AZ-900 Microsoft Azure Fundamentals Exam
Start here! Get your feet wet with the Microsoft cloud and begin your journey to earning your Microsoft Certified: Azure Fundamentals certification!
Practice Test

Practice Test

Describe virtual networking, including the purpose of Azure virtualnetworks, Azure virtual subnets, peering, Azure DNS, Azure VPNGateway, and ExpressRoute
Evaluate Azure VPN Gateway and ExpressRoute
Azure VPN Gateway and ExpressRoute are two key services that provide connectivity between on-premises networks and Azure, but they differ significantly in how they achieve this. VPN Gateway uses the public internet to create encrypted tunnels, while ExpressRoute provides a private, dedicated connection. Understanding their differences is crucial for choosing the right solution for specific scenarios.
Azure VPN Gateway allows you to establish secure connections between your on-premises network and your Azure virtual networks (VNets) over the internet. It uses encrypted tunnels to protect data in transit. There are two main types of VPN connections:
- Site-to-site VPN: Connects your entire on-premises network to an Azure VNet, suitable for organizations with established infrastructure.
- Point-to-site VPN: Connects individual devices to an Azure VNet, ideal for remote workers or developers. VPN Gateway is a cost-effective solution for smaller deployments or when a dedicated connection is not required. It is also useful for creating a secure failover path for ExpressRoute.
Azure ExpressRoute provides a private, dedicated connection between your on-premises network and Azure, bypassing the public internet. This connection is established through an ExpressRoute partner and offers several advantages:
- Higher Security: Data does not travel over the public internet, reducing the risk of interception.
- Reliability: Provides a more stable and consistent connection compared to internet-based VPNs.
- Lower Latency: Offers faster speeds and lower latency, which is critical for applications that require real-time data transfer.
- Higher Bandwidth: Supports higher bandwidth options, suitable for large data transfers and demanding applications. ExpressRoute is ideal for organizations that require high performance, reliability, and security for their cloud connectivity.
The choice between VPN Gateway and ExpressRoute depends on your specific needs:
- VPN Gateway is suitable for:
- Development and testing environments.
- Small to medium-scale production workloads.
- Remote access for individual users.
- Scenarios where cost is a primary concern.
- ExpressRoute is suitable for:
- Large-scale production environments.
- Applications that require high bandwidth and low latency.
- Organizations with strict security and compliance requirements.
- Hybrid cloud scenarios where consistent and reliable connectivity is essential.
In summary, Azure VPN Gateway offers a flexible and cost-effective solution for connecting to Azure over the internet, while ExpressRoute provides a private, dedicated connection for higher performance and security. The best choice depends on your organization's specific requirements, including budget, performance needs, and security considerations. Understanding these differences is key to designing an effective and efficient cloud infrastructure.
Examine Azure Virtual Subnets
Azure Virtual Networks (VNets) allow you to create your own private network in the cloud. Within these VNets, you can create subnets, which are smaller, segmented networks. Think of a VNet as a large office building, and subnets as the individual departments within that building. Each subnet is a range of IP addresses within the VNet, and they help you organize and secure your network resources.
Subnets are essential for organizing network traffic within Azure. By dividing a VNet into subnets, you can isolate resources and apply different security rules to each subnet. For example, you might have one subnet for your web servers and another for your database servers. This separation helps to control the flow of traffic and protect sensitive data. Subnets are a fundamental component of network design in Azure.
When you create a subnet, you specify an IP address range. This range determines how many resources can be placed in that subnet. It's important to plan your subnets carefully to ensure you have enough IP addresses for your resources. You can also configure network security groups (NSGs) to control inbound and outbound traffic for each subnet, adding an extra layer of security.
Subnets also play a crucial role in connecting to other networks. You can use peering to connect VNets together, allowing resources in different VNets to communicate with each other. Additionally, you can use services like Azure VPN Gateway or ExpressRoute to connect your on-premises network to your Azure VNet, extending your network into the cloud. These connections often involve specific subnets for gateway resources.
In summary, Azure Virtual Subnets are a key component of Azure networking. They allow you to segment your network, control traffic, and connect to other networks. Understanding how to use subnets effectively is essential for building secure and scalable applications in Azure.
Explore Azure DNS
Azure DNS is a service that provides domain name resolution using Microsoft's Azure infrastructure. It's essential for translating human-readable domain names into IP addresses that computers use to communicate. Azure DNS offers three main services: Azure Public DNS, Azure Private DNS, and Azure DNS Private Resolver. These services help manage and resolve domain names for both public and private resources.
Azure Public DNS is a hosting service for DNS domains. By using this service, you can manage your DNS records with the same credentials, APIs, tools, and billing methods as your other Azure services. This makes it easier to manage your public-facing domain names and ensure they are correctly resolved to your Azure resources. This service is crucial for making your websites and applications accessible to users on the internet.
Azure Private DNS is a DNS service specifically for your virtual networks (VNets). It manages and resolves domain names within your VNet without needing a custom DNS solution. This service is important for internal communication between resources within your Azure environment. It allows you to use friendly names to access your resources instead of IP addresses, simplifying management and improving readability.
Azure DNS Private Resolver enables you to query Azure DNS private zones from an on-premises environment and vice versa. This service allows for name resolution between your on-premises resources and your Azure resources without the need to deploy VM-based DNS servers. This is particularly useful for hybrid cloud scenarios where you need seamless name resolution across your on-premises and Azure environments.
In summary, Azure DNS is a critical component for managing domain names and ensuring proper name resolution within Azure. It provides services for both public and private domains, as well as hybrid environments, making it a versatile and essential tool for any Azure deployment. By using Azure DNS, you can simplify the management of your resources and ensure they are accessible to users and other resources as needed.
Understand Azure Virtual Networks
Azure Virtual Networks (VNets) are fundamental to creating private networks within Azure. They allow you to establish an isolated and secure environment for your Azure resources, similar to a traditional on-premises network. VNets enable resources like virtual machines, databases, and other services to communicate with each other securely. This isolation is crucial for maintaining the security and integrity of your cloud infrastructure.
Within a VNet, you can create subnets, which are smaller, logical divisions of the network. Subnets allow you to further organize and manage your resources, applying specific security rules and access controls to each subnet. For example, you might have one subnet for web servers and another for database servers, each with its own set of security policies. This segmentation enhances security and simplifies management.
Virtual network peering enables you to connect two or more VNets together, allowing resources in different VNets to communicate with each other as if they were on the same network. This is useful for creating complex network topologies and sharing resources across different environments. Peering connections are non-transitive, meaning if VNet A is peered with VNet B, and VNet B is peered with VNet C, VNet A and VNet C are not automatically peered.
Azure DNS provides name resolution services for resources within your VNets. It allows you to use custom domain names for your Azure resources, making it easier to manage and access them. You can also integrate Azure DNS with your on-premises DNS infrastructure for seamless name resolution across your hybrid environment.
Azure VPN Gateway allows you to create secure, encrypted connections between your Azure VNets and your on-premises networks. This enables you to extend your on-premises infrastructure into Azure, creating a hybrid cloud environment. VPN Gateways use the public internet to establish these connections.
ExpressRoute provides a dedicated, private connection between your on-premises network and Azure. Unlike VPN Gateways, ExpressRoute connections do not use the public internet, offering higher bandwidth, lower latency, and more reliable connectivity. This is ideal for organizations that require consistent and high-performance connections to Azure.
Analyze VNet Peering
VNet peering enables you to connect two or more virtual networks in Azure, allowing resources in different VNets to communicate with each other as if they were in the same network. This connection is established through the Azure backbone network, providing low-latency and high-bandwidth connectivity. It's important to note that VNet peering is not transitive, meaning if VNetA is peered with VNetB, and VNetB is peered with VNetC, VNetA and VNetC are not automatically peered; you must manually peer them.
There are two types of VNet peering: regional peering and global peering. Regional peering connects VNets within the same Azure region, while global peering connects VNets across different Azure regions. Both types of peering offer the same benefits of low-latency and high-bandwidth connectivity. There are no bandwidth limitations imposed by VNet peering itself; bandwidth is only limited by the VM or compute resource.
When setting up VNet peering, it's crucial to understand that there is no charge for creating the peering connection itself. However, data transfer across peering connections is charged. Also, if a peering connection is in a "Disconnected" state, it means one of the peering links has been deleted, and both links must be deleted to re-establish a successful connection.
VNet peering traffic is encrypted at the data-link layer using MACsec when it moves between datacenters outside of Microsoft's physical control. This ensures the security of data transmitted between peered VNets. It is important to note that you cannot move a virtual network that has a peering connection to another virtual network without first deleting the peering connection.
Troubleshooting issues with VNet peering can be done using the Azure troubleshooting guide. This guide can help identify and resolve common problems that may arise during the setup or operation of peered virtual networks.
In summary, VNet peering is a powerful tool for connecting virtual networks in Azure, providing secure, low-latency, and high-bandwidth communication. Understanding its limitations, such as non-transitive nature and the need to delete both links to re-establish a connection, is essential for effective use.
Conclusion
This section covered key aspects of Azure virtual networking, including Azure VPN Gateway and ExpressRoute for secure connectivity, Azure Virtual Subnets for network segmentation, Azure DNS for domain name resolution, Azure Virtual Networks (VNets) for creating isolated environments, and VNet peering for connecting virtual networks. Understanding these components is crucial for building secure, scalable, and efficient cloud infrastructures in Azure. Each service plays a vital role in enabling communication, security, and management of resources within the Azure environment.