Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Microsoft Certified: Azure Network Engineer Associate AZ-700 Questions and answers with Dumpstech

Exam AZ-700 Premium Access

View all detail and faqs for the AZ-700 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

You ate configuring the DNS forwarding luleset for DNSR1

You need to configure the destination IP address for azure.proseware.com and for corp.proseware.com. The solution must meet the general requirements.

Which IP addiesses should you configure for each namespace? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 61

Options:

Questions # 62:

You need to identify which IP address space to allocate for the planned deployment of PRDNS1 to HubVNet and SpokeVNet. The solution must meet the general requirements

What should you identify for each virtual network? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.

Question # 62

Options:

Questions # 63:

You need to configure APPGW1 to support end-to-end encryption. The solution must meet the security requirements. What should you do?

Options:

A.

From the SSL settings, upload a TLS client certificate that is issued by the internal root CA and includes the full certificate chain.

B.

From the Backend settings, upload a wildcard TLS certificate that has a private key issued by the internal root CA

C.

From the Backend settings, upload the internal root CA certificate.

D.

From the SSL settings, upload a TLS client certificate that is issued by the internal root CA.

Questions # 64:

You need to configure the P2S VPN to meet the connectivity requirements.

What should you do? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 64

Options:

Questions # 65:

You need to configure FD1 to provide user access to app2.proseware.com. The solution must meet the security requirements and the general requirements.

What should you do first?

Options:

A.

Add a custom domain to FD1.

B.

Add a security policy to FD1.

C.

Request a certificate from a trusted root CA.

D.

Export the TLS certificate and the private key from App2.

Questions # 66:

You need to configure a custom rule for APPGWI-WAFPolicy to allow only connections that originate from FD1. The solution must support the planned changes.

Which Match type and Match variable should you select?

Options:

A.

String and RequestCookies

B.

IP address and RemoteAddr

C.

String and RequestHeaders

D.

Geo location and RemoteAddr

Questions # 67:

You need to deploy Azure Virtual Network Manager. The solution must support the planned changes and meet the connectivity requirements.

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Question # 67

Options:

Questions # 68:

You need to configure a security rule for APPGW1-NSG1. The solution must support the planned changes. Which service tag should you use?

Options:

A.

AzureFrontDoor.FirstParty

B.

AzureFrontDoor.Infra

C.

AzureFrontDoor.Backend

D.

AzureFrontDoor.Frontend

Questions # 69:

You have an Azure subscription

You plan to use Azure Virtual WAN.

You need to deploy a virtual WAN hub that meets the following requirements:

• Supports 4 Gbps of Site-to-Site (S2S) VPN traffic

• Supports 8 Gbps of ExpressRoute traffic

• Minimizes costs

How many scale units should you configure? To answer select the appropriate options in the answer area.

NOTE Each correct selection is worth one point.

Question # 69

Options:

Questions # 70:

You have an Azure subscription that contains an Azure Firewall policy named FWPolicy1. You need to configure FWPolicy1 to meet the following requirements

• Allow traffic based on the FQDN of the destination.

• Allow TCP traffic based on the source.

Which types of rules should you use for each requirement? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.

Question # 70

Options:

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions