hardmultiple choiceObjective-mapped

A storage account must be accessible only from one Azure subnet. The security team does not want a private endpoint or private DNS zone, and they are fine with the storage account continuing to use its public FQDN. Which configuration should you use?

Question 1hardmultiple choice
Full question →

A storage account must be accessible only from one Azure subnet. The security team does not want a private endpoint or private DNS zone, and they are fine with the storage account continuing to use its public FQDN. Which configuration should you use?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Create a service endpoint on the subnet and allow that subnet in the storage account firewall.

A service endpoint is the correct design because it restricts access to a specific subnet without creating a private IP address for the storage account. The storage account can continue to use its public FQDN, which matches the requirement. By enabling the service endpoint on the subnet and then permitting that subnet in the storage firewall, traffic is locked down while avoiding private endpoint and private DNS complexity.

B

Distractor review

Create a private endpoint for the storage account and disable public network access.

Private endpoints create a private IP address in the VNet, which the scenario explicitly does not want.

C

Distractor review

Use an NSG rule to allow only the subnet to reach port 443 on the storage account.

NSGs do not filter traffic to a PaaS storage account in the way a storage firewall or endpoint feature does.

D

Distractor review

Associate a route table that sends storage traffic to an Azure firewall appliance.

Routing controls next hop selection, but it does not by itself grant subnet-only access to the storage account.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Create a service endpoint on the subnet and allow that subnet in the storage account firewall. — The right answer is to use a service endpoint and then authorize the subnet in the storage account firewall. That combination lets resources in the subnet access the storage service over the Azure backbone while the storage account still presents its public endpoint. It is the appropriate choice when you want subnet-based restriction without introducing private endpoints or private DNS management. This also keeps the configuration simpler than a private connectivity design. Why others are wrong: A private endpoint is explicitly disallowed by the requirements because it creates a private IP and usually requires DNS changes. NSGs and route tables do not replace the storage firewall for PaaS access control. They can influence network flow, but they do not by themselves grant or restrict storage account access at the service boundary.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.