You manage an application that has a front-end tier, a middle tier, and a back-end tier. Each tier is located on a
different subnet.
You need to apply access to and between the tiers as follows:
Only the front-end tier must be able to access the Internet.
You must permit network access between the front-end tier and the middle tier.
You must permit network access between the middle tier and the back-end tier.
You must prevent all other network traffic.You need to apply this configuration to all virtual machines inside the subnets.
What should you do?

A.
Use a Network Security Group (NSG).
B.
Add a VPN gateway.
C.
Add a regional VNET.
D.
Add an Availability Set.
Explanation:
https://docs.microsoft.com/en-us/azure/virtual-machines/virtual-machines-windows-infrastructure-availabilitysets-guidelines
I think should be A.
2
0
I agree.
1
0
Availability sets are only for redundancy purposes . Right answer A
0
0
I agree
0
0
you agreed on what?
1
0
I think A is the correct answer
1
0
CORRECT ANSWER IS D-AVAILABILITY SETS. I DIG IN ALOT AND KINDLY READ THIS https://docs.microsoft.com/en-us/azure/virtual-machines/windows/infrastructure-example .
0
1
My bad! Correct answer is NSG https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-nsg
1
0
By the way, part of that new 243Q 70-533 dumps are available here:
https://drive.google.com/open?id=0B-ob6L_QjGLpfnV3MVl6X3pXOWw1Z3YtQUpJRVRiTkNkbGNFbVBNRXhjSkw3bWk1WHdYcW8
Best Regards!
2
0
A network security group (NSG) contains a list of security rules that allow or deny network traffic to resources connected to Azure Virtual Networks (VNet). NSGs can be associated to subnets, individual VMs (classic), or individual network interfaces (NIC) attached to VMs (Resource Manager). When an NSG is associated to a subnet, the rules apply to all resources connected to the subnet. Traffic can further be restricted by also associating an NSG to a VM or NIC.
1
0