CloudAcademy Knowledge Check: Networking (SAA-C03) 1 of 2 Flashcards
Which statement regarding VPC peering is correct?
A. VPC-A can communicate with VPC-B through their peering connections with VPC-C.
B. VPC-A and VPC-B have identical CIDR block ranges. VPC-C can establish peering connections with both VPC-A and VPC-B.
C. VPCs with overlapping CIDR block ranges can establish a peering connection.
D. VPCs with identical CIDR block ranges can establish a peering connection.
B. VPC-A and VPC-B have identical CIDR block ranges. VPC-C can establish peering connections with both VPC-A and VPC-B.
Explanation:
The connectivity between the VPCs is implemented through the existing AWS network infrastructure, and so it is highly available with no bandwidth bottleneck. As peered connections operate as if they were part of the same network, there are restrictions when it comes to your CIDR block ranges that can be used.
Of the choices below, the only possible option is connecting two separate VPCs with identical CIDR blocks to the same separate VPC. The other choices, which involve duplicate or overlapping CIDR ranges, or daisy-chain connections between VPC peer connections, are not possible.
Which of the following EC2 instances cannot initiateoutbound traffic to the public internet?
A. An instance with an assigned public IP address in a public subnet.
B. An instance with an assigned private IP address only in a private subnetwitha route to a NAT Gateway.
C. An instance with an assigned private IP addressonly in a private subnet with no route to a NAT Gateway.
D. An instance with an assigned Elastic IP address in a public subnet.
C. An instance with an assigned private IP addressonly in a private subnet with no route to a NAT Gateway.
Explanation:
The only EC2 instance from the four choices above that cannot initiateoutbound traffic to the public internet is an Amazon EC2 instance with an assigned private IP address in a private subnet.
An instance with an assigned public IP or EIP address in a public subnet is about as ready as you can be to send and receive traffic from the public internet.
An instance with an assigned private IP address only, in a private subnet with a route to a NAT Gateway, can initiate outbound traffic to the public internet.
A client wants a connection between their VPC and other AWS services including Amazon S3 and DynamoDB without availability concerns or bandwidth constraints.
They do not want a VPN connection because of bandwidth limitations and do not want to incur the expense of Direct Connect.
What AWS solution will meet the client’s requirements?
A. NAT Gateways
B. VPC Endpoints
C. Transit Gateways
D. Network Load Balancers
B. VPC Endpoints
Explanation:
A VPC endpoint enables you to create a private connection between your VPC and another AWS service without requiring access over the Internet, through a NAT device, a VPN connection, or AWS Direct Connect. Endpoints are virtual devices. They are horizontally scaled, redundant, and highly available VPC components that allow communication between instances in your VPC and AWS services without imposing availability risks or bandwidth constraints on your network traffic.
You are designing a VPC for a large insurance company. Because their data is highly sensitive, you plan to implement several security features including security groups, network access control lists (ACL), and server-side encryption. You first want to set up security groups for security at the instance level. Whichstatements regarding security group features arecorrect? (Choose 3 answers)
A. You can specify separate rules for inbound and outbound traffic.
B. You can specify allow rules but not deny rules.
C. By default, new security groups include a rule allowing all outbound traffic.
D. Security groups are stateless.
B. You can specify allow rules but not deny rules.
A. You can specify separate rules for inbound and outbound traffic.
C. By default, new security groups include a rule allowing all outbound traffic.
Explanation:
A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. For each security group, you add rules that control the inbound traffic to instances, and a separate set of rules that control the outbound traffic. You can specify allow rules, but not deny rules. You can specify separate rules for inbound and outbound traffic.
How does AWS Direct Connect differ from a VPN Connection?
A. AWS Direct Connect can be configured in minutes.
B. AWS Direct Connect can tolerate the inherent variability in Internet-based connectivity.
C. AWS Direct Connect uses dedicated, private network connections between your intranet and Amazon VPC.
D. AWS Direct Connect utilizes IPSec to establish encrypted network connectivity between your intranet and Amazon VPC over the Internet.
C. AWS Direct Connect uses dedicated, private network connections between your intranet and Amazon VPC.
Explanation:
A VPC VPN Connection utilizes IPSec to establish encrypted network connectivity between your intranet and Amazon VPC over the Internet. VPN Connections can be configured in minutes and are a good solution if you have an immediate need, have low to modest bandwidth requirements, and can tolerate the inherent variability in Internet-based connectivity.
AWS Direct Connect does not involve the Internet; instead, it uses dedicated, private network connections between your intranet and Amazon VPC.
You need to establish a site-to-site VPN connection from your on-premise network to the VPC. For this to work successfully, which of the following need to be configured? (Choose 2 answers)
A. A physical appliance or software application as your customer gateway
B. Assign a Public/Elastic IP to a VPG
C. Both a private IP address on the customer gateway for the on-premise network and a Public/Elastic IP to a VPG
D. A public IP address on the customer gateway for the on-premise network
D. A public IP address on the customer gateway for the on-premise network
A. A physical appliance or software application as your customer gateway
Explanation:
You are taking information (the public IP) from the on-premises network and configuring it inside of the VPC . When you configure a VPN, you’re configuring it from the VPC and from the on-premises network. To use Amazon VPC with a VPN connection, you or your network administrator must designate a physical appliance or software application as your customer gateway and configure it.
You want to implement SSH forwarding to access EC2 instances. What descriptions of SSH agent forwarding are correct? (Choose 2 answers)
A. You use it to access instances through a virtual private gateway.
B. It allows you to access private keys stored on the bastion host.
C. It stores EC2 privatekeys on the local client.
D. You use it to access instances through a bastion host.
D. You use it to access instances through a bastion host.
C. It stores EC2 privatekeys on the local client.
Explanation:
SSH agent forwarding is a process that allows you to access private instances through a bastion host without storing the private key within the bastion host, which could be a security risk. Instead, through SSH agent forwarding you store the private keys on your local machine.
To meet the needs of one of your on-premises applications, you decide to increase data transfer speeds from your site to AWS by implementing AWS Direct Connect. What are two components that you will need to properly implement AWS Direct Connect? (Choose 2 answers)
A. a link configuration
B. a link parameters
C. a connection
D. a virtual interface
C. a connection
D. a virtual interface
Explanation:
There are two key components that you will need to deploy AWS Direct Connect: a connection and a virtual interface. A connection in an AWS Direct Connect location establishes a network connection from your premises to an AWS region. Virtual interfaces enable access to AWS services. A public virtual interface enables access to public-facing services, such as Amazon S3, while a private virtual interface enables access to your VPC.
Whichchoice correctly describes the differences between security groups and Network Access Control Lists (NACLs)? (Choose 2 answers)
A. Security Groups operate at the subnet level, and they support allow rules only.
B. NACLs operate at the subnet level and support deny rules only.
C. NACLs operate at the subnet level, are stateless, and support allow and deny rules.
D. Security Groups operate at the instance level, are stateful, and support allow rules only.
D. Security Groups operate at the instance level, are stateful, and support allow rules only.
A. Security Groups operate at the subnet level, and they support allow rules only.
Explanation:
You can secure your VPC instances using only security groups; however, you can add NACLs as a second layer of defense. Security groups are stateful and — Act as a firewall for associated Amazon EC2 instances, controlling both inbound and outbound traffic at the instance level .Network access control lists (NACLs) — Act as a firewall for associated subnets, controlling both inbound and outbound traffic at the subnet level . Security Groups are stateful and support allow rules only while Network Access Control Lists are stateless and support allow and deny rules.
With a(n) ______ , you can mask the failure of an instance by rapidly remapping the address to another instance in your VPC.
A. Reserved IP address
B. Public IP address
C. Elastic IP address
D. Private IP address
C. Elastic IP address
Explanation:
With an Elastic IP address, you can mask the failure of an instance by rapidly remapping the address to another instance in your VPC. You can associate an Elastic IP address with any instance or network interface for your VPC.
All statements regarding VPC peering connections below are correct except:
A. Peering connections establisha one-to-one connection only.
B. You can configure a peering connection between VPCs in separate regions.
C. Peering connections arenot possible between VPCs with an IP address overlap.
D. Peering connections are establishedusingvirtual private networks (VPN).
D. Peering connections are establishedusingvirtual private networks (VPN).
Explanation:
VPC peering connects two separate VPCs, either in the same region or different regions. That connection is a one-to-one connection only, and cannot be established between VPCs with an IP address overlap. The connectionis made over AWS infrastructure, not through a Direct Connect co-location or a virtual private network (VPN). This offers high availability, and avoids a bandwidth bottleneck.
You want to connect a single VPC network with acompany’son-premises network. You will encrypt the network traffic that travels over the public internet between the two destinations.
Which AWS network connection method would meetyour needs?
A. AWS Direct Connect
B. AWS Transit Gateway
C. A Virtual Private Network (VPN)
D. VPC Peering connections
C. A Virtual Private Network (VPN)
Explanation:
A VPN is the best choice because it can provide a hybrid connection and encrypt network traffic over the public internet. VPC peering connections can connect two VPCs. AWS Transit Gateway can create a hub between multiple VPCs and an on-premise network, but this case only requires connecting two networks so a central hub is not necessary. Direct Connect would provide a private network connection, which is also not necessary.
Which of the following should be followed before connecting to Amazon Virtual Private Cloud (Amazon VPC) using AWS Direct Connect?
A. Provide a public Autonomous System Number (ASN) to identify your network on the Internet.
B. Provide the public routes that you will advertise over Border Gateway Protocol (BGP).
C. Allocate a private IP address to your network in the 122.x.x.x range.
D. Create a virtual private gateway and attach it to your Virtual Private Cloud (VPC).
D. Create a virtual private gateway and attach it to your Virtual Private Cloud (VPC).
Explanation:
To connect to Amazon Virtual Private Cloud (Amazon VPC) by using AWS Direct Connect, you must first do the following:
Provide a private Autonomous System Number (ASN) to identify your network on the Internet. Amazon then allocates a private IP address in the 169.x.x.x range to you. Create a virtual private gateway and attach it to your VPC
You want to allow an on-premises network to connect to multiple separate VPCs within your AWS network through a central network hub.
What service would you need to provide thecentralizednetwork hubbetween multiple VPCs and your on-premises network?
A. AWS Transit Gateway
B. AWS VPN
C. VPC peering
D. AWS Direct Connect
A. AWS Transit Gateway
Explanation:
The central connection point or hub between the multiple VPCs and the hybrid connection to an on-premises network will be AWS Transit Gateway. The network suggested in this scenario would certainly include VPC peering connections and either VPNs or Direct Connect, but the component that connects them all is AWS Transit Gateway.
You can allow the instances in your private subnets in an Amazon VPC to have outbound access to the Internet by placing _____ inside of a public subnet and then configuring a route from your private subnet to it.
A. a NAT gateway
B. AWS Direct Connect
C. VPC peering
D. an AWS Transit Hub
A. a NAT gateway
Explanation:
You can still allow the instances in your private subnets to have outbound access to the Internet by placing a NAT gateway inside of a public subnet and then configuring a route from your private subnet to the NAT gateway.