New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft AZ-700 Exam - Topic 6 Question 9 Discussion

Actual exam question for Microsoft's AZ-700 exam
Question #: 9
Topic #: 6
[All AZ-700 Questions]

You have an Azure application gateway named AGW1 that has a routing rule named Rule1. Rule 1 directs traffic for http://www.contoso.com to a backend pool named Pool1. Pool1 targets an Azure virtual machine scale set named VMSS1.

You deploy another virtual machine scale set named VMSS2.

Which three actions should you perform? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point.

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Eladia
4 months ago
Not sure about that, seems like you might need more than just a listener.
upvoted 0 times
...
Meghan
4 months ago
Wait, can you really just add a rule without any other changes?
upvoted 0 times
...
Anastacia
4 months ago
Adding a listener sounds like a good idea too!
upvoted 0 times
...
Vernell
5 months ago
I think modifying an HTTP setting is also necessary.
upvoted 0 times
...
Cherrie
5 months ago
You definitely need to add a backend pool for VMSS2.
upvoted 0 times
...
My
5 months ago
I feel like we should definitely add a rule to direct traffic to VMSS2, but I’m not confident about the other options.
upvoted 0 times
...
Lyda
5 months ago
Adding a listener sounds like it could be important, but I can't recall if it's necessary for this specific scenario.
upvoted 0 times
...
Arleen
5 months ago
I remember practicing a question similar to this where we had to modify HTTP settings. That might be relevant here too.
upvoted 0 times
...
Kenneth
5 months ago
I think we might need to add a backend pool for VMSS2, but I'm not entirely sure if that's the only step we need.
upvoted 0 times
...
Carman
5 months ago
Hmm, I'm a bit unsure about this one. I'll have to think it through carefully and review the material again.
upvoted 0 times
...
Precious
5 months ago
The record retention requirements were mentioned in a different context during our last review. I don't think they are enough on their own for a complete compliance program, though.
upvoted 0 times
...
Nancey
5 months ago
Wait, what do those letters and symbols mean again? I'm a bit confused on file permissions.
upvoted 0 times
...
Trina
5 months ago
I want to say that attackers use encryption to hide their tracks, which sounds like what option B is saying. But does that really affect security monitoring?
upvoted 0 times
...

Save Cancel