Create a Virtual Network with Scale Set and Public IP Addresses - Exam AZ-300 Microsoft Azure Architect Technologies

Create a Virtual Network with Scale Set and Public IP Addresses

Question

Note: This question is part of series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are planning to create a virtual network that has a scale set that contains six virtual machines (VMs).

A monitoring solution on a different network will need access to the VMs inside the scale set.

You need to define public access to the VMs.

Solution: Design a scale set to automatically assign public IP addresses to all VMs.

Does the solution meet the goal?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B.

B

The proposed solution to design a scale set to automatically assign public IP addresses to all VMs does meet the goal of allowing a monitoring solution on a different network to access the VMs inside the scale set.

When a public IP address is assigned to a virtual machine in a scale set, it allows the virtual machine to be accessed over the internet. This means that the monitoring solution on the different network will be able to access the VMs inside the scale set, as long as the appropriate network security group rules and firewall rules are configured to allow the traffic.

By automatically assigning public IP addresses to all VMs in the scale set, the solution eliminates the need for any manual configuration to enable public access. It also ensures that each VM in the scale set has a unique public IP address, which can simplify troubleshooting and management tasks.

However, it's important to note that enabling public access to VMs can also increase the security risks associated with the deployment. Therefore, it's important to implement additional security measures, such as network security group rules and firewalls, to protect the VMs from unauthorized access and potential security threats.