not in the subnet where the private endpoint is configured (Subnet1). It cannot use the private endpoint to bypass the NSG rule, so outbound traffic to storage is still blocked.
upvoted 1 times
...
Lazylinux
1 year, 4 months ago
Based on the below im voting NYN and hence given answer is correct First let’s get those facts outlined Subnet to Subnet communication within the same VNET is allowed by default and would need an explicit NSG rule to restrict and hence The default outbound NSG rule is to allow all VMs to communicate with each other and resources freely on same vNET, however if you create an outbound rule that overrides the default rule by giving it higher priority than the custom rule will override the default rule and this is the case in this scenario and hence communication is blocked to storage In order to enforce NSG on Private Endpoint – a Network plociy MUST be enabled for the vNET spscific to NSG, however in this case is NOT mentioned or enabled and hence NSG rules are NOT affecting the private Endpoint see further info as limit reached
upvoted 6 times
Lazylinux
1 year, 4 months ago
adding more here Here snippet from MS artcle as per below link Network security groups (NSGs) support for private endpoints is now generally available. This feature enhancement provides you with the ability to enable advanced security controls on traffic destined to a private endpoint. In order to leverage this feature, you will need to set a specific subnet level property, called PrivateEndpointNetworkPolicies, to enabled on the subnet containing private endpoint resources. See links below https://learn.microsoft.com/en-us/azure/private-link/disable-private-endpoint-network-policy?tabs=network-policy-portal https://azure.microsoft.com/en-au/updates/general-availability-of-network-security-groups-support-for-private-endpoints/
upvoted 4 times
ironbornson
1 year, 4 months ago
Thank you LazyLinuz, it looks it's still NYN until they update the question referencing NetworkPolicies feature
upvoted 2 times
...
...
...
heatfan900
1 year, 5 months ago
n, y, n WHEN CREATING THE PRIVATE ENDPOINT FOR INBOUND ACCESS AGAINST THE STORAGE ACCT SA1, YOU ARE ESSENTIALLY BRINGING THAT SA INTO THE VNET1/SUBNET1 AS PER THE SETTINGS OUTLINED ABOVE. TH THE NSG IS APPLIED AT THE SUBNET LEVEL, THEREFORE, IT IS NOT APPLIED WHEN CONNECTING FROM A RESOURCE IN SUBNET 1 SUCH AS VM1. SINCE THERE IS NO PRIVATE ENDPOINT FOR SUBNET AND THE NSG APPLIES TO THAT SUBNET AS WELL THE OUTBOUND TRAFFIC TO SA1 WILL BLOCKED AS PER THE NSG DENY RULE.
upvoted 1 times
pentium75
6 months, 1 week ago
The NSG in Subnet2 applies to the public Storage endpoint, but you are not using that, you are using the private storage endpoint in Subnet1.
upvoted 1 times
...
...
mabalon
1 year, 5 months ago
This question seems old. Currently NSGs can be applied on PE subnets: https://learn.microsoft.com/en-us/azure/private-link/disable-private-endpoint-network-policy?tabs=network-policy-portal
upvoted 1 times
pentium75
6 months, 1 week ago
"can" but are not by default
upvoted 1 times
...
...
Crazysaffer
1 year, 8 months ago
I thought private endpoints ignores NSG's. Therefore everything should be yes
upvoted 1 times
...
25max
1 year, 10 months ago
https://learn.microsoft.com/en-us/azure/virtual-network/vnet-integration-for-azure-services Using service tags to allow or deny traffic to your Azure resources to and from public IP endpoints.
upvoted 1 times
...
_fvt
1 year, 10 months ago
YYY - Service TAGS are for Public services IP, doesn't contains private endpoints so don't filter any flow to the private endpoint, even on VM NICs or if Network Policies For Private endpoint were enabled for the Subnet where the private endpoint is located. "https://learn.microsoft.com/en-us/azure/virtual-network/vnet-integration-for-azure-services" https://learn.microsoft.com/en-us/azure/virtual-network/vnet-integration-for-azure-services
upvoted 2 times
_fvt
1 year, 10 months ago
"Using service tags to allow or deny traffic to your Azure resources to and from public IP endpoints."
upvoted 1 times
...
...
JennyHuang36
1 year, 11 months ago
In exam Feb, 2023
upvoted 3 times
...
tzatziki
2 years ago
...I always wanted to say this... Tested in Lab... And i did just that. All answers are Y. Set the public access level of the containers to blob, did the nsg+rules to the subnets and 2 vms with bastion access and the private endpoint... all test where made with powershell from the vms ... Also pointing out that when the private endpoint was created a note was saying that if i have an nsg on the subnet given, it would be disabled for private endpoints on that subnet... so thats that...
upvoted 8 times
...
TJ001
2 years ago
will go with yes yes yes...it is very clear private endpoint connections are local and the dns resolution happens to a private IP of the private end point and service tag resolves to public IP wont be applicable here
upvoted 2 times
...
phoenix14
2 years, 1 month ago
NYN is Correct because. For outbound traffic, Azure processes the rules in a network security group associated to a network interface first, if there's one, and then the rules in a network security group associated to the subnet, if there's one. This includes intra-subnet traffic as well.
upvoted 1 times
...
Takloy
2 years, 3 months ago
NYN N - Outbound is Denied so VM2 can't jump to VM1. Y - Because of the Private Endpoint N - Same explanation as the first one.
upvoted 1 times
daemon101
1 year, 7 months ago
YYY Outbound NSG rule is filtering Storage service tags that contain public IP addresses of Storage Accounts. The resources that will be impacted by the NSG rules are VM1 and VM2. Furthermore, the Storage Account is enabled with Private Endpoint which means, the Storage Account is no longer using Public IP address and it is not affected by any NSG. Network traffic between the clients on the VNet and the storage account traverses over the VNet and a private link on the Microsoft backbone network, eliminating exposure from the public internet. https://learn.microsoft.com/en-us/azure/storage/common/storage-private-endpoints
upvoted 1 times
...
...
Disparate
2 years, 3 months ago
NYN is correct! The NSG apply only a VM2 because the private endpoint is only for VM1. Easy!
upvoted 1 times
...
Prutser2
2 years, 4 months ago
the answers above are correct, ONLY if it would have stated priavet1 instead of storage1. because as ppl have stated below, storage1 is really accessible through a public ip address. as per ususal, these questions are sloppy and badly written
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago