mediummultiple choiceObjective-mapped

Exhibit

NSG: App-NSG inbound rules; Priority 100: Deny TCP 443, Source=VirtualNetwork, Destination=Any; Priority 110: Allow TCP 443, Source=WebTierASG, Destination=DbTierASG; Priority 200: Allow TCP 443, Source=AzureLoadBalancer, Destination=Any; Default rule: DenyAllInBound.

Based on the exhibit, what should the administrator change so the web tier can reach the database tier on TCP 443 without opening the subnet more broadly?

Question 1mediummultiple choice
Full question →

Based on the exhibit, what should the administrator change so the web tier can reach the database tier on TCP 443 without opening the subnet more broadly?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Move the allow rule for WebTierASG to a priority lower than 100.

The allow rule must be evaluated before the broader deny rule so the intended traffic is permitted.

B

Distractor review

Delete the deny rule because default rules already block unwanted traffic.

Deleting the rule would expose more traffic than intended and is not the least-privilege fix.

C

Distractor review

Change the deny rule source from VirtualNetwork to Internet.

That would stop blocking internal traffic, but it would also weaken the intended restriction model.

D

Distractor review

Change the default inbound rule to AllowVnetInBound.

Default rules cannot be edited this way, and changing defaults would not solve the priority conflict.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related AZ-104 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-104 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Move the allow rule for WebTierASG to a priority lower than 100. — Network security groups are processed in priority order, where the lowest number wins. In the exhibit, priority 100 denies TCP 443 from VirtualNetwork to any destination, so the later allow rule at priority 110 never gets a chance to match. Moving the specific allow rule above the deny rule lets only the intended ASG-to-ASG traffic pass, while keeping the broader deny in place for everything else. Why others are wrong: Deleting the deny rule would broaden access beyond the requirement. Changing the source of the deny rule alters the scope, but it does not preserve the intended layered control. Default NSG rules are not the right mechanism to override a custom rule priority problem, so the practical fix is to place the specific allow rule ahead of the broader deny.

What should I do if I get this AZ-104 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.