0
0
Azurecloud~10 mins

Azure Firewall for centralized security - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to create an Azure Firewall resource in a resource group.

Azure
az network firewall create --name myFirewall --resource-group [1] --location eastus
Drag options to blanks, or click blank then click option'
AmyResourceGroup
BcentralRG
CfirewallRG
Deastus
Attempts:
3 left
💡 Hint
Common Mistakes
Using the location name instead of the resource group name.
Confusing resource group with location.
2fill in blank
medium

Complete the code to create a firewall policy named 'centralPolicy'.

Azure
az network firewall policy create --name [1] --resource-group centralRG
Drag options to blanks, or click blank then click option'
AcentralPolicy
BfirewallPolicy
CpolicyCentral
DdefaultPolicy
Attempts:
3 left
💡 Hint
Common Mistakes
Using a generic or default name instead of the specified one.
Mixing up policy names.
3fill in blank
hard

Fix the error in the command to associate the firewall policy with the firewall.

Azure
az network firewall update --name myFirewall --resource-group centralRG --[1] centralPolicy
Drag options to blanks, or click blank then click option'
Apolicy-id
Bpolicy
Cfirewall-policy
DfirewallPolicy
Attempts:
3 left
💡 Hint
Common Mistakes
Using incorrect parameter names like 'policy' or 'policy-id'.
Missing hyphens in the parameter name.
4fill in blank
hard

Fill both blanks to create a network rule collection that allows HTTP traffic.

Azure
az network firewall network-rule collection create --firewall-name myFirewall --resource-group centralRG --name AllowHTTP --priority 100 --action Allow --rule-name [1] --protocols [2] --source-addresses '*' --destination-ports 80 --destination-addresses '*'
Drag options to blanks, or click blank then click option'
AAllowHTTPRule
BDenyHTTPRule
CTCP
DUDP
Attempts:
3 left
💡 Hint
Common Mistakes
Using a deny rule name when the action is Allow.
Choosing UDP protocol for HTTP traffic.
5fill in blank
hard

Fill all three blanks to create an application rule collection allowing access to example.com.

Azure
az network firewall application-rule collection create --firewall-name myFirewall --resource-group centralRG --name AllowWeb --priority 200 --action Allow --rule-name [1] --protocols [2] --target-fqdns [3] --source-addresses '*'
Drag options to blanks, or click blank then click option'
AAllowExampleRule
BHttp=80
Cexample.com
DHttps=443
Attempts:
3 left
💡 Hint
Common Mistakes
Using HTTP protocol instead of HTTPS for secure sites.
Incorrect or missing target domain.