45.  Testlet 2 
Case Study
To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. 
At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. 
To start the case study
Overview
Existing Environment
Contoso.com contains the security groups shown in the following table. 
Sub1
Sub1 contains the locks shown in the following table. 
Sub1 contains the Azure policies shown in the following table. 
Sub2
Sub2 contains the virtual machines shown in the following table. 
All virtual machines have public IP addresses and the Web Server (IIS) role installed. The firewalls for each virtual machine allow ping requests and web requests. 
Sub2 contains the network security groups (NSGs) shown in the following table. 
NSG1 has the inbound security rules shown in the following table. 
NSG2 has the inbound security rules shown in the following table. 
NSG3 has the inbound security rules shown in the following table. 
NSG4 has the inbound security rules shown in the following table. 
NSG1, NSG2, NSG3, and NSG4 have the outbound security rules shown in the following table. 
Technical requirements
HOTSPOT