exam questions

Exam NSE7_PBC-6.4 All Questions

View all questions & answers for the NSE7_PBC-6.4 exam

Exam NSE7_PBC-6.4 topic 1 question 10 discussion

Actual exam question from Fortinet's NSE7_PBC-6.4
Question #: 10
Topic #: 1
[All NSE7_PBC-6.4 Questions]

Which three properties are configurable Microsoft Azure network security group rule settings? (Choose three.)

  • A. Action
  • B. Sequence number
  • C. Source and destination IP ranges
  • D. Destination port ranges
  • E. Source port ranges
Show Suggested Answer Hide Answer
Suggested Answer: ADE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
charruco
2 years, 4 months ago
Selected Answer: ADE
C is incorrect because this answer is limited to "IP Ranges", the scope of "Source or destination" is: Any, or an individual IP address, classless inter-domain routing (CIDR) block (10.0.0.0/24, for example), service tag, or application security group. https://learn.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
upvoted 2 times
...
Boch_333
2 years, 5 months ago
Selected Answer: CDE
C is stating ranges, not multiple IP addresses. Azure allows this: "Source or destination: Any, or an individual IP address, classless inter-domain routing (CIDR) block (10.0.0.0/24, for example), service tag, or application security group [...] Fewer security rules are needed when you specify a range, a service tag, or application security group." As these three are all properties and not actions these are my favorites.
upvoted 1 times
...
huehuehuo
2 years, 6 months ago
ADE is idd correct, you can't specify ranges for src/dst IPs
upvoted 1 times
...
tachy_22
2 years, 9 months ago
ADE are correct https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview C is false --> "You can't specify multiple IP addresses and IP address ranges in network security groups created through the classic deployment model. " AllowVNetInBound Priority Source Source ports Destination Destination ports Protocol Access 65000 VirtualNetwork 0-65535 VirtualNetwork 0-65535 Any Allow
upvoted 1 times
...
kinge2
2 years, 9 months ago
Selected Answer: ACD
ACD are correct as per https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
upvoted 1 times
...
tachy_22
2 years, 9 months ago
ADE is correct
upvoted 1 times
...
Quch
2 years, 10 months ago
ADE is correct. If You try to add a new security rule "Action", "Source port ranges" and "Destination port ranges" properties are configurable. There is no such property as "Sequence number".
upvoted 2 times
...
abusdns
2 years, 10 months ago
Selected Answer: CDE
I think the correct answer es CDE, all of them are properties. For me the key here is the word "properties". Action is not a property.
upvoted 2 times
...
elgato01
2 years, 10 months ago
Selected Answer: ADE
Under "Default security rules" we read source, destination, source port, destination port and access. However under "Security rules" we read action, port ranges and source and destination, and essentially Options A, C, D and E are valid are those parameters can be configured. I would mark A D and E and source/destination port are to be seen in the table, maybe old documentation. https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
upvoted 2 times
...
LJCF
2 years, 11 months ago
Selected Answer: ACD
The correct is: A, C, D As show in the link: https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago