Chapter 2 - Networking: VPC, ELB, API Gateway, AWS App Mesh, Direct Connect, Private Link, Global Accelerator, Transit Gateway, VPN Flashcards
What are the characteristics of VPC security groups? Choose 3.
- You can specify allow rules, but not deny rules.
- You can specify separate rules for inbound and outbound traffic.
- You can specify deny rules, but not allow rules.
- When you create a security group, it has no inbound rules.
- When you create a security group, it has no outbound rules.
- You can specify allow rules, but not deny rules.
- You can specify separate rules for inbound and outbound traffic.
- You can specify deny rules, but not allow rules.
- When you create a security group, it has no inbound rules.
- When you create a security group, it has no outbound rules.
Which of the following statements are true for security groups? Choose 3.
- Security groups are stateful.
- Security groups are stateless.
- If you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules.
- Responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules.
- Security groups are stateful.
- Security groups are stateless.
- If you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules.
- Responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules.
Which of the following statements are true for default security group? Choose 3.
- If you don’t specify a security group when you launch an instance, the instance is automatically associated with the default security group for the VPC.
- Allows all inbound traffic from outside world.
- Allows all inbound traffic from other instances associated with the default security group.
- Allows all outbound traffic from the instance.
- Denys all outbound traffic from the instance.
- If you don’t specify a security group when you launch an instance, the instance is automatically associated with the default security group for the VPC.
- Allows all inbound traffic from outside world.
- Allows all inbound traffic from other instances associated with the default security group.
- Allows all outbound traffic from the instance.
- Denys all outbound traffic from the instance.
What are the default rules of a new security group? Choose 2.
- Allows inbound traffic
- Denys outbound traffic
- Allows no inbound traffic
- Allows all outbound traffic
- Allows inbound traffic
- Denys outbound traffic
- Allows no inbound traffic
- Allows all outbound traffic
You want to create a public-facing web server to host a blog. You are planning to place the Linux EC2 web server in a VPC with a subnet having an IPv4 CIDR block. You also want to access the EC2 instance form your laptop. Which of the following steps are applicable? Choose 4.
- Create a nondefault VPC with a single public subnet and internet gateway.
- Attach route tables to the VPC which allows traffic to flow from the subnet to the Internet gateway.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http, Https and access from your home network address.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http. Https.
- Launch an Amazon EC2 instance into your subnet and associate an Elastic IP address with your instance.
- Create a nondefault VPC with a single public subnet and internet gateway.
- Attach route tables to the VPC which allows traffic to flow from the subnet to the Internet gateway.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http, Https and access from your home network address.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http. Https.
- Launch an Amazon EC2 instance into your subnet and associate an Elastic IP address with your instance.
Which of the following statements are true regarding VPC and subnets? Choose 2.
- A VPC spans all the Availability Zones in the region.
- Each subnet must reside entirely within one Availability Zone and cannot span zones.
- Each subnet can span more than one availability zones.
- A VPC needs to be mapped to availability zones in a region.
- A VPC spans all the Availability Zones in the region.
- Each subnet must reside entirely within one Availability Zone and cannot span zones.
- Each subnet can span more than one availability zones.
- A VPC needs to be mapped to availability zones in a region.
There are three subnets 1A, 2A, and 3A each with one EC2 instance. The figure above depicts the ip address of VPC, subnet and instances. The route tables attached to three subnets are also depicted on the right side of figure. Q7. Which subnet in the figure above is a public subnet?
- 1A
- 2A
- 3A
- None of the above
- 1A
- 2A
- 3A
- None of the above
Which subnet in the figure above is a private subnet?
- 1A
- 2A
- 3A
- None of the above
- 1A
- 2A
- 3A
- None of the above
Which subnet in the figure above is a vpn-only subnet?
- 1A
- 2A
- 3A
- None of the above
- 1A
- 2A
- 3A
- None of the above
Which of the following statements are correct regarding CIDR block range of a VPC subnet? Choose 2.
- The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be a subset of the CIDR block for the VPC (for multiple subnets).
- The CIDR block of a subnet can be a subset of the CIDR block for the VPC (for multiple subnets).
- The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be a subset of the CIDR block for the VPC (for multiple subnets).
- The CIDR block of a subnet can be a subset of the CIDR block for the VPC (for multiple subnets).
Which of the following statements are correct regarding IPv4 CIDR block range of a VPC subnet? Choose 2.
- The allowed block size is between a min: /28 netmask and max: /16 netmask.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets cannot overlap.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets can overlap.
- The allowed block size is between a min: /16 netmask and max: /28 netmask.
- The allowed block size is between a min: /28 netmask and max: /16 netmask.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets cannot overlap.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets can overlap.
- The allowed block size is between a min: /16 netmask and max: /28 netmask.
How many IP addresses in each subnet CIDR block are not available for you to use, and cannot be assigned to an instance?
- 2
- 3
- 4
- 5
- 2
- 3
- 4
- 5
Which of the following rules apply when you add IPv4 CIDR blocks to a VPC that’s part of a VPC peering connection? Choose 3
- If the VPC peering connection is active, you can add CIDR blocks to a VPC provided they do not overlap with a CIDR block of the peer VPC.
- If the VPC peering connection is pending-acceptance, the owner of the requester VPC cannot add any CIDR block to the VPC, regardless of whether it overlaps with the CIDR block of the accepter VPC. Either the owner of the accepter VPC must accept the peering connection, or the owner of the requester VPC must delete the VPC peering connection request, add the CIDR block, and then request a new VPC peering connection.
- If the VPC peering connection is pending-acceptance, the owner of the accepter VPC can add CIDR blocks to the VPC. If a secondary CIDR block overlaps with a CIDR block of the requester VPC, the VPC peering connection request fails and cannot be accepted.
- If the VPC peering connection is active, you can add CIDR blocks to a VPC which overlap with a CIDR block of the peer VPC.
- If the VPC peering connection is active, you can add CIDR blocks to a VPC provided they do not overlap with a CIDR block of the peer VPC.
- If the VPC peering connection is pending-acceptance, the owner of the requester VPC cannot add any CIDR block to the VPC, regardless of whether it overlaps with the CIDR block of the accepter VPC. Either the owner of the accepter VPC must accept the peering connection, or the owner of the requester VPC must delete the VPC peering connection request, add the CIDR block, and then request a new VPC peering connection.
- If the VPC peering connection is pending-acceptance, the owner of the accepter VPC can add CIDR blocks to the VPC. If a secondary CIDR block overlaps with a CIDR block of the requester VPC, the VPC peering connection request fails and cannot be accepted.
- If the VPC peering connection is active, you can add CIDR blocks to a VPC which overlap with a CIDR block of the peer VPC.
Which subnet security feature is extra layer of security and can be optional?
- Security Groups
- Network ACLs
- Routing Table
- Internet Gateway
- Security Groups
- Network ACLs
- Routing Table
- Internet Gateway
You have created a VPC, Subnet, Instances as below:
A VPC with CIDR block 10.0.0.0/16
A subnet in that VPC with CIDR block 10.0.1.0/24
Instances running in that subnet with IP addresses 10.0.1.6 and 10.0.1.7
On-premises host networks using CIDR blocks 10.0.30.0/24 and 10.1.31.0/24
You have appropriately configured their security group settings so that inbound and outbound connection can be made between the VPC and your on-premise network. However when those instances in the VPC try to talk to hosts in the 10.0.30.0/24 address space in your corporate network, the traffic is dropped but they can talk to the instances in 10.1.31.0/24 address space? What could be the reason? Choose 2.
- You have to also configure the Network ACL for communication between VPC and your corporate address space.
- Your VPC address space 10.0.0.0/16 overlaps with one of your on-premise networks’ prefixes 10.0.30.0/24, so the traffic to the network’s prefix is dropped.
- Your VPC instances can talk to hosts in the 10.1.31.0/24 space because that block isn’t part of 10.0.0.0/16.
- You have not enabled flow logs.
- You have to also configure the Network ACL for communication between VPC and your corporate address space.
- Your VPC address space 10.0.0.0/16 overlaps with one of your on-premise networks’ prefixes 10.0.30.0/24, so the traffic to the network’s prefix is dropped.
- Your VPC instances can talk to hosts in the 10.1.31.0/24 space because that block isn’t part of 10.0.0.0/16.
- You have not enabled flow logs.
Which of the following statements are correct about default VPC and default subnet? Choose 3.
- A default subnet is a private subnet.
- A default subnet is a public subnet.
- Instances that you launch into a default subnet receive both a public IPv4 address and a private IPv4 address, and both public and private DNS hostnames.
- A default security group is associated with your default VPC.
- A default subnet is a private subnet.
- A default subnet is a public subnet.
- Instances that you launch into a default subnet receive both a public IPv4 address and a private IPv4 address, and both public and private DNS hostnames.
- A default security group is associated with your default VPC.
By default, Amazon EC2 and Amazon VPC use which addressing protocol?
- IPv6
- TCP
- IPv4
- UDP
- IPv6
- TCP
- IPv4
- UDP
It is necessary to associate an IPv6 CIDR block with your VPC?
- True
- False
- True
- False
When you assign both IPv4 and IPv6 CIDR block to your VPC, which of the following statements are correct? Choose 2.
- Your VPC resources can communicate over IPv6 only.
- Your VPC resources can communicate over IPv4, or IPv6, or both.
- IPv4 and IPv6 addresses are independent of each other; you must configure routing and security in your VPC separately for IPv4 and IPv6.
- You must configure routing and security in your VPC only for IPv6.
- Your VPC resources can communicate over IPv6 only.
- Your VPC resources can communicate over IPv4, or IPv6, or both.
- IPv4 and IPv6 addresses are independent of each other; you must configure routing and security in your VPC separately for IPv4 and IPv6.
- You must configure routing and security in your VPC only for IPv6.
What are the values you can configure within a DHCP option set for a VPC? Choose 3.
- Domain-name-servers and Domain-name
- Static Public IP address
- ntp-servers and netbios-name-servers
- netbios-node-type
- Domain-name-servers and Domain-name
- Static Public IP address
- ntp-servers and netbios-name-servers
- netbios-node-type
How can you ensure that a network interface created in the subnet automatically receives a public IPv4 address? Choose 2
- Modifying the public IP addressing attribute of your VPC.
- Modifying the public IP addressing attribute of your AZ.
- Modifying the public IP addressing attribute of your subnet.
- Enabling or disabling the public IP addressing feature during instance launch, which overrides the subnet’s public IP addressing attribute.
- Modifying the public IP addressing attribute of your VPC.
- Modifying the public IP addressing attribute of your AZ.
- Modifying the public IP addressing attribute of your subnet.
- Enabling or disabling the public IP addressing feature during instance launch, which overrides the subnet’s public IP addressing attribute.
Which are the features provided by Amazon Virtual Private Cloud that you can use to increase and monitor the security for your virtual private cloud (VPC)? Choose 3.
- Security groups
- Network access control lists (ACLs)
- Flow logs
- Cloudwatch
- Security groups
- Network access control lists (ACLs)
- Flow logs
- Cloudwatch
Which of the following statements are true regarding security groups (SG) and network ACLs? Choose 2.
- SG operates at instance level and network ACLs operates at subnet level.
- SG supports allow rules only and network ACLs support allow and deny rules.
- Network ACLs operates at instance level and SG operates at subnet level.
- Network ACLs supports allow rules only and SG support allow and deny rules.
- SG operates at instance level and network ACLs operates at subnet level.
- SG supports allow rules only and network ACLs support allow and deny rules.
- Network ACLs operates at instance level and SG operates at subnet level.
- Network ACLs supports allow rules only and SG support allow and deny rules.
You have ensured that an instance interface created in the subnet automatically receives a public IPv4 address by modifying the public IP addressing attribute of your subnet and enabling the public IP addressing feature during instance launch. How can you ensure that instances launched in the VPC receive public DNS hostnames that correspond to their public IP addresses and DNS resolution through the Amazon DNS server is supported for the VPC?
- You don’t need to do anything, DNS hostnames are automatically provided by AWS once an instance gets a public ip address.
- Set VPC attribute enableDnsHostnames and enableDnsSupport to true.
- Set only VPC attribute to enableDnsHostnames true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.
- Set only VPC attribute to enableDnsSupport true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.
- You don’t need to do anything, DNS hostnames are automatically provided by AWS once an instance gets a public ip address.
- Set VPC attribute enableDnsHostnames and enableDnsSupport to true.
- Set only VPC attribute to enableDnsHostnames true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.
- Set only VPC attribute to enableDnsSupport true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.
You have a web server running on 5 EC2 instances in one subnet of your VPC. You add another EC2 instance to the subnet having same security group. After adding the new instance you made changes to the security group. How long will it take for the changes to take effect?
- Immediately only for newest one instance and after 5 minutes for existing 5 instances.
- Immediately for all six instances.
- Immediately only for existing 5 instance and after 5 minutes for new instance.
- After 5 minutes for all the six instances.
- Immediately only for newest one instance and after 5 minutes for existing 5 instances.
- Immediately for all six instances.
- Immediately only for existing 5 instance and after 5 minutes for new instance.
- After 5 minutes for all the six instances.
Which of the following statements are true regarding security groups (SG) and network ACLs? Choose 2.
- Network ACLs is stateful: Return traffic is automatically allowed, regardless of any rules.
- SG is stateful: Return traffic is automatically allowed, regardless of any rules.
- Network ACLs is stateless: Return traffic must be explicitly allowed by rules
- SG is stateless: Return traffic must be explicitly allowed by rules
- Network ACLs is stateful: Return traffic is automatically allowed, regardless of any rules.
- SG is stateful: Return traffic is automatically allowed, regardless of any rules.
- Network ACLs is stateless: Return traffic must be explicitly allowed by rules
- SG is stateless: Return traffic must be explicitly allowed by rules
How many security groups you can attach to an instance?
- One
- Three
- Five
- Two
- One
- Three
- Five
- Two
You have instance A1 in subnet S1 and instance A2 in subnet S2 in a VPC. Both of them are attached to same custom security group called MyWebDMZ. How can you ensure that both the instance can talk to each other?
- Instances associated with a security group can’t talk to each other unless you add rules allowing it in the security group.
- Instances associated with same security group can’t talk to each other.
- Instances have to be in the same subnet to talk with each other.
- Instances associated with a security group can’t talk to each other unless you add rules allowing it in the network ACLs.
- Instances associated with a security group can’t talk to each other unless you add rules allowing it in the security group.
- Instances associated with same security group can’t talk to each other.
- Instances have to be in the same subnet to talk with each other.
- Instances associated with a security group can’t talk to each other unless you add rules allowing it in the network ACLs.
Your VPC automatically comes with a modifiable default network ACL. Which of the following statements is true?
- It allows all inbound and outbound IPv4 traffic.
- It doesn’t Allow inbound but allows all outbound traffic.
- It doesn’t allow outbound but allows all inbound.
- It denies all inbound and outbound traffic until you add rules.
- It allows all inbound and outbound IPv4 traffic.
- It doesn’t Allow inbound but allows all outbound traffic.
- It doesn’t allow outbound but allows all inbound.
- It denies all inbound and outbound traffic until you add rules.
You can create a custom network ACL and associate it with a subnet. Which of the following statements is true?
- It allows all inbound and outbound IPv4 traffic.
- It doesn’t allow inbound but allows all outbound traffic.
- It doesn’t allow outbound but allows all inbound.
- It denies all inbound and outbound traffic until you add rules.
- It allows all inbound and outbound IPv4 traffic.
- It doesn’t allow inbound but allows all outbound traffic.
- It doesn’t allow outbound but allows all inbound.
- It denies all inbound and outbound traffic until you add rules.
Which of the following statements are correct about network ACL mapping to subnet? Choose 2.
- Each subnet in your VPC must be associated with a network ACL.
- It is optional to associate a subnet with network ACL.
- If you don’t explicitly associate a subnet with a network ACL, the subnet is automatically associated with the default network ACL.
- Each subnet in your VPC must be associated with a custom security group and custom network ACL.
- Each subnet in your VPC must be associated with a network ACL.
- It is optional to associate a subnet with network ACL.
- If you don’t explicitly associate a subnet with a network ACL, the subnet is automatically associated with the default network ACL.
- Each subnet in your VPC must be associated with a custom security group and custom network ACL.
How many network ACLs can be associated with a subnet?
- multiple
- Five
- Two
- One
- multiple
- Five
- Two
- One
How many subnets a network ACLs can be associated with?
- multiple
- Five
- Two
- One
- multiple
- Five
- Two
- One
How are the rules evaluated in a security group (SG) and network ACLs? Choose 2.
- Network ACLs evaluate all rules before deciding whether to allow traffic.
- SG evaluate all rules before deciding whether to allow traffic.
- Network ACLs process rules in number order when deciding whether to allow traffic.
- SG process rules in number order when deciding whether to allow traffic.
- Network ACLs evaluate all rules before deciding whether to allow traffic.
- SG evaluate all rules before deciding whether to allow traffic.
- Network ACLs process rules in number order when deciding whether to allow traffic.
- SG process rules in number order when deciding whether to allow traffic.
Your company is migrating two existing applications to AWS. Application portfolio has one internet application which will be accessed by its customers and one intranet application which will be accessed only by employees from corporate network. Your plan is to create one VPC and deploy each application instances individually in a separate subnet. You also want to ensure that whole design is fault tolerant and services should not be hampered in case one of AWS AZ goes down? How many minimum subnets should you create?
- 2 subnets
- 4 subnets
- 1 subnets
- 6 subnets
- 2 subnets
- 4 subnets
- 1 subnets
- 6 subnets
What are AWS Privatelink features? Choose 3.
- Simplifies the security of data shared with cloud-based applications by eliminating the exposure of data to the public Internet.
- Provides private connectivity between VPCs, AWS services, and on-premises applications, securely on the Amazon network.
- Makes it easy to connect services across different accounts and VPCs to significantly simplify the network architecture.
- Improves the performance of EC2 instances.
- To use AWS PrivateLink, create an interface VPC endpoint for a service outside of your VPC. This creates an elastic network interface in your subnet with a private IP address that serves as an entry point for traffic destined to the service.
- Simplifies the security of data shared with cloud-based applications by eliminating the exposure of data to the public Internet.
- Provides private connectivity between VPCs, AWS services, and on-premises applications, securely on the Amazon network.
- Makes it easy to connect services across different accounts and VPCs to significantly simplify the network architecture.
- Improves the performance of EC2 instances.
- To use AWS PrivateLink, create an interface VPC endpoint for a service outside of your VPC. This creates an elastic network interface in your subnet with a private IP address that serves as an entry point for traffic destined to the service.
How Network ACL evaluates rules? Choose 2.
- Rules are evaluated starting with the lowest numbered rule.
- Rules are evaluated starting with the highest numbered rule
- As soon as a rule matches traffic, it is applied regardless of any lower-numbered rule that may contradict it.
- As soon as a rule matches traffic, it is applied regardless of any higher-numbered rule that may contradict it.
- Rules are evaluated starting with the lowest numbered rule.
- Rules are evaluated starting with the highest numbered rule
- As soon as a rule matches traffic, it is applied regardless of any lower-numbered rule that may contradict it.
- As soon as a rule matches traffic, it is applied regardless of any higher-numbered rule that may contradict it.
What feature Network ACL rules provides which ensures that if none of the rule matches the traffic is denied?
- You have the flexibility to add a rule with highest number to specify deny unmatched traffic both for inbound and outbound.
- Each network ACL also includes a rule whose rule number is an asterisk. This rule ensures that if a packet doesn’t match any of the other numbered rules, it’s denied. You can’t modify or remove this rule.
- You have the flexibility to add a rule with lowest number to specify deny unmatched traffic both for inbound and outbound.
- If a traffic doesn’t match any rule it is implicit ALLOW.
- You have the flexibility to add a rule with highest number to specify deny unmatched traffic both for inbound and outbound.
- Each network ACL also includes a rule whose rule number is an asterisk. This rule ensures that if a packet doesn’t match any of the other numbered rules, it’s denied. You can’t modify or remove this rule.
- You have the flexibility to add a rule with lowest number to specify deny unmatched traffic both for inbound and outbound.
- If a traffic doesn’t match any rule it is implicit ALLOW.
Which of the following are use cases for AWS Privatelink? Choose 3.
- Maintain regulatory compliance. Preventing personally identifiable information (PII) from traversing the Internet helps maintain compliance with regulations such as HIPAA or PCI.
- Advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level.
- Fault tolerance by providing dual communication channel between on premise data center and AWS resources.
- Securely access SaaS applications. With AWS PrivateLink, you can connect your VPCs to AWS services and SaaS applications in a secure and scalable manner.
- Easily migrate services from on-premises locations to the AWS cloud. On-premises applications can connect to service endpoints in Amazon VPC over AWS Direct Connect or AWS VPN. Service endpoints will direct the traffic to AWS services over AWS PrivateLink, while keeping the network traffic within the AWS network.
- Maintain regulatory compliance. Preventing personally identifiable information (PII) from traversing the Internet helps maintain compliance with regulations such as HIPAA or PCI.
- Advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level.
- Fault tolerance by providing dual communication channel between on premise data center and AWS resources.
- Securely access SaaS applications. With AWS PrivateLink, you can connect your VPCs to AWS services and SaaS applications in a secure and scalable manner.
- Easily migrate services from on-premises locations to the AWS cloud. On-premises applications can connect to service endpoints in Amazon VPC over AWS Direct Connect or AWS VPN. Service endpoints will direct the traffic to AWS services over AWS PrivateLink, while keeping the network traffic within the AWS network.
Based on the above figure of a network ACL configured for a subnet, how the rules will be evaluated for a packet destined for the SSL port (443)?
- Rule 110 will be directly matched and inbound packet will be allowed.
- First the lower number rule 100 will be evaluated and then next 110 will be evaluated which matches.
- All the six rule will be evaluated at once and packet match with a rule will be done.
- Rules will be evaluated in descending order i.e. 140, 130, 120, 110 till the match.
- Rule 110 will be directly matched and inbound packet will be allowed.
- First the lower number rule 100 will be evaluated and then next 110 will be evaluated which matches.
- All the six rule will be evaluated at once and packet match with a rule will be done.
- Rules will be evaluated in descending order i.e. 140, 130, 120, 110 till the match.
Based on the above figure of a network ACL configured for a subnet, how the rules will be evaluated for a packet destined for port 139 (NetBIOS)?
- It doesn’t match any of the rules, therefor an error ‘rule not defined’ will be thrown.
- It doesn’t match any of the rules, therefor it is implicit ALLOW.
- It doesn’t match any of the rules, and the * rule ultimately denies the packet.
- None of the above.
- It doesn’t match any of the rules, therefor an error ‘rule not defined’ will be thrown.
- It doesn’t match any of the rules, therefor it is implicit ALLOW.
- It doesn’t match any of the rules, and the * rule ultimately denies the packet.
- None of the above.
What is the significance of inbound rule 140 and outbound rule 120? Choose 2.
- Inbound rule 140 allows inbound IPv4 traffic from the Internet for ephemeral port range to cover the different types of clients that might initiate traffic to public-facing instances in your VPC.
- Outbound rule 120 allows outbound IPv4 responses to clients on the Internet (for example, serving web pages to people visiting the web servers in the subnet).
- Inbound rule 140 with a wide port range is to ensure that at least one rule matches for incoming packet.
- Outbound rule with a wide port range 120 is to ensure that at least one rule matches.
- Inbound rule 140 allows inbound IPv4 traffic from the Internet for ephemeral port range to cover the different types of clients that might initiate traffic to public-facing instances in your VPC.
- Outbound rule 120 allows outbound IPv4 responses to clients on the Internet (for example, serving web pages to people visiting the web servers in the subnet).
- Inbound rule 140 with a wide port range is to ensure that at least one rule matches for incoming packet.
- Outbound rule with a wide port range 120 is to ensure that at least one rule matches.
You want to troubleshoot why specific traffic is not reaching an instance and also want to diagnose overly restrictive security group rules. Which AWS service will you use?
- AWS Cloudtrail
- AWS Cloudwatch
- AWS Flowlogs
- AWS WAF
- AWS Cloudtrail
- AWS Cloudwatch
- AWS Flowlogs
- AWS WAF
For which of the following resources you can create a flow log? Choose 3
- VPC
- Subnet
- Network interface
- Security Group
- VPC
- Subnet
- Network interface
- Security Group
You’re using flow logs to diagnose overly restrictive or permissive security group rules or network ACL rules for your VPC which has one instance to start with. You use the ping command from your home computer to your instance. Your security group’s inbound rules allow ICMP traffic from your home computer IP address and the outbound rules do not allow ICMP traffic. Your network ACL permits inbound ICMP traffic from your home computer ip address but does not permit outbound ICMP traffic. Which of the following statements are correct regarding flow log records which will get displayed? Choose 2.
- A REJECT record for the response ping because the security group denied for outgoing ICMP.
- There will not be any log as outgoing is denied by both security group and network ACL.
- An ACCEPT record for the originating ping that was allowed by both the network ACL and the security group, and therefore was allowed to reach your instance.
- A REJECT record for the response ping that the network ACL denied.
- A REJECT record for the response ping because the security group denied for outgoing ICMP.
- There will not be any log as outgoing is denied by both security group and network ACL.
- An ACCEPT record for the originating ping that was allowed by both the network ACL and the security group, and therefore was allowed to reach your instance.
- A REJECT record for the response ping that the network ACL denied.
You’re using flow logs to diagnose overly restrictive or permissive security group rules or network ACL rules for your VPC which has one instance to start with. You use the ping command from your home computer to your instance. Your security group’s inbound rules allow ICMP traffic from your home computer IP address and the outbound rules do not allow ICMP traffic. Your network ACL permits inbound ICMP traffic from your home computer ip address and also permit outbound ICMP traffic. Which of the following statements are correct regarding flow log records which will get displayed? Choose 2.
- A REJECT record for the response ping because the security group denied for outgoing ICMP.
- There will not be any log as outgoing is denied by security group.
- An ACCEPT record for the originating ping that was allowed by both the network ACL and the security group, and therefore was allowed to reach your instance.
- An ACCEPT record for the response ping.
- A REJECT record for the response ping because the security group denied for outgoing ICMP.
- There will not be any log as outgoing is denied by security group.
- An ACCEPT record for the originating ping that was allowed by both the network ACL and the security group, and therefore was allowed to reach your instance.
- An ACCEPT record for the response ping.
You’re using flow logs to diagnose overly restrictive or permissive security group rules or network ACL rules for your VPC which has one instance to start with. You use the ping command from your home computer to your instance. Your security group’s inbound rules does not allow ICMP traffic from your home computer IP address and the outbound rules do not allow ICMP traffic. Your network ACL permits inbound ICMP traffic from your home computer ip address and also permit outbound ICMP traffic. Which of the following statements are correct regarding flow log records which will get displayed?
- A REJECT record for the response ping because the security group denied for incoming ICMP.
- A REJECT record for the response ping because the security group denied for outgoing ICMP.
- There will not be any log as incoming and outgoing is denied by security group.
- None of the above
- A REJECT record for the response ping because the security group denied for incoming ICMP.
- A REJECT record for the response ping because the security group denied for outgoing ICMP.
- There will not be any log as incoming and outgoing is denied by security group.
- None of the above
What is VPC Peering? Choose 3
- A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IPv4 addresses or IPv6 addresses.
- Instances in Master VPC can communicate with Secondary VPC as if they are within the same network.
- Instances in either VPC can communicate with each other as if they are within the same network.
- You can create a VPC peering connection between your own VPCs, or with a VPC in another AWS account.
- A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IPv4 addresses or IPv6 addresses.
- Instances in Master VPC can communicate with Secondary VPC as if they are within the same network.
- Instances in either VPC can communicate with each other as if they are within the same network.
- You can create a VPC peering connection between your own VPCs, or with a VPC in another AWS account.
Which of the following statements are correct about VPC peering? Choose 3.
- The VPCs has to be in same region.
- The VPCs can be in different regions.
- Traffic always stays on the global AWS backbone, and never traverses the public internet.
- AWS uses the existing infrastructure of a VPC to create a VPC peering connection; it is neither a gateway nor a VPN connection, and does not rely on a separate piece of physical hardware.
- The VPCs has to be in same region.
- The VPCs can be in different regions.
- Traffic always stays on the global AWS backbone, and never traverses the public internet.
- AWS uses the existing infrastructure of a VPC to create a VPC peering connection; it is neither a gateway nor a VPN connection, and does not rely on a separate piece of physical hardware.
What are the benefits of VPC peering?
- There is no single point of failure for communication or a bandwidth bottleneck.
- A VPC peering connection helps you to facilitate the transfer of data or create a file sharing network.
- Provides a simple and cost-effective way to share resources between regions or replicate data for geographic redundancy.
- Never traverses the public internet, which reduces threats, such as common exploits, and DDoS attacks.
- All of the above.
- There is no single point of failure for communication or a bandwidth bottleneck.
- A VPC peering connection helps you to facilitate the transfer of data or create a file sharing network.
- Provides a simple and cost-effective way to share resources between regions or replicate data for geographic redundancy.
- Never traverses the public internet, which reduces threats, such as common exploits, and DDoS attacks.
- All of the above.
What are the steps involved to establish a VPC peering connection? Choose 3.
- The owner of the requester VPC sends a request to the owner of the accepter VPC to create the VPC peering connection. The owner of the accepter VPC accepts the VPC peering connection request to activate the VPC peering connection.
- To enable the flow of traffic between the VPCs using private IP addresses, the owner of each VPC in the VPC peering connection must manually add a route to one or more of their VPC route tables that points to the IP address range of the other VPC (the peer VPC).
- If required, update the security group rules that are associated with your instance to ensure that traffic to and from the peer VPC is not restricted.
- There is no need to update the security group rules that are associated with your instance to ensure that traffic to and from the peer VPC is not restricted.
- The owner of the requester VPC sends a request to the owner of the accepter VPC to create the VPC peering connection. The owner of the accepter VPC accepts the VPC peering connection request to activate the VPC peering connection.
- To enable the flow of traffic between the VPCs using private IP addresses, the owner of each VPC in the VPC peering connection must manually add a route to one or more of their VPC route tables that points to the IP address range of the other VPC (the peer VPC).
- If required, update the security group rules that are associated with your instance to ensure that traffic to and from the peer VPC is not restricted.
- There is no need to update the security group rules that are associated with your instance to ensure that traffic to and from the peer VPC is not restricted.
Which of the following three statements are correct about VPC peering connections?
- Transitive peering relationships is supported.
- A VPC peering connection is a one to one relationship between two VPCs.
- A VPC can peer with multiple VPCs in one to many relationships.
- Transitive peering relationships are not supported.
- Transitive peering relationships is supported.
- A VPC peering connection is a one to one relationship between two VPCs.
- A VPC can peer with multiple VPCs in one to many relationships.
- Transitive peering relationships are not supported.
You are doing security audit of EC2 instances. You notice that for one of the instance there are two security groups attached to it. The first allows HTTP access over port 80 from CIDR block 0.0.0.0/0. Second allows SSH access over port 22 from your company ip address range 204.0.223.0/24. What request traffic can reach your instance?
- SSH and HTTP traffic from 0.0.0.0/0.
- SSH and HTTP traffic from 204.0.223.0/24.
- SSH traffic from 204.0.223.0/24 and HTTP traffic from 0.0.0.0/0.
- No traffic can reach your instance.
- SSH and HTTP traffic from 0.0.0.0/0.
- SSH and HTTP traffic from 204.0.223.0/24.
- SSH traffic from 204.0.223.0/24 and HTTP traffic from 0.0.0.0/0.
- No traffic can reach your instance.
You are doing security audit of EC2 instances. You notice that for one of the instance there are two security groups attached to it. The first allows HTTP access over port 80 from CIDR block 0.0.0.0/0. Second allows SSH access over port 22 from your company ip address range 204.0.223.0/24. You add another rule to allow SSH access over port 22 from address range 0.0.0.0/0 in the first security group. What request traffic can reach your instance?
- SSH and HTTP traffic from 0.0.0.0/0.
- SSH and HTTP traffic from 204.0.223.0/24.
- SSH traffic from 204.0.223.0/24 and HTTP traffic from 0.0.0.0/0.
- No traffic can reach your instance.
- SSH and HTTP traffic from 0.0.0.0/0.
- SSH and HTTP traffic from 204.0.223.0/24.
- SSH traffic from 204.0.223.0/24 and HTTP traffic from 0.0.0.0/0.
- No traffic can reach your instance.
Which of the following statements are correct about route table? Choose 2.
- Each subnet must be associated with a route table, which controls the routing for the subnet.
- A subnet can only be associated with one route table at a time, but you can associate multiple subnets with the same route table.
- Each subnet must be associated with multiple route table, which collectively controls the routing for the subnet.
- A subnet can be associated with multiple route table at a time, but you can associate multiple subnets with the same route table.
- Each subnet must be associated with a route table, which controls the routing for the subnet.
- A subnet can only be associated with one route table at a time, but you can associate multiple subnets with the same route table.
- Each subnet must be associated with multiple route table, which collectively controls the routing for the subnet.
- A subnet can be associated with multiple route table at a time, but you can associate multiple subnets with the same route table.
What are the properties of a main route table? Choose 2.
- You can delete the main route table.
- Your VPC automatically comes with a main route table that you can modify.
- You cannot delete the main route table, but you can replace the main route table with a custom table that you’ve created.
- You have to create main route table explicitly when you create VPC.
- You can delete the main route table.
- Your VPC automatically comes with a main route table that you can modify.
- You cannot delete the main route table, but you can replace the main route table with a custom table that you’ve created.
- You have to create main route table explicitly when you create VPC.
What must you do to enable access to or from the internet for instances in a VPC subnet?
- Attach an internet gateway to your VPC.
- Ensure that your subnet’s route table points to the internet gateway.
- Ensure that instances in your subnet have a globally unique IP address (public IPv4 address, Elastic IP address, or IPv6 address).
- Ensure that your network access control and security group rules allow the relevant traffic to flow to and from your instance.
- All of the above
- Attach an internet gateway to your VPC.
- Ensure that your subnet’s route table points to the internet gateway.
- Ensure that instances in your subnet have a globally unique IP address (public IPv4 address, Elastic IP address, or IPv6 address).
- Ensure that your network access control and security group rules allow the relevant traffic to flow to and from your instance.
- All of the above
Which of the following two statements are correct about internet gateway? Choose 2.
- An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between instances in your VPC and the internet.
- An internet gateway perform network address translation (NAT) for instances that have been assigned public IPv4 addresses.
- An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between instances in your VPC and corporate VPN.
- An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between VPC endpoints and AWS resources.
- An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between instances in your VPC and the internet.
- An internet gateway perform network address translation (NAT) for instances that have been assigned public IPv4 addresses.
- An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between instances in your VPC and corporate VPN.
- An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between VPC endpoints and AWS resources.
Which VPC component allows outbound communication over IPv6 from instances in your VPC to the Internet, and prevents the Internet from initiating an IPv6 connection with your instances?
- Internet Gateway
- Egress-Only Internet Gateways
- NAT Gateway
- NAT Instance
- Internet Gateway
- Egress-Only Internet Gateways
- NAT Gateway
- NAT Instance
Which VPC component enable instances in a private subnet to connect to the internet or other AWS services, but prevent the internet from initiating a connection with those instances? Choose 2.
- Internet Gateway
- Egress-Only Internet Gateways
- NAT Gateway
- NAT Instance
- Internet Gateway
- Egress-Only Internet Gateways
- NAT Gateway
- NAT Instance
Which of the following two statements are correct about Egress-Only Internet Gateways?
- An egress-only Internet gateway is stateful.
- An egress-only Internet gateway is stateless.
- An egress-only Internet gateway forwards traffic from the instances in the subnet to the Internet or other AWS services, and then sends the response back to the instances.
- An egress-only Internet gateway forwards traffic from the instances in the subnet to the Internet or other AWS services, and but doesn’t sends the response back to the instances.
- An egress-only Internet gateway is stateful.
- An egress-only Internet gateway is stateless.
- An egress-only Internet gateway forwards traffic from the instances in the subnet to the Internet or other AWS services, and then sends the response back to the instances.
- An egress-only Internet gateway forwards traffic from the instances in the subnet to the Internet or other AWS services, and but doesn’t sends the response back to the instances.
What is a bastion host? Choose 3.
- A bastion host is a server whose purpose is to provide access to a private subnet from an external network, such as the Internet.
- Bastion hosts are instances that are in public subnet and are typically accessed using SSH or RDP.
- It can acts as a ‘hop’ or ‘bridge’ server, allowing you to use SSH or RDP to log in to other instances in private subnet in your VPC.
- Bastion host is a server to install firewall to protect your private subnet.
- A bastion host is a server whose purpose is to provide access to a private subnet from an external network, such as the Internet.
- Bastion hosts are instances that are in public subnet and are typically accessed using SSH or RDP.
- It can acts as a ‘hop’ or ‘bridge’ server, allowing you to use SSH or RDP to log in to other instances in private subnet in your VPC.
- Bastion host is a server to install firewall to protect your private subnet.
You have following VPCs in your AWS account
- VPC A: CIDR block 172.16.0.0/16
- VPC B: CIDR block 10.0.0.0/16
- VPC C: CIDR block 172.16.0.0/16
Which of the following peering can be done? Choose 2.
- A B
- A C
- B C
- A B
- A C
- B C
You have following VPCs in your AWS account
- VPC A: CIDR block 172.16.0.0/16, 172.1.0.0/16
- VPC B: CIDR block 10.0.0.0/16, 10.2.0.0/16
- VPC C: CIDR block 172.16.0.0/16, 172.2.0.0/16
Which of the following peering can be done?
- A B
- A C
- B C
- A B
- A C
- B C
You are setting up a VPC for a single tier public facing web application. You also want your cloud web application to connect with in-premise application in the corporate network. Following are the configurations you have made:
- A VPC with CIDR block 10.0.0.0/16
- A public subnet in that VPC with CIDR block 10.0.1.0/24
- IP address of Web server instance running in the subnet is 10.0.1.4
- On premise corporate network of two offices CIDR 10.0.37.0/24 and 10.1.38.0/24
Which of the following statement is correct for above configuration? Choose 2.
- Traffic is dropped when the VPC web server instance tries to connect with host in 10.0.37.0/24.
- Traffic is dropped when the VPC web server instance tries to connect with host in 10.1.38.0/24.
- Traffic will flow between VPC instance and host instance in 10.1.38.0/24.
- Traffic will flow between VPC instance and host instance in 10.0.37.0/24.
- Traffic is dropped when the VPC web server instance tries to connect with host in 10.0.37.0/24.
- Traffic is dropped when the VPC web server instance tries to connect with host in 10.1.38.0/24.
- Traffic will flow between VPC instance and host instance in 10.1.38.0/24.
- Traffic will flow between VPC instance and host instance in 10.0.37.0/24.
You want to run a public-facing web application, while maintaining back-end servers that aren’t publicly accessible. You will have to set up security and routing so that the web servers can communicate with the MySQL database servers. You also need to ensure that database servers can connect to the Internet for software updates but the Internet cannot establish connections to the database servers. How will you set up your VPC configuration? Choose 3.
- Set up web servers in a public subnet and the database servers in a private subnet.
- The DB instances in the private subnet can access the Internet by using a network address translation (NAT) gateway that resides in the public subnet.
- Security Group attached with DB Instance should only allow read or write database requests from the web servers by configuring source as web server’s security group.
- The DB instances in the private subnet can access the Internet by using a web server EC2 instance that resides in the public subnet.
- Set up web servers in a public subnet and the database servers in a private subnet.
- The DB instances in the private subnet can access the Internet by using a network address translation (NAT) gateway that resides in the public subnet.
- Security Group attached with DB Instance should only allow read or write database requests from the web servers by configuring source as web server’s security group.
- The DB instances in the private subnet can access the Internet by using a web server EC2 instance that resides in the public subnet.
You have ensured that an instance interface created in the subnet automatically receives a public IPv4 address by modifying the public IP addressing attribute of your subnet and enabling the public IP addressing feature during instance launch. Which of the following statements are correct? Choose 3.
- A public IP address is assigned from Amazon’s pool of public IP addresses; it’s not associated with your account.
- When a public IP address is disassociated from your instance, it’s released back into the pool, and is no longer available for you to use.
- You cannot manually associate or disassociate a public IP address.
- The assigned IP addresses are persistent.
- A public IP address is assigned from Amazon’s pool of public IP addresses; it’s not associated with your account.
- When a public IP address is disassociated from your instance, it’s released back into the pool, and is no longer available for you to use.
- You cannot manually associate or disassociate a public IP address.
- The assigned IP addresses are persistent.
How can you connect to a DB Instances deployed within a VPC from the Internet or from EC2 Instances outside the VPC? Choose 3.
- It is not possible to connect to a DB instance deployed within a VPC.
- Use a bastion host, set up in a public subnet with an EC2 instance that acts as a SSH Bastion. This public subnet must have an internet gateway and routing rules that allow traffic to be directed via the SSH host, which must then forward requests to the private IP address of your RDS DB instance.
- Use public connectivity, create your DB Instances with the Publicly Accessible option set to yes. With Publicly Accessible active, your DB Instances within a VPC will be fully accessible outside your VPC by default.
- Set up a VPN Gateway that extends your corporate network into your VPC, and allows access to the RDS DB instance in that VPC.
- It is not possible to connect to a DB instance deployed within a VPC.
- Use a bastion host, set up in a public subnet with an EC2 instance that acts as a SSH Bastion. This public subnet must have an internet gateway and routing rules that allow traffic to be directed via the SSH host, which must then forward requests to the private IP address of your RDS DB instance.
- Use public connectivity, create your DB Instances with the Publicly Accessible option set to yes. With Publicly Accessible active, your DB Instances within a VPC will be fully accessible outside your VPC by default.
- Set up a VPN Gateway that extends your corporate network into your VPC, and allows access to the RDS DB instance in that VPC.
How do instances in a VPC without public IP addresses can access the internet? Choose 2.
- Inside a VPC, they can Route their traffic through a network address translation (NAT) gateway or a NAT instance to access the internet.
- It is not possible.
- For Amazon VPCs with a Site-to-Site VPN connection or Direct Connect connection, instances can route their Internet traffic down the virtual private gateway to your existing datacenter.
- Inside a VPC, they can Route their traffic through Internet Gateway to access the internet.
- Inside a VPC, they can Route their traffic through a network address translation (NAT) gateway or a NAT instance to access the internet.
- It is not possible.
- For Amazon VPCs with a Site-to-Site VPN connection or Direct Connect connection, instances can route their Internet traffic down the virtual private gateway to your existing datacenter.
- Inside a VPC, they can Route their traffic through Internet Gateway to access the internet.
Which of the following statements are correct about NAT devices? Choose 3.
- You can use a NAT device to enable instances in a private subnet to connect to the internet (for example, for software updates) or other AWS services, but prevent the internet from initiating connections with the instances.
- A NAT device forwards traffic from the instances in the private subnet to the internet or other AWS services, and then sends the response back to the instances.
- When traffic goes to the internet, the source IPv4 address is replaced with the NAT device’s address and similarly, when the response traffic goes to those instances, the NAT device translates the address back to those instances’ private IPv4 addresses.
- NAT devices are supported for both IP4 and IPv6 traffic.
- You can use a NAT device to enable instances in a private subnet to connect to the internet (for example, for software updates) or other AWS services, but prevent the internet from initiating connections with the instances.
- A NAT device forwards traffic from the instances in the private subnet to the internet or other AWS services, and then sends the response back to the instances.
- When traffic goes to the internet, the source IPv4 address is replaced with the NAT device’s address and similarly, when the response traffic goes to those instances, the NAT device translates the address back to those instances’ private IPv4 addresses.
- NAT devices are supported for both IP4 and IPv6 traffic.
Which of the following are NAT devices offered by AWS? Choose 2.
- NAT Private Gateway
- NAT Internet Gateway
- NAT gateway
- NAT instance
- NAT Private Gateway
- NAT Internet Gateway
- NAT gateway
- NAT instance
Which of the following is true about difference between NAT instances and NAT gateways? Choose 3.
- Type and size: NAT Gateway: Choose a suitable instance type and size, according to your predicted workload. NAT instances: Uniform offering; you don’t need to decide on the type or size.
- Bandwidth = NAT gateways: Can scale up to 45 Gbps. NAT instances: Depends on the bandwidth of the instance type.
- Maintenance= NAT gateways: Managed by AWS.NAT instances: Managed by you.
- Performance=NAT gateways: Software is optimized for handling NAT traffic. NAT instances: A generic Amazon Linux AMI that’s configured to perform NAT.
- Type and size: NAT Gateway: Choose a suitable instance type and size, according to your predicted workload. NAT instances: Uniform offering; you don’t need to decide on the type or size.
- Bandwidth = NAT gateways: Can scale up to 45 Gbps. NAT instances: Depends on the bandwidth of the instance type.
- Maintenance= NAT gateways: Managed by AWS.NAT instances: Managed by you.
- Performance=NAT gateways: Software is optimized for handling NAT traffic. NAT instances: A generic Amazon Linux AMI that’s configured to perform NAT.
You created a NAT gateway and followed the steps to configure it, but when you do a test your instances in the private subnet cannot access the internet. What could be possible reasons? Choose 4.
- The NAT gateway is not ready to serve traffic.
- Your route tables are not configured correctly.
- You should place the instance in a public subnet.
- Your security groups or network ACLs are blocking inbound or outbound traffic.
- You’re using an unsupported protocol.
- The NAT gateway is not ready to serve traffic.
- Your route tables are not configured correctly.
- You should place the instance in a public subnet.
- Your security groups or network ACLs are blocking inbound or outbound traffic.
- You’re using an unsupported protocol.
You are using a NAT instance to enable instances in a private subnet to connect to the internet for software updates, but prevent the internet internet from initiating connections with the instances. The NAT instance is in the public subnet and you have ensured that security groups, network ACLs and route tables are also appropriately configured. But on testing your instance in the private subnet cannot still access the internet. What could be the possible reason?
- Your source instance should be in public subnet to access internet.
- Your NAT instance should also be in the private subnet.
- You should disable source/destination check in the NAT instance.
- All of the above
- Your source instance should be in public subnet to access internet.
- Your NAT instance should also be in the private subnet.
- You should disable source/destination check in the NAT instance.
- All of the above
Which of the following can be used as bastion server to access private subnet instances in a VPC?
- NAT Instance
- NAT Gateway
- Transit Gateway
- Bastion Instance
- NAT Instance
- NAT Gateway
- Transit Gateway
- Bastion Instance
You want to run a public-facing web application, while maintaining back-end servers that aren’t publicly accessible. You will have to set up security and routing so that the web servers can communicate with the MySQL database servers. You also need to ensure that database servers can connect to the Internet for software updates but the Internet cannot establish connections to the database servers. How will you set up your VPC configuration?
- Set up web servers in a public subnet and the database servers in a private subnet.
- The DB instances in the private subnet can access the Internet by using a network address translation (NAT) instance that resides in the public subnet.
- Security Group attached with DB Instance should only allow read or write database requests from the web servers by configuring source as web server’s security group.
- The DB instances in the private subnet can access the Internet by using a web server EC2 instance that resides in the public subnet.
- Security Group attached with NAT Instance should allow internet access from DB server in private subnet and route response back to it.
- Set up web servers in a public subnet and the database servers in a private subnet.
- The DB instances in the private subnet can access the Internet by using a network address translation (NAT) instance that resides in the public subnet.
- Security Group attached with DB Instance should only allow read or write database requests from the web servers by configuring source as web server’s security group.
- The DB instances in the private subnet can access the Internet by using a web server EC2 instance that resides in the public subnet.
- Security Group attached with NAT Instance should allow internet access from DB server in private subnet and route response back to it.
In the following diagram Subnet 3A is a VPN-only subnet. How can instances in the subnet reach internet or AWS service? Choose 2.
- Any Internet-bound traffic must first traverse the virtual private gateway to corporate network, where the traffic is then subject to firewall and corporate security policies.
- If the instances send any AWS-bound traffic, the requests must go over the virtual private gateway to corporate network and then egress to the Internet before reaching AWS.
- Instances can send any AWS-bound traffic flow directly without going to corporate network.
- Any Internet-bound traffic can flow through the internet gateway.
- Any Internet-bound traffic must first traverse the virtual private gateway to corporate network, where the traffic is then subject to firewall and corporate security policies.
- If the instances send any AWS-bound traffic, the requests must go over the virtual private gateway to corporate network and then egress to the Internet before reaching AWS.
- Instances can send any AWS-bound traffic flow directly without going to corporate network.
- Any Internet-bound traffic can flow through the internet gateway.
What you must do to enable access to or from the internet for instances in a VPC subnet? Choose 4.
- Attach an internet gateway to your VPC.
- Attach a Transit Gateway or VPN Gateway to your VPC.
- Ensure that your subnet’s route table points to the internet gateway.
- Ensure that instances in your subnet have a globally unique IP address (public IPv4 address, Elastic IP address, or IPv6 address).
- Ensure that your network access control and security group rules allow the relevant traffic to flow to and from your instance.
- Attach an internet gateway to your VPC.
- Attach a Transit Gateway or VPN Gateway to your VPC.
- Ensure that your subnet’s route table points to the internet gateway.
- Ensure that instances in your subnet have a globally unique IP address (public IPv4 address, Elastic IP address, or IPv6 address).
- Ensure that your network access control and security group rules allow the relevant traffic to flow to and from your instance.
You have configured a VPC with public and private subnet as shown in the diagram below with: Public subnet: web server instance, NAT instance for private subnet instances to access the internet. Private subnet: RDS instances, fleet of EC2 instances in an auto scaling group. These instances access internet through NAT instance in the public subnet for software updates. The software updates for instances in the private subnet is schedule to run every night from 11 pm – 1am. You observe recently that these updates has become very slow and some of the updates are getting time out before the maintenance window of two hours. You identify the bottleneck is NAT instance network bandwidth. What architecture changes you can do to resolve this problem?
- Increase the number of NAT instances and change its instance type to one having more bandwidth.
- Use NAT gateway instead of NAT instance.
- Place NAT instance in the private subnet to increase network performance.
- Change the maintenance window of private subnet instances so as not to overlap with one another.
- Increase the number of NAT instances and change its instance type to one having more bandwidth.
- Use NAT gateway instead of NAT instance.
- Place NAT instance in the private subnet to increase network performance.
- Change the maintenance window of private subnet instances so as not to overlap with one another.
Which of the following are components of a VPC? Choose 3.
- S3, Lambda, EC2, RDS
- IP Address Range , Subnet,
- Internet Gateway, NAT Gateway, Virtual private gateway, Egress-only Internet Gateway
- Direct connect, Cloudfront and Route53
- Peering Connection, VPC Endpoints
- S3, Lambda, EC2, RDS
- IP Address Range , Subnet,
- Internet Gateway, NAT Gateway, Virtual private gateway, Egress-only Internet Gateway
- Direct connect, Cloudfront and Route53
- Peering Connection, VPC Endpoints
Which of the following are VPC limits? Choose 2.
- Default limit for number of VPC per region per account is 5
- IP address range of VPC is between maximum of /16 and minimum of /28 netmask
- Default limit for number of VPC per account is 5
- IP address range of VPC is between a minimum of /16 and maximum of /28 netmask
- Default limit for number of VPC per region per account is 5
- IP address range of VPC is between maximum of /16 and minimum of /28 netmask
- Default limit for number of VPC per account is 5
- IP address range of VPC is between a minimum of /16 and maximum of /28 netmask
What are the features of a VPC Subnet? Choose 3.
- An internal subnet is for connection only from your corporate VPN.
- A subnet is a range of IP addresses in your VPC.
- Public subnet is for resources that must be connected to the internet.
- Private is subnet for resources that won’t be connected to the internet.
- An internal subnet is for connection only from your corporate VPN.
- A subnet is a range of IP addresses in your VPC.
- Public subnet is for resources that must be connected to the internet.
- Private is subnet for resources that won’t be connected to the internet.
You are the solution architect for a mortgage broker who has a web application running on an on-demand EC2 instance in a public subnet of VPC. The database servers are in the private subnet. This web application is for end customers to log in and check their application status. You are using security group to manage the user request reaching your instances in public and private subnet. Your IT monitoring team notice a brute force attack from an ip address outside the company network. How can you block the ip address so that request doesn’t reach your web servers?
- Create a rule in security group attached to web server instance to block the ip address.
- Create a rule in Network Access Control attached to web server instance to deny access to ip address.
- Move the web servers instance from public subnet to private subnet.
- Create a rule to block the ip address in the internet gateway.
- Create a rule in security group attached to web server instance to block the ip address.
- Create a rule in Network Access Control attached to web server instance to deny access to ip address.
- Move the web servers instance from public subnet to private subnet.
- Create a rule to block the ip address in the internet gateway.