VPC and Networking Flashcards
Your private subnets need to connect to the Internet while still remaining private. Which AWS-managed VPC component allows you to do this?
a) NAT Instances
b) Internet Gateway
c) Security Groups
d) NAT Gateways
d) NAT Gateways
NAT Gateways allow your instances in your private subnets to access the Internet while remaining private, and are managed by AWS.
A public subnet is accessible from the Internet while a private subnet is not accessible from the Internet.
a) Yes
b) No, all subnets are accessible from the Internet
c) No, all subnets are not accessible from the Internet
a) Yes
A public subnet is accessible from the Internet while a private subnet is not accessible from the Internet.
Which type of firewall has both ALLOW and DENY rules and operates at the subnet level?
a) Network Access Control List (NACL)
b) Web Application Firewall (WAF)
c) Security Groups
d) GuarDuty
a) Network Access Control List (NACL)
A network access control list (NACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. They have both ALLOW and DENY rules.
You would like to connect hundreds of VPCs and your on-premises data centers together. Which AWS service allows you to do link all these together efficiently?
a) Site-to-Site VPN
b) Transit Gateway
c) Internet Gateway
d) Direct Connect
b) Transit Gateway
Transit Gateway connects thousands of VPC and on-premises networks together in a single gateway.
A company needs two VPCs to communicate with each other. What can they use?
a) VPC Endpoints
b) AWS Direct Connect
c) Internet Gateway
d) VPC Peering
d) VPC Peering
VPC Peering connection is a networking connection between two VPCs using AWS’ network.
You need a logically isolated section of AWS, where you can launch AWS resources in a private network that you define. What should you use?
a) Subnets
b) Availability Zones
c) A VPC
d) NAT Instances
c) A VPC
A virtual private cloud (VPC) is a virtual network dedicated to your AWS account. It is logically isolated from other virtual networks in the AWS Cloud. You can launch your AWS resources, such as Amazon EC2 instances, into your VPC.
A company needs to have a private, secure and fast connection between its on-premises data centers and the AWS Cloud. Which connection should they use?
a) AWS Connect
b) Site-to-Site VPN
c) VPC Peering
d) AWS Direct Connect
d) AWS Direct Connect
AWS Direct Connect is a cloud service solution that makes it easy to establish a dedicated private network connection from your premises to AWS.
Your VPC needs to connect with the Internet. Which VPC component can help?
a) NAT Gateways
b) NAT Instances
c) Network ACL
d) Internet Gateway
d) Internet Gateway
An internet gateway is a horizontally scaled, redundant, and highly available VPC component that allows communication between your VPC and the internet.
What is a VPC (Virtual Private Cloud)?
Is a private network for deploying resources, like EC2 instances.
VPCs are linked to a specific region.
What subnets allow to do?
Subnets allow to partition the network inside a VPC (Availability Zone resource)
These are divided as public and private subnets.
Public subnets are accessible from the internet while private subnets are not.
Elements that are used to define access to the internet and between subnets.
Route Tables
What are Internet Gateways used for?
Internet Gateways are used for allowing VPC instances to connect to the Internet.
What you could use to allow your instances in your Private Subnets to access the internet while remaining private.
NAT Gateways which are AWS-managed and NAT Instances which are self-managed.
The NAT Gateway/Instance has to be created on a public subnet and then a route from the private subnets to the NAT Gateway and from the NAT Gateway to the Internet Gateway.
What is a NACL?
A firewall which controls traffic from and to subnet
- It can have ALLOW and DENY rules
- Operates at subnet level
- Rules only include IP addresses
- Is stateless: Return traffic must be explicity allowed by the rules
In difference with NACL, what is a Security Group?
A firewall that controls traffic to and from an ENI (Elastic Network Interface) or EC2 instance.
- Can olnly have ALLOW rules
- Operates at the instance level
- Rules include IP addresses and other security groups
- Is stateful: Return traffic is automatically allowed, regardless of any rules