Azure Networking Essentials: VNets, Subnets u0026 Peering Quiz Quiz

Deepen your understanding of Azure networking with this quiz focusing on virtual networks, subnets, and peering concepts. Ideal for learners aiming to grasp key networking components, secure network design, and connectivity strategies within cloud environments.

  1. VNets Basics

    Which component in Azure networking allows you to create logically isolated networks within the cloud platform?

    1. Virtual Network (VNet)
    2. Cloud Gateway
    3. Public DNS Zone
    4. Virtual Switch (vSwitch)

    Explanation: A Virtual Network (VNet) enables you to create private, logically isolated networks in the cloud. Virtual Switch (vSwitch) is a term more commonly used in virtualization platforms, not cloud networking. Public DNS Zone manages DNS records and does not provide network isolation. Cloud Gateway is related to connectivity, not the creation of isolated networks.

  2. Subnetting in Azure

    When you create a subnet inside a VNet, which of the following must you specify?

    1. A peering connection
    2. A security group name
    3. A unique address range within the VNet
    4. An internet gateway

    Explanation: Every subnet in a VNet must have a unique IP address range that falls within the VNet's address space. Assigning a security group is optional and handled separately. Peering connections are for linking VNets, not setting up subnets. An internet gateway is an external connectivity feature, not a subnet requirement.

  3. Default Routing

    If no custom routes are defined, how do virtual machines inside the same subnet communicate with each other?

    1. They communicate directly using the subnet's default route.
    2. They require an explicit internet gateway.
    3. They are isolated and cannot talk.
    4. They need peering to be configured.

    Explanation: By default, all resources within the same subnet can communicate with each other without extra configuration due to the default routing. No explicit internet gateway is necessary for internal subnet traffic. Peering is used between VNets, not for communication within a subnet. The statement about being isolated is incorrect in this context.

  4. Subnet Overlap

    Which scenario prevents successful VNet peering between two VNets?

    1. One VNet has multiple subnets.
    2. VNets use different DNS servers.
    3. Both VNets have overlapping address spaces.
    4. VNets are in different regions.

    Explanation: VNets with overlapping address spaces cannot be peered because address conflicts would occur, making routing ambiguous. Having multiple subnets in a VNet does not prevent peering. VNets in different regions can still be peered using global peering features. DNS server settings are independent of peering eligibility.

  5. Peering Traffic

    What happens to traffic between resources in peered VNets by default?

    1. Traffic is routed privately without traversing the public internet.
    2. Traffic must go through an external VPN appliance.
    3. Traffic is always encrypted by default.
    4. Traffic is dropped unless user-defined routes are added.

    Explanation: By default, VNet peering enables resources to communicate over a private network without routing data through the public internet. No external VPN appliance is needed for peering traffic. Traffic may not be encrypted by default unless encryption is explicitly enabled. User-defined routes are optional and not required for basic peering communication.

  6. Network Security Group Assignment

    Which two Azure resources can a network security group (NSG) be directly associated with?

    1. A routing table and a VM disk
    2. A public IP and a DNS zone
    3. A VNet and a cloud gateway
    4. A subnet and a network interface

    Explanation: A network security group (NSG) can be applied to subnets and network interfaces to control inbound and outbound traffic. A VNet and cloud gateway are high-level or connectivity resources, not direct targets for NSG association. Public IP, DNS zone, routing table, and VM disk are not valid for NSG assignment.

  7. Subnet Sizing

    If you define a subnet with the address range 10.0.0.0/29, how many usable IP addresses does it provide?

    1. 4
    2. 8
    3. 6
    4. 5

    Explanation: A /29 subnet provides 8 IP addresses, but 3 are reserved for network protocols, so only 5 can be used by resources. The option '8' is wrong because it overlooks reserved addresses. '6' and '4' do not properly calculate the available IPs after reservation.

  8. VNet-to-VNet Communication

    Which method allows private communication between two virtual networks in the same or different regions?

    1. VNet peering
    2. Load balancer frontend
    3. Public NAT gateway
    4. Blob endpoint

    Explanation: VNet peering is the designed method for enabling private connectivity between two VNets regardless of region. Public NAT gateways provide outbound internet access, not private connectivity. Load balancer frontends are for traffic distribution, not network joining. Blob endpoints relate to storage, not network communication.

  9. Subnet Purpose

    Why might you place front-end web servers and back-end database servers in separate subnets within a VNet?

    1. To reduce the VNet's address space
    2. To ensure faster data transfer between them
    3. To apply different security rules to each subnet
    4. To assign different DNS suffixes

    Explanation: Separating resources into subnets allows you to apply specific security policies using network security groups. Splitting subnets does not inherently increase data transfer speed. DNS suffix assignments are unrelated to subnetting decisions for security. Subdividing does not reduce the overall VNet address space.

  10. VNet Address Space

    Which CIDR block can be used as a valid address space when creating a new VNet?

    1. 250.10.0.0/16
    2. 10.1.0.0/16
    3. 192.168.500.0/24
    4. 172.32.0.0/8

    Explanation: 10.1.0.0/16 is a valid private address space as defined by RFC 1918. 250.10.0.0/16 is not a valid address range due to invalid octet values. 192.168.500.0/24 is incorrect because 500 exceeds the valid range for an octet (0-255). 172.32.0.0/8 is outside the designated private address range (172.16.0.0 - 172.31.255.255).