mediummultiple choiceObjective-mapped

A three-tier application uses separate web and app VMs that are scaled in and out regularly. The administrator must allow only the web tier to connect to the app tier on TCP 8080 without continually updating IP addresses. What should be configured in the NSG rule?

Question 1mediummultiple choice
Full question →

A three-tier application uses separate web and app VMs that are scaled in and out regularly. The administrator must allow only the web tier to connect to the app tier on TCP 8080 without continually updating IP addresses. What should be configured in the NSG rule?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Use application security groups for the web and app tiers and reference those groups in the NSG rule.

Application security groups let the administrator group VMs by role rather than by IP address. The NSG rule can then allow traffic from the web ASG to the app ASG on TCP 8080. This is a good fit for environments that scale or change frequently because the NSG does not need constant editing whenever VM addresses change.

B

Distractor review

Add a subnet-to-subnet peering connection between the web and app subnets.

Peering provides connectivity between VNets, but it does not restrict traffic to only the desired tier or replace NSG rules.

C

Distractor review

Create a load balancer backend pool rule for TCP 8080.

Load balancer backend pools distribute traffic, but they are not a security control for limiting east-west access between application tiers.

D

Distractor review

Use a user-defined route that sends TCP 8080 traffic to the app tier.

Routes select next hops and do not provide an allow-list based on source and destination roles like an NSG rule does.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Use application security groups for the web and app tiers and reference those groups in the NSG rule. — Application security groups are designed for this exact problem: you can group the web servers and app servers by workload role, then write an NSG rule that permits traffic from one ASG to the other. That keeps the configuration stable even when VMs are added, removed, or reimaged. It is simpler and safer than maintaining a list of changing IP addresses. Why others are wrong: Peering changes network reachability but does not enforce tier-level access control. Load balancer backend pools are for traffic distribution, not security filtering. User-defined routes influence packet forwarding, not whether a connection is allowed. The requirement is about identity-based network filtering, which is what ASGs and NSGs are meant to solve.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.