Topic 1: Litware. Inc Case Study 1

You need to implement a P2S VPN for the users in the branch office. The solution must meet the hybrid networking requirements.
What should you do? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.



Summary:
This scenario requires configuring a P2S VPN for user connectivity from a branch office. The requirement to integrate with the litwareinc.com tenant strongly indicates the use of Azure Active Directory (Azure AD) authentication, which is the modern, recommended method for user-based VPN access, replacing certificate-based authentication.

Correct Option:
On the VPN gateway in Vnet1, set the P2S VPN tunnel type to: OpenVPN (SSL)

In the litwareinc.com tenant: Create an Azure AD application

Explanation of Correct Options:

OpenVPN (SSL):
This is the correct tunnel type. OpenVPN® Protocol is the only tunnel type that supports the modern, secure Azure AD authentication method. The other protocol, SSTP, only supports certificate-based authentication. Therefore, to meet the requirement for seamless user authentication, OpenVPN must be selected.

Create an Azure AD application:
This is the foundational step for enabling Azure AD authentication. A Azure AD enterprise application must be created and configured to grant access permissions to the Azure VPN service. This application acts as the secure connection point between the VPN gateway and the Azure AD tenant, allowing it to authenticate users from the litwareinc.com directory.

Explanation of Incorrect Options:

SSTP (SSL):
This tunnel type does not support Azure AD authentication. It is limited to certificate-based authentication, which is more complex to manage for user-based scenarios and does not meet the implied requirement for integrated user identity.

Create a device object:
A device object in Azure AD represents a device, not a user or an application service principal. It is used for scenarios like device-based conditional access or Microsoft Intune management, not for configuring a P2S VPN gateway.

Create a managed identity:
A managed identity is an Azure service principal used for granting permissions to Azure resources (like a VM or App Service) to access other Azure services securely. It is not used for authenticating external human users to a VPN gateway.

Reference:
Microsoft Learn: Azure Active Directory authentication: Configure a tenant - This document explicitly states that OpenVPN is required for Azure AD authentication and details the steps, including creating an Azure AD App.

What should you implement to meet the virtual network requirements for the virtual machines that connect to Vnet4 and Vnet5?

A. a private endpoint

B. a virtual network peering

C. a private link service

D. a routing table

E. a service endpoint

B.   a virtual network peering

Summary:
This question involves connecting virtual machines across different virtual networks (Vnet4 and Vnet5). The virtual network requirements typically mandate private, low-latency connectivity that traverses the Microsoft Azure backbone network without exposing traffic to the public internet. The solution must enable direct communication between resources in these VNets.

Correct Option:

B. a virtual network peering:
This is the correct solution. Virtual network peering seamlessly connects two Azure virtual networks, merging them for connectivity purposes. The key benefits are: It provides private, low-latency connectivity through the Azure backbone infrastructure.

Traffic between the peered VNets never crosses the public internet, meeting stringent security and performance requirements.

It is the native and primary method for enabling direct communication between resources in different VNets within the same region (or across regions with global peering).

Incorrect Option:

A. a private endpoint:
A private endpoint is used to provide private access to a specific PaaS service (like Azure Storage or SQL Database) by mapping it into a VNet's IP space. It is not used for general VM-to-VM connectivity across different VNets.

C. a private link service:
This is the service provider side of Azure Private Link. It allows you to offer your own service privately to other VNets. It is not used for connecting VNets together for general VM communication.

D. a routing table:
A routing table (User-Defined Route) is used to override Azure's default system routes to control traffic flow, for example, forcing it through a Network Virtual Appliance (NVA). It does not, by itself, create a network path between two VNets; it only defines the path for traffic that is already allowed. Peering must exist first.

E. a service endpoint:
A service endpoint secures a PaaS service's public endpoint by extending your VNet identity to it. It is used for outbound connectivity from a VNet to an Azure service, not for inbound or lateral connectivity between two VNets.

Reference:
Microsoft Learn: Virtual network peering

You need to configure GW1 to meet the network security requirements for the P2S VPN users. Which Tunnel type should you select in the Point-to-site configuration settings of GW1?

A. IKEv2 and OpenVPN (SSL)

B. IKEv2

C. IKEv2 and SSTP (SSL)

D. OpenVPN (SSL)

E. SSTP (SSL)

A.   IKEv2 and OpenVPN (SSL)

Summary:
This question involves selecting the appropriate Point-to-Site (P2S) VPN tunnel type to meet network security requirements. The key differentiator is the protocol's support for modern authentication and security standards. The solution must prioritize strong, certificate-based authentication and robust encryption protocols.

Correct Option:

A. IKEv2 and OpenVPN (SSL):
This is the correct and most comprehensive choice. Selecting both protocols provides the highest level of client compatibility and security: IKEv2 offers superior stability, especially when users switch networks (e.g., from Wi-Fi to mobile data). It supports certificate-based authentication, which is a strong security standard.

OpenVPN (SSL) is crucial as it is the only protocol that supports the modern, passwordless-capable Azure AD authentication. It also provides broad client compatibility across various operating systems.

Incorrect Option:

B. IKEv2:
Selecting only IKEv2 is insufficient. It does not support Azure AD authentication, which is often a key security requirement for user-based VPNs. This limits authentication to certificates only and excludes users on operating systems that rely on the OpenVPN client.

C. IKEv2 and SSTP (SSL):
This combination is outdated from a security perspective. SSTP is a legacy protocol that does not support Azure AD authentication and is less performant and transparent than OpenVPN. Modern security best practices favor OpenVPN over SSTP.

D. OpenVPN (SSL):
Using only OpenVPN can meet security requirements if Azure AD authentication is the sole goal. However, it excludes native IKEv2 clients (like macOS and iOS), which provide a more seamless and resilient connection experience, especially for mobile users. Offering both is the best practice.

E. SSTP (SSL):
This is the least desirable option. Relying solely on SSTP prevents the use of modern Azure AD authentication and offers no benefits over the IKEv2/OpenVPN combination. It should be avoided for new deployments where modern security is a requirement.

Reference:
Microsoft Learn: About Point-to-Site VPN protocols - This document compares the supported protocols and explicitly states that OpenVPN is required for Azure AD authentication.

You need to meet the network security requirements for the NSG flow logs.
Which type of resource do you need, and how many instances should you create? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.



Summary:
This question concerns the infrastructure required to collect and store NSG Flow Logs. NSG Flow Logs are a feature of Azure Network Watcher that capture information about IP traffic flowing through a Network Security Group. The solution requires a destination for the logs and follows a specific resource topology.

Correct Option:

Resource type: A storage account

Minimum number of instances: 1

Explanation of Answers:

A storage account:
This is the correct resource type. By definition, NSG Flow Logs must be written to an Azure Storage Account. This is a mandatory requirement; the logs are stored as blobs within a designated container in the storage account. While a Log Analytics workspace can be used for analyzing flow logs, the primary, raw log data must first be persisted in a storage account.

Minimum number of instances: 1:
You only need one central storage account to collect the NSG Flow Logs from all your NSGs. A single storage account can have multiple containers and can receive diagnostic data from numerous resources across the subscription. There is no requirement to create a separate storage account per NSG or per virtual network. Creating one is the most efficient and manageable approach.

Explanation of Incorrect Resource Types:

An Azure Monitor workflow:
This likely refers to a Logic Apps workflow for automation, which is not the direct destination for NSG flow logs.

An Azure Monitor data collection rule (DCR):
DCRs are used to define how data should be collected for Azure Monitor Agent, primarily for guest OS telemetry. They are not the direct storage target for platform-level NSG Flow Logs.

A Log Analytics workspace:
While you can send a copy of your NSG Flow Logs to a Log Analytics workspace for advanced querying with KQL, this is an optional, secondary step. The primary and mandatory storage location is always an Azure Storage Account.

A Data:
This is an incomplete and unclear resource type and is not a valid Azure service for this purpose.

Reference:
Microsoft Learn: Introduction to NSG flow logs - This document explicitly states, "NSG flow logs are stored in an Azure storage account."

You are implementing the Virtual network requirements for Vnet6.
What is the minimum number of subnets and service endpoints you should create? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.


Summary:
To meet Vnet6’s virtual network requirements, a single dedicated subnet is required to host private endpoints for secure PaaS access (e.g., storage, databases). Private endpoints must reside in their own subnet. Service endpoints are not needed when using private endpoints, as they provide private connectivity via private IPs. Thus, the minimum is one subnet and zero service endpoints.

Correct Option:

Subnets: 1

One subnet is required exclusively for private endpoints to enforce isolation and routing.

Azure mandates private endpoints in a dedicated subnet; sharing with VMs or other resources is not allowed.

Meets PaaS networking requirements with minimal infrastructure.

Service endpoints: 0
Private endpoints fully replace service endpoints for private PaaS access using private IPs.

No service endpoints are needed when private endpoints are in use.

Avoids public IP resolution and aligns with secure connectivity goals.

Incorrect Option:

Subnets: 0
Impossible to deploy private endpoints without a subnet; Azure requires a dedicated subnet per VNet.

Violates implementation and security isolation requirements.

Subnets: 2, 3, etc.
Multiple subnets exceed the minimum; one is sufficient for all private endpoints in Vnet6.

Increases complexity without adding value.

Service endpoints: 1, 2, etc.
Unnecessary with private endpoints; service endpoints use public IPs and weaker isolation.

Contradicts business requirements for fully private, secure PaaS access.

Reference:
https://learn.microsoft.com/en-us/azure/private-link/private-endpoint-overview

https://learn.microsoft.com/en-us/azure/private-link/create-private-endpoint-portal

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.



Summary:
VM5 is in VNet2 and needs to resolve names in zone2.contoso.com (a private DNS zone linked to VNet3). VM4 is in VNet1 and has auto-registration enabled in zone1.contoso.com. For VM5 to resolve zone2.contoso.com, the private DNS zone must be linked to VNet2 with registration disabled. Auto-registration is only possible in the VNet where the VM resides and the zone is linked with registration enabled.

Correct Option:

Currently, VM5 can resolve names in zone2.contoso.com: No
zone2.contoso.com is linked only to VNet3 (not VNet2).

Without a link to VNet2, VM5 cannot resolve records in zone2.contoso.com.

DNS resolution fails unless the zone is linked to the VM’s VNet.

VM4 has an automatic registration in zone1.contoso.com: Yes
Auto-registration works when the VM’s VNet (VNet1) is linked to the zone with “Enable auto-registration” turned on.

VM4’s hostname is automatically registered as an A record in zone1.contoso.com.

You can link zone2.contoso.com to VNet3 and enable auto registration: No
The zone is already linked to VNet3; the statement implies adding another link with auto-registration.

A private DNS zone can have only one link with auto-registration enabled; additional links must have it disabled.

Enabling auto-registration on a second link to VNet3 is invalid.

Incorrect Option:

Currently, VM5 can resolve names in zone2.contoso.com: Yes
Incorrect; no link exists between zone2.contoso.com and VNet2.

DNS queries from VM5 will fail without a zone link.

VM4 has an automatic registration in zone1.contoso.com: No
Incorrect; auto-registration is active if VNet1 is linked with registration enabled.

VM4’s record is automatically managed in the zone.

You can link zone2.contoso.com to VNet3 and enable auto registration: Yes
Incorrect; only one auto-registration link is allowed per zone.

VNet3 already has the registration link; another cannot be enabled.

Reference:
https://learn.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links

https://learn.microsoft.com/en-us/azure/dns/private-dns-autoregistration

You create NSG10 and NSG11 to meet the network security requirements.
For each of the following statements, select Yes it the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.



Summary:
NSG10 and NSG11 are configured to meet network security requirements for VM1 and VM2. The statements evaluate bidirectional RDP connectivity (port 3389). If NSG10 is assigned to VM1's subnet/NIC and NSG11 to VM2's, both can establish RDP sessions if allow rules exist for source/destination traffic. NSG rules are evaluated independently, enabling symmetric communication when properly configured.

Correct Option:

From VM1, you can establish a Remote Desktop session with VM2: Yes
NSG10 on VM1 allows outbound RDP (port 3389) to VM2's IP/subnet.

NSG11 on VM2 allows inbound RDP from VM1's IP/subnet.

Bidirectional rules enable VM1 to initiate the session successfully.

From VM2, you can establish a Remote Desktop session with VM1: Yes
NSG11 on VM2 allows outbound RDP to VM1's IP/subnet.

NSG10 on VM1 allows inbound RDP from VM2's IP/subnet.

Symmetric rule configuration supports VM2 initiating the connection.

Incorrect Option:

From VM1, you can establish a Remote Desktop session with VM2: No
Incorrect; NSG10's outbound allow rule and NSG11's inbound allow rule permit the connection.

Default deny does not apply if explicit allow rules are configured per requirements.

From VM2, you can establish a Remote Desktop session with VM1: No
Incorrect; NSG11's outbound allow and NSG10's inbound allow enable full RDP access.

Requirements ensure bidirectional connectivity, not unidirectional.

Reference:
https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview

https://learn.microsoft.com/en-us/azure/virtual-network/network-security-group-how-it-works

In which NSGs can you use ASG1 and to which virtual machine network interfaces can you associate ASG1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.



Summary:
Application Security Groups (ASGs) in Azure allow grouping of VM network interfaces for scalable NSG rules. ASG1 can be used in any NSG rule’s source or destination field if the NSG is associated with VMs in the same VNet. ASG1 can be associated directly only with VM network interfaces (NICs), not with NSGs. The correct scope is any NSG in the VNet and NICs of VMs that are members of ASG1.

Correct Option:

NSGs: NSG1, NSG2, NSG3, NSG4, and NSG5
ASG1 can be referenced in rules of any NSG within the same virtual network.

NSG association with subnets or NICs does not restrict ASG usage in rules.

Enables centralized security policy using ASG1 across multiple NSGs.

Virtual machines: VM2, VM3, VM4, and VM5 only
ASG1 can be associated only with NICs of VMs that are members of ASG1.

VM1 is not a member, so its NIC cannot be associated with ASG1.

Association is per-NIC and supports dynamic membership.

Incorrect Option:

NSGs: NSG1 only / NSG1 and NSG2 only / etc.
Restricting ASG1 to specific NSGs is unnecessary and limits scalability.

ASGs are VNet-scoped and usable in any NSG rule within the VNet.

Virtual machines: VM1 only / VM1 and VM2 only / All VMs
VM1 is not in ASG1; associating it violates membership rules.

Including non-member VMs causes rule misapplication or errors.

Reference:
https://learn.microsoft.com/en-us/azure/virtual-network/application-security-groups

https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview#application-security-groups

You are implementing the virtual network requirements for VM Analyze.
What should you include in a custom route that is linked to Subnet2? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.



Summary:
To meet VM Analyze’s virtual network requirements in Subnet2, a custom route with address prefix 0.0.0.0/0 and next hop type Virtual appliance is required. This forces all outbound traffic (Internet-bound) through a network virtual appliance (e.g., Azure Firewall or third-party NVA) for inspection and logging. Default system routes allow direct Internet access; the custom route overrides this for centralized security and compliance.

Correct Option:

Address prefix: 0.0.0.0/0
Captures all non-local traffic destined outside the VNet.

Overrides Azure’s default 0.0.0.0/0 system route to Internet.

Ensures full outbound traffic tunneling via the NVA.

Next hop type: Virtual appliance
Routes traffic to the private IP of the NVA (e.g., firewall).

Enables stateful inspection, logging, and policy enforcement.

Required for security and compliance in regulated workloads.

Incorrect Option:

Address prefix: 0.0.0.0/32, 10.1.0.0/16, 255.255.255.255/32, etc.
Too narrow (e.g., /32) or VNet-local (10.1.0.0/16); does not cover Internet traffic.

Fails to redirect all required outbound flows to the NVA.

Next hop type: None, Internet, Virtual network, Virtual network gateway
None disables route; Internet allows direct public access (bypasses NVA).

Virtual network or gateway are for intra-VNet or VPN/ExpressRoute, not NVA routing.

Reference:
https://learn.microsoft.com/en-us/azure/virtual-network/virtual-networks-udr-overview

https://learn.microsoft.com/en-us/azure/virtual-network/tutorial-create-route-table-portal

For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.



Summary:
VM5 in VNet2 cannot resolve zone2.contoso.com unless the private DNS zone is linked to VNet2. VM4 in VNet1 has auto-registration only if its VNet is linked with registration enabled. A private DNS zone allows only one auto-registration link; zone2.contoso.com is already linked to VNet3, so enabling auto-registration again on VNet3 is invalid and redundant.

Correct Option:

VM5 can resolve names in zone2.contoso.com: No
zone2.contoso.com is linked only to VNet3, not VNet2.

Without a link to VNet2, VM5 cannot resolve records in the zone.

DNS resolution requires a VNet link with registration disabled for lookup.

VM4 has an automatic registration in zone1.contoso.com: Yes
VNet1 is linked to zone1.contoso.com with auto-registration enabled.

VM4’s NIC is automatically registered as an A record in the zone.

You can link zone2.contoso.com to VNet3 and enable auto registration: No
The zone is already linked to VNet3; re-adding the same link is not possible.

Only one auto-registration link per zone is allowed; duplicates are blocked.

Incorrect Option:

VM5 can resolve names in zone2.contoso.com: Yes
Incorrect; no VNet2 link exists for zone2.contoso.com.

DNS queries from VM5 fail without proper zone linkage.

VM4 has an automatic registration in zone1.contoso.com: No
Incorrect; auto-registration is active in VNet1 for zone1.contoso.com.

VM4’s record is automatically created and updated.

You can link zone2.contoso.com to VNet3 and enable auto registration: Yes
Incorrect; the link already exists and auto-registration is limited to one VNet.

Azure prevents enabling auto-registration on duplicate or existing links.

Reference:
https://learn.microsoft.com/en-us/azure/dns/private-dns-virtual-network-links

https://learn.microsoft.com/en-us/azure/dns/private-dns-autoregistration

Page 2 out of 19 Pages
AZ-700 Practice Test

Are You Truly Prepared?

Don't risk your exam fee on uncertainty. Take this definitive practice test to validate your readiness for the Microsoft AZ-700 exam.