Secure networking

Plan and implement security for virtual networks, private access, and public access to Azure resources.

Encompasses planning and implementing security for virtual networks including NSGs, ASGs, Virtual Network Manager, user-defined routes, VNet peering, VPN gateways, Virtual WAN, and ExpressRoute encryption. Covers security for private access to Azure resources using Service Endpoints, Private Endpoints, and Private Link. Also includes public access security through TLS implementation, Azure Firewall, Application Gateway, Front Door with CDN, WAF, and DDoS Protection.
5 minutes 5 Questions

Secure networking in Azure is a fundamental aspect of protecting cloud resources and data from unauthorized access and cyber threats. As an Azure Security Engineer, understanding secure networking involves implementing multiple layers of defense to protect your infrastructure. Azure Virtual Networ…

Concepts covered: User-defined routes (UDRs), Virtual Network peering and VPN gateway, Private Link services, Network Security Groups (NSGs) and Application Security Groups (ASGs), Azure Virtual Network Manager, Virtual WAN and secured virtual hub, Secure VPN connectivity (point-to-site and site-to-site), Encryption over ExpressRoute, Firewall settings on Azure resources, Network Watcher for security monitoring, Virtual network Service Endpoints, Private Endpoints, Network integration for App Service and Functions, Network security for App Service Environment (ASE), Network security for Azure SQL Managed Instance, TLS for applications including App Service and API Management, Azure Firewall and Azure Firewall Manager, Azure Application Gateway, Azure Front Door and Content Delivery Network (CDN), Web Application Firewall (WAF), Azure DDoS Protection Standard

Test mode:
AZ-500 - Secure networking Example Questions

Test your knowledge of Secure networking

Question 1

Your company operates an e-commerce platform on Azure with front-end web servers in subnet 10.1.1.0/24, application servers in subnet 10.1.2.0/24, and database servers in subnet 10.1.3.0/24. The security team has configured NSG rules to control traffic between tiers, but developers are reporting that legitimate API calls from the application tier to the database tier are being blocked. The network team needs to quickly determine whether the traffic blockage is occurring at the NSG level, at the Azure Firewall, or due to routing issues. They need to test connectivity for a specific flow: source VM (10.1.2.15) port 45678 to destination VM (10.1.3.20) port 1433 using TCP protocol. The solution must provide an instant verdict showing which security rule is affecting this specific packet flow. Which Network Watcher feature provides the fastest way to troubleshoot this specific connectivity issue?

Question 2

What is the maximum retention period supported by Network Watcher NSG flow logs when configured with version 2 schema?

Question 3

Your telecommunications company has deployed Azure Database for PostgreSQL Flexible Server in subnet 10.75.30.0/27 to host a customer relationship management (CRM) system. The database serves three distinct groups: internal sales representatives using Power BI from subnet 10.75.15.0/24, mobile field technicians connecting through an Azure API Management instance with public IP 20.45.78.100, and an external business intelligence partner who analyzes customer trends from their office network at 165.88.34.0/23. The database contains personally identifiable information (PII) subject to GDPR compliance, requiring granular access logging and connection tracking for all external access. After initial deployment, the sales team's Power BI reports load successfully, but the API Management service receives 'connection refused' errors when querying the database, and the external partner cannot establish any connection despite having valid credentials. The security architect has verified that Network Security Groups allow PostgreSQL port 5432 from all three sources, and Azure Monitor logs confirm successful authentication attempts from the internal subnet but show no connection attempts from the other two sources reaching the database server. The database administrator needs to implement a solution that provides individual source tracking for audit purposes, accommodates the partner's entire subnet range even though they currently connect from only three specific IP addresses, and maintains high availability for the mobile workforce who may scale up during peak service periods. Which firewall configuration approach should be implemented at the Azure Database for PostgreSQL server level?

More Secure networking questions
717 questions (total)