0
0
Azurecloud~20 mins

Azure Firewall for centralized security - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Azure Firewall Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
Architecture
intermediate
2:00remaining
Designing a Centralized Azure Firewall Architecture

You want to centralize network security for multiple Azure virtual networks (VNets) in your organization using Azure Firewall. Which architecture best supports this goal while minimizing management overhead?

ADeploy a single Azure Firewall in a dedicated hub VNet and use VNet peering or VPN Gateway to route traffic from spoke VNets through the firewall.
BDeploy one Azure Firewall in each VNet and manage them separately.
CUse Network Security Groups (NSGs) on each subnet instead of Azure Firewall for centralized control.
DDeploy Azure Firewall only in the on-premises network and route Azure traffic through it.
Attempts:
2 left
💡 Hint

Think about a hub-and-spoke model to centralize security controls.

Configuration
intermediate
2:00remaining
Azure Firewall Network Rule Configuration

You configure an Azure Firewall network rule to allow outbound HTTPS traffic to a specific IP range. Which of the following rule configurations correctly allows TCP traffic on port 443 to IP range 192.168.1.0/24?

AProtocol: UDP, Source IP: *, Destination IP: 192.168.1.0/24, Destination Ports: 443
BProtocol: TCP, Source IP: *, Destination IP: 192.168.1.0/24, Destination Ports: 443
CProtocol: TCP, Source IP: 192.168.1.0/24, Destination IP: *, Destination Ports: 443
DProtocol: TCP, Source IP: *, Destination IP: 192.168.1.0/24, Destination Ports: 80
Attempts:
2 left
💡 Hint

Remember HTTPS uses TCP port 443 and the destination IP should be the allowed range.

security
advanced
2:00remaining
Azure Firewall Threat Intelligence Mode Behavior

You enable Threat Intelligence-based filtering on Azure Firewall with the mode set to 'Alert'. What is the expected behavior when traffic matches a known malicious IP or domain?

AThe firewall blocks the traffic and logs an alert.
BThe firewall blocks the traffic without logging.
CThe firewall allows the traffic and logs an alert.
DThe firewall allows the traffic without logging.
Attempts:
2 left
💡 Hint

Consider what 'Alert' mode means for threat intelligence in Azure Firewall.

service_behavior
advanced
2:00remaining
Azure Firewall Logging and Monitoring

Which Azure service must you configure to collect and analyze Azure Firewall logs for traffic and threat intelligence alerts?

AAzure Monitor Logs (Log Analytics Workspace)
BAzure Security Center only
CAzure Active Directory
DAzure DevOps Pipelines
Attempts:
2 left
💡 Hint

Think about where logs are stored and analyzed in Azure.

Best Practice
expert
3:00remaining
Implementing High Availability for Azure Firewall

You want to ensure your Azure Firewall deployment is highly available and resilient to zone failures. Which configuration meets this requirement?

AUse Azure Load Balancer in front of a single Azure Firewall instance.
BDeploy multiple Azure Firewalls in different regions without zone redundancy.
CDeploy Azure Firewall in a single availability zone with zone redundancy disabled.
DDeploy Azure Firewall with zone redundancy enabled across multiple availability zones.
Attempts:
2 left
💡 Hint

Consider Azure Firewall's built-in zone redundancy feature.