mediummultiple choiceObjective-mapped

A company has a hub-spoke network topology in Azure. The spoke virtual networks contain Azure virtual machines that need to access the internet. The security team requires that all outbound internet traffic from the spoke VMs passes through the Azure Firewall deployed in the hub virtual network for inspection and logging. Which configuration should be implemented to ensure this traffic is routed through the firewall?

Question 1mediummultiple choice
Full question →

A company has a hub-spoke network topology in Azure. The spoke virtual networks contain Azure virtual machines that need to access the internet. The security team requires that all outbound internet traffic from the spoke VMs passes through the Azure Firewall deployed in the hub virtual network for inspection and logging. Which configuration should be implemented to ensure this traffic is routed through the firewall?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Configure an Azure Load Balancer in the hub to distribute traffic from spokes to the firewall.

A load balancer distributes incoming traffic, but does not route outbound traffic from spoke VMs through the firewall. It would not force traffic to the firewall as a next hop.

B

Best answer

Create a user-defined route (UDR) in the spoke subnet with 0.0.0.0/0 pointing to the private IP of the Azure Firewall.

The UDR with default route pointing to the firewall's private IP ensures that all outbound internet traffic from the spoke VMs is forwarded to the firewall for inspection and logging.

C

Distractor review

Use Azure Firewall Manager to automatically enforce a global default route on all spokes. This is the only configuration needed.

Azure Firewall Manager can be used to apply routes, but it must be configured to create UDRs on the spoke subnets. The statement is misleading because the route is still a UDR created by the manager; the key action is the route itself.

D

Distractor review

Enable IP forwarding on the NICs of the spoke VMs so they forward traffic to the firewall.

IP forwarding is used when a VM acts as a network appliance, not to force outbound traffic. The routing must be done at the subnet level via UDRs.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related AZ-500 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this AZ-500 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Create a user-defined route (UDR) in the spoke subnet with 0.0.0.0/0 pointing to the private IP of the Azure Firewall. — To force outbound internet traffic from spoke VMs through the hub Azure Firewall, you must create a route table in the spoke subnet(s) and add a route with destination 0.0.0.0/0 and next hop set to the private IP address of the Azure Firewall in the hub. The firewall then applies its rules to allow or deny traffic. This is known as forced tunneling. Azure Firewall Manager can also automate this, but the core requirement is a user-defined route (UDR) pointing to the firewall.

What should I do if I get this AZ-500 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.