exam questions

Exam AZ-104 All Questions

View all questions & answers for the AZ-104 exam

Exam AZ-104 topic 5 question 106 discussion

Actual exam question from Microsoft's AZ-104
Question #: 106
Topic #: 5
[All AZ-104 Questions]

You have an Azure subscription that contains 20 virtual machines, a network security group (NSG) named NSG1, and two virtual networks named VNET1 and VNET2 that are peered.

You plan to deploy an Azure Bastion Basic SKU host named Bastion1 to VNET1.

You need to configure NSG1 to allow inbound access to the virtual machines via Bastion1.

Which port should you configure for the inbound security rule?

  • A. 22
  • B. 443
  • C. 389
  • D. 8080
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ashfaque_9x
Highly Voted 2 years, 1 month ago
Selected Answer: B
Correct Answer B. 443 Using Bastion your RDP/SSH session is over TLS on port 443. https://learn.microsoft.com/en-us/azure/bastion/bastion-overview If you say port 22 then what about windows VM as it is not mentioned that the VM is windows or Linux? You will have to allow port 443 in NSG.
upvoted 31 times
efd324e
2 months, 4 weeks ago
No, The correct answer should be A. To allow inbound access to the virtual machines via Azure Bastion, you need to configure NSG1 to allow traffic on the following ports: Port 3389 for RDP (Remote Desktop Protocol) access to Windows VMs. Port 22 for SSH (Secure Shell) access to Linux VMs12. These ports should be allowed for inbound traffic from the Azure Bastion service to the target VMs.
upvoted 1 times
...
MoOshin
1 year, 1 month ago
The question did not say windows or linux. It just said VM. and the two possible answers are 22 for Linux and 3389 for Windows. Correct answer A https://learn.microsoft.com/en-us/azure/bastion/configuration-settings#ports
upvoted 3 times
...
...
bajjiteam
Highly Voted 2 years, 1 month ago
Correct answer A....As Bastion connects to VM via port 22/3389..Azure portal connects to Bastion via port 443..as the question is to inbound rule for vm from Bastion...Correct answer is PORT 22...option A
upvoted 27 times
hbor
1 year, 11 months ago
Correct Answer is B. The Azure Bastion will create a public IP that needs port 443 enabled on the public IP for ingress traffic. Port 3389/22 are NOT required to be opened on the AzureBastionSubnet https://learn.microsoft.com/en-us/azure/bastion/bastion-nsg
upvoted 12 times
mmarkiew
1 year, 4 months ago
I disagree. You're talking about traffic from Internet -> Bastion. The question is asking about traffic from Bastion -> VMs. Read further down in that link you provided. "Egress Traffic to target VMs: Azure Bastion will reach the target VMs over private IP. The NSGs need to allow egress traffic to other target VM subnets for port 3389 and 22." I think the correct answer is A, and we have to assume that these are Linux VMs Bastion is connecting to over SSH.
upvoted 5 times
Batiste2023
1 year, 4 months ago
You are correct! Fascinating how the majority can be wrong on some questions... The source you are quoting from is this article: https://learn.microsoft.com/en-us/azure/bastion/bastion-nsg
upvoted 1 times
...
clg003
1 year, 3 months ago
If you look at the rules created in that section they are all outbound rules, not inbound. The question doesn't specifically say much. It doesn't say windows and it doesn't say Linux so you cant differentiate between 22 and 3389. The Bastion Subnet is in the same VNET as the VM subnet so by default it shouldn't require a rule, the default rule would allow its access. The only rule I can see you would definitely need would be from outside the VNET to the Bastion Subnet would would be 443.
upvoted 3 times
...
...
...
...
ozansenturk
Most Recent 2 months ago
Selected Answer: B
Azure Bastion uses an HTML5 based web client that is automatically streamed to your local device. Your RDP/SSH session is over TLS on port 443. This enables the traffic to traverse firewalls more securely. Bastion supports TLS 1.2. Older TLS versions aren't supported.
upvoted 1 times
...
Dankho
4 months, 2 weeks ago
If I saw this problem test without first seeing it here I'd probably pick 389. Thank you ExamTopics, hopefully my work reimburses me for the monthly $ :)
upvoted 1 times
...
0378d43
5 months ago
Selected Answer: B
Azure Bastion uses an HTML5 based web client that is automatically streamed to local device. RDP/SSH session is over TLS on port 443.
upvoted 1 times
...
codered4409
5 months, 1 week ago
Correct Answer - A We connect to Azure bastion over port 443 and then bastion connects to the VM over either 22 or 3389 depending on the OS of the system. Question is asking about connectivity from bastion to VM which will be 22 (as 3389 is not part of the options).
upvoted 1 times
...
[Removed]
5 months, 1 week ago
Selected Answer: B
B is correct
upvoted 1 times
...
[Removed]
6 months, 3 weeks ago
Selected Answer: A
Inbound traffic from Bastion to VM shall be 22 for SSH (Linux) and 3389 for RDP (Windows). Reference: https://learn.microsoft.com/en-us/azure/bastion/configuration-settings#ports:~:text=By%20default%2C%20the%20inbound%20ports%20used%20to%20connect%20are%203389%20for%20RDP%20and%2022%20for%20SSH. There is also an option to connect to Windows via SSH (port 22) Reference: https://learn.microsoft.com/en-us/azure/bastion/bastion-connect-vm-ssh-windows#:~:text=Inbound%20port%3A%20SSH%20(22)%20or 443 is wrong because that is the public facing port (Internet into Bastion). Question is asking about Bastion into VMs Therefore A is correct.
upvoted 1 times
[Removed]
6 months, 3 weeks ago
I stand corrected, since the question mentions Basic SKU; which does not support connection to Windows via SSH... Therefore the question might be referring to NSG in the BastionSubnet; ingress traffic into Bastion, which makes the answer 443 (B) Final answer, B. 443
upvoted 2 times
...
...
witalis
7 months, 1 week ago
Selected Answer: B
With Azure Bastion, you can connect to your virtual machines on your local or virtual peer network via TSL, port 443 directly from the Azure portal or a native client. https://azure.microsoft.com/de-de/products/azure-bastion
upvoted 2 times
...
23169fd
9 months ago
Selected Answer: B
Port 443: Used for HTTPS connections. This is the port used by Azure Bastion to connect to the Azure portal and then to your VMs.
upvoted 3 times
...
6f80f6c
9 months, 2 weeks ago
Selected Answer: A
Answer is A. Bastion use either port 22 (SSH) or 3389 (RDP) to connect the VM.
upvoted 1 times
...
WeepingMaplte
9 months, 2 weeks ago
Selected Answer: A
Should be A. 22 since there is no 3389. https://learn.microsoft.com/nl-nl/azure/bastion/bastion-overview#:~:text=configure%20your%20NSGs%20to%20allow%20RDP/SSH%20only%20from%20Azure%20Bastion
upvoted 2 times
...
Hispan
11 months, 1 week ago
chatgpt: To configure NSG1 to allow inbound access to the virtual machines via Azure Bastion, you should enable the necessary ports. Let’s break it down: Azure Bastion Ports: Azure Bastion provides secure RDP and SSH connectivity to your virtual machines. The following ports are relevant for Azure Bastion: Port 443: Required for HTTPS traffic to Azure Bastion. Port 3389/22: Not required to be opened on the AzureBastionSubnet. Azure Bastion doesn’t use these ports directly. Ingress Traffic Rules for NSG1: Create an inbound security rule in NSG1 to allow traffic from Azure Bastion to the virtual machines. Specifically, enable port 443 for inbound traffic from the Azure Bastion control plane. Summary: Configure an inbound rule in NSG1 with the following details: Source: Azure Bastion control plane (using the GatewayManager service tag). Destination port: 443 (for HTTPS traffic).
upvoted 4 times
...
Amir1909
11 months, 2 weeks ago
B is correct
upvoted 2 times
...
rehanscloud
11 months, 3 weeks ago
To allow inbound access to the virtual machines via Azure Bastion, you should configure the inbound security rule for port 443. Azure Bastion uses SSL (HTTPS) to connect to your virtual machines through a web browser, which operates over port 443. So, the correct answer is: B. 443
upvoted 3 times
...
MatAlves
1 year ago
Answer - B: the question mentioned "allow INBOUND access" Ingress Traffic from public internet: The Azure Bastion will create a public IP that needs port 443 enabled on the public IP for ingress traffic. Port 3389/22 are NOT required to be opened on the AzureBastionSubnet. Egress Traffic to target VMs: Azure Bastion will reach the target VMs over private IP. The NSGs need to allow egress traffic to other target VM subnets for port 3389 and 22. If answer was related to Egress Traffic, both A and C would be correct. https://learn.microsoft.com/en-us/azure/bastion/bastion-nsg
upvoted 2 times
lebeyic620
11 months ago
C is 389 not 3389
upvoted 1 times
...
...
rnd3131
1 year, 1 month ago
Selected Answer: A
https://learn.microsoft.com/nl-nl/azure/bastion/bastion-overview see drawing
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago