hardmultiple choiceObjective-mapped

A VM in AppSubnet must reach a database VM in DbSubnet on TCP 1433. AppSubnet's NSG has an outbound deny rule for TCP 1433 to Any at priority 200. DbSubnet's NSG has an inbound allow rule for TCP 1433 from ASG-App to ASG-Db at priority 300. Both NICs are in the correct application security groups. Connectivity tests fail. What should the administrator change?

Question 1hardmultiple choice
Full question →

A VM in AppSubnet must reach a database VM in DbSubnet on TCP 1433. AppSubnet's NSG has an outbound deny rule for TCP 1433 to Any at priority 200. DbSubnet's NSG has an inbound allow rule for TCP 1433 from ASG-App to ASG-Db at priority 300. Both NICs are in the correct application security groups. Connectivity tests fail. What should the administrator change?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Remove the inbound allow rule from DbSubnet so the default rules can take over.

Removing the allow rule would not fix the outbound deny blocking traffic before it leaves the source subnet.

B

Distractor review

Move the inbound allow rule on DbSubnet to priority 100 so it is evaluated sooner.

The destination allow rule already exists; the source subnet outbound deny is the actual blocker.

C

Best answer

Create an outbound allow rule on AppSubnet with a lower priority number than 200 for TCP 1433 to ASG-Db.

NSG evaluation is priority-based and stateful, but an outbound deny still blocks the initial connection. A higher-priority outbound allow on the source subnet must match before the deny rule. Because the destination rule already allows the traffic, adding or moving the source-side allow above priority 200 resolves the failure without changing the application subnets or ASG design.

D

Distractor review

Assign the database VM NIC to ASG-App so the destination rule matches a broader group.

Mixing source and destination groups together breaks the intended rule logic and does not address the outbound deny on AppSubnet.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Create an outbound allow rule on AppSubnet with a lower priority number than 200 for TCP 1433 to ASG-Db. — Network security groups are processed by priority, where the lowest number wins. In this case, the outbound deny rule on AppSubnet is evaluated before any lower-priority allow rule, so the connection is blocked as soon as it leaves the source subnet. Since the destination subnet already has an allow rule for the right ASGs and port, the fix is to add or move an outbound allow rule above priority 200 on AppSubnet. Why others are wrong: Deleting the inbound rule does not help because the source subnet is already blocking the connection. Reordering the destination allow rule is ineffective if the source deny remains earlier in evaluation. Putting the database NIC into the web ASG confuses the source and destination intent and still does not override the outbound deny on AppSubnet. The problem is rule order on the source NSG.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.