Scenario PracticeMicrosoft · AZ-500

AZ-500 Show IP Route Output Practice Questions

Practise interpreting routing-table output, route selection, administrative distance, metrics, next hops and longest-prefix match.

Start Scenario Practice

Common Traps on Show IP Route Output Practice Questions

  • ·Longest-prefix match is checked before administrative distance.
  • ·Connected and local routes can appear alongside dynamic or static routes.
  • ·The selected route may not be the one with the lowest metric if the prefix length differs.

Sample Questions

Practice all 8
1.

A company has a hub-spoke network topology. The hub virtual network contains an Azure Firewall and an ExpressRoute gateway for on-premises connectivity. The spoke virtual network hosts a critical application. They need to ensure that all outbound traffic from the spoke to the internet and to on-premises networks is routed through the Azure Firewall. They configure a user-defined route (UDR) on the spoke subnet with address prefix 0.0.0.0/0 and next hop as the Azure Firewall's private IP. They also disable 'Virtual network gateway route propagation' on the spoke subnet. However, traffic to on-premises still bypasses the firewall and goes through the ExpressRoute gateway. What is the most likely cause?

Explanation: Disabling 'Virtual network gateway route propagation' prevents routes from the ExpressRoute gateway from being automatically added to the subnet's route table. However, the UDR with 0.0.0.0/0 only covers internet-bound traffic. Traffic destined to on-premises networks uses the specific prefix learned from ExpressRoute (e.g., 10.0.0.0/8). Even with propagation disabled, the route table does not have a route for that specific on-premises prefix. The 0.0.0.0/0 route is less specific, so traffic matching the on-premises prefix will not use it. To force on-premises traffic through the firewall, you must add an explicit UDR for the on-premises address prefix with next hop as the Azure Firewall. The Azure Firewall's location and route table association are not the issue here.

2.

A company deploys Azure Firewall in a hub VNet to inspect all outbound traffic from a spoke VNet. They enable VNet peering between the hub and spoke. They create a route table with a default route (0.0.0.0/0) pointing to the firewall's private IP as the next hop, and associate it with the spoke subnets. However, outbound traffic from the spoke subnets is still going directly to the internet, bypassing the firewall. What is the most likely cause?

Explanation: When you associate a route table with a subnet, the effective routes are the combination of system routes and user-defined routes. If the firewall's private IP is specified as the next hop for 0.0.0.0/0, but the firewall itself is not deployed with 'Forced Tunneling' or the route table is not properly propagated, the issue is often that the route table does not have 'Propagate gateway routes' set to 'No'. However, the most common cause is that the next hop type is not set to 'Virtual appliance'. In Azure, for user-defined routes, the next hop type for a virtual appliance must be 'Virtual appliance' and the IP address must be the private IP. If they set next hop type to 'Internet', traffic will go directly to internet. So option mentioning misconfigured next hop type is correct.

3.

A company has two Azure virtual networks, VNet-A (hub) and VNet-B (spoke), connected via VNet peering. They deploy a network virtual appliance (NVA) in a subnet in VNet-A to inspect all traffic between the VNets. They configure a user-defined route (UDR) on the subnet in VNet-B with the destination address space of VNet-A (10.0.0.0/16) and the next hop set to the private IP of the NVA. However, traffic from VNet-B to VNet-A still bypasses the NVA and takes a direct path. What is the most likely cause?

Explanation: For a UDR that directs traffic to an NVA to be effective, the NVA's network interface must have IP forwarding enabled. Without IP forwarding, the NVA will drop traffic that is not destined to its own IP address, and the traffic will not be forwarded. System routes for VNet peering do not take precedence over UDRs if the UDR is more specific, but in this case the UDR is specific to VNet-A's prefix. However, if IP forwarding is not enabled, the NVA cannot forward the traffic even if the route is present. The other options are not the primary cause: the NVA is likely reachable, the UDR is on the correct subnet, and peerings do not override UDRs.

4.

A company has an Azure virtual network (VNet) with multiple subnets. They deploy Azure Firewall in a hub VNet and peer spoke VNets. They want to force-tunnel all outbound traffic from a specific spoke subnet to the firewall for inspection. They have configured a route table on the spoke subnet with a default route (0.0.0.0/0) pointing to the Azure Firewall's private IP as the next hop. However, traffic is still bypassing the firewall. What is the most likely cause?

Explanation: Azure Firewall requires that the subnet hosting it has a route table with a default route to the firewall's private IP. But for spoke subnets, if the firewall's private IP is not reachable due to the hub-spoke peering not being configured correctly, or if there is no route in the hub subnet to forward traffic back, or if the firewall subnet's route table is missing the 'AllowForwardedTraffic' attribute. The most common cause is that the 'Propagate gateway routes' setting on the spoke subnet's route table is enabled, which can inject conflicting routes (e.g., from Azure VPN Gateway or ExpressRoute) that override the custom route. Disabling 'Propagate gateway routes' ensures the custom route is used.

5.

A company has two Azure virtual networks: VNet-A and VNet-B. They peer the VNets and deploy a network virtual appliance (NVA) in VNet-A. They want to inspect all outbound traffic from VNet-B to the internet using the NVA. They configure a user-defined route (UDR) in a route table associated with the subnet in VNet-B, with a default route (0.0.0.0/0) and next hop set to the private IP of the NVA in VNet-A. However, outbound traffic from VNet-B still goes directly to the internet. What is the most likely cause?

Explanation: For an NVA to forward traffic in Azure, its network interface must have IP forwarding enabled. Without IP forwarding, the VM will drop traffic not addressed to itself. Even with correct UDRs, the NVA must be configured to forward traffic. The route table association and peering are correct, but the NVA itself must be set up to route packets.

+3 more scenario questions available

Practice all Show IP Route Output Practice Questions

Related Topics

routing table questionsstatic routingospf

Frequently asked questions

How do "Show IP Route Output Practice Questions" appear on the real AZ-500?

Practise interpreting routing-table output, route selection, administrative distance, metrics, next hops and longest-prefix match. These appear throughout the AZ-500 and require you to apply your knowledge, not just recall facts.

How many scenario questions are on the AZ-500 exam?

Cisco doesn't publish an exact breakdown, but scenario-based questions (especially exhibit and command-output formats) make up a significant portion of the AZ-500. Practicing each scenario type ensures you're ready for any format.

Are these AZ-500 scenario practice questions free?

Yes — all scenario practice on Courseiva is completely free. Sign up for a free account to track your progress and see which scenario types you've mastered.

Ready to practice this scenario type?

Launch a full Show IP Route Output Practice Questions session with instant scoring and detailed explanations.

Start Scenario Practice →