You have two Azure Virtual Networks (VNets). VNet A has the address space 10.0.0.0/16. VNet B has the address space 10.0.1.0/24. What will happen if you try to peer these two VNets?
Think about whether overlapping IP ranges are allowed in VNet peering.
Azure does not allow peering between VNets that have overlapping IP address spaces. Since 10.0.1.0/24 is within 10.0.0.0/16, the address spaces overlap, so peering will fail.
You want to create a new Azure VNet in a subscription that already has a VNet with address space 192.168.0.0/24. Which of the following address spaces can you assign to the new VNet without causing conflicts?
Check if the new address space overlaps with the existing 192.168.0.0/24 range.
192.168.1.0/24 does not overlap with 192.168.0.0/24, so it is a valid choice. The other options overlap with the existing VNet's address space.
You are designing VNets for a multi-region Azure deployment. You want to avoid address space conflicts and allow future peering between VNets. Which approach is best for assigning address spaces?
Think about how to avoid conflicts and enable peering in the future.
Assigning non-overlapping, contiguous CIDR blocks per region avoids conflicts and allows easy peering and routing between VNets.
You have two VNets with overlapping address spaces that are connected via VPN Gateway. What is a likely security risk in this scenario?
Consider what happens when IP addresses overlap in different networks.
Overlapping address spaces can cause routing confusion, leading to traffic being sent to unintended destinations, which is a security risk.
You create an Azure VNet and assign two address spaces: 10.0.0.0/16 and 10.1.0.0/24. You then create a subnet with address range 10.1.0.0/25. What is the behavior of this subnet within the VNet?
Think about how VNets support multiple address spaces and subnet creation.
Azure VNets can have multiple address spaces. Subnets can be created from any of these address spaces as long as they do not overlap with other subnets.