Deck 1: AWS Certified Advanced Networking - Specialty (ANS-C00)

Full screen (f)
exit full mode
Question
You are deploying an EC2 instance in a private subnet that requires access to the Internet. One of the requirements for this solution is to restrict access to only particular URLs on a whitelist. In addition to the whitelisted URLs, the instances should be able to access any Amazon S3 bucket in the same region via any URL. Which of the following solutions should you deploy? (Choose two.)

A) Include s3.amazonaws.com in the whitelist.
B) Create a VPC endpoint for S3.
C) Run Squid proxy on a NAT instance.
D) Deploy a NAT gateway into your VPC.
E) Utilize a security group to restrict access.
Use Space or
up arrow
down arrow
to flip the card.
Question
Your organization needs to resolve DNS entries stored in an Amazon Route 53 private zone "awscloud:internal" from the corporate network. An AWS Direct Connect connection with a private virtual interface is configured to provide access to a VPC with the CIDR block 192.168.0.0/16. A DNS Resolver (BIND) is configured on an Amazon Elastic Compute Cloud (EC2) instance with the IP address 192.168.10.5 within the VPC. The DNS Resolver has standard root server hints configured and conditional forwarding for "awscloud.internal" to the IP address 192.168.0.2. From your PC on the corporate network, you query the DNS server at 192.168.10.5 for www.amazon.com. The query is successful and returns the appropriate response. When you query for "server.awscloud.internal", the query times out. You receive no response. How should you enable successful queries for "server.awscloud.internal"?

A) Attach an internet gateway to the VPC and create a default route.
B) Configure the VPC settings for enableDnsHostnames and enableDnsSupport as True
C) Relocate the BIND DNS Resolver to the corporate network.
D) Update the security group for the EC2 instance at 192.168.10.5 to allow UDP Port 53 outbound.
Question
You need to set up a VPN between AWS VPC and your on-premises network. You create a VPN connection in the AWS Management Console, download the configuration file, and install it on your on-premises router. The tunnel is not coming up because of firewall restrictions on your router. Which two network traffic options should you allow through the firewall? (Choose two.)

A) UDP port 500
B) IP protocol 50
C) IP protocol 5
D) TCP port 50
E) TCP port 500
Question
Your company runs an HTTPS application using an Elastic Load Balancing (ELB) load balancer/PHP on nginx server/RDS in multiple Availability Zones. You need to apply Geographic Restriction and identify the client's IP address in your application to generate dynamic content. How should you utilize AWS services in a scalable fashion to perform this task?

A) Modify the nginx log configuration to record value in X-Forwarded-For and use CloudFront to apply the Geographic Restriction.
B) Enable ELB access logs to store the client IP address and parse these to dynamically modify a blacklist.
C) Use X-Forwarded-For with security groups to apply the Geographic Restriction.
D) Modify the application code to use value of X-Forwarded-For and CloudFront to apply the Geographic Restriction.
Question
Your company decides to use Amazon S3 to augment its on-premises data store. Instead of using the company's highly controlled, on-premises Internet gateway, a Direct Connect connection is ordered to provide high bandwidth, low latency access to S3. Since the company does not own a publically routable IPv4 address block, a request was made to AWS for an AWS-owned address for a Public Virtual Interface (VIF). The security team is calling this new connection a "backdoor", and you have been asked to clarify the risk to the company. Which concern from the security team is valid and should be addressed?

A) AWS advertises its aggregate routes to the Internet allowing anyone on the Internet to reach the router.
B) Direct Connect customers with a Public VIF in the same region could directly reach the router.
C) EC2 instances in the same region with access to the Internet could directly reach the router.
D) The S3 service could reach the router through a pre-configured VPC Endpoint.
Question
Under increased cybersecurity concerns, a company is deploying a near real-time intrusion detection system (IDS) solution. A system must be put in place as soon as possible. The architecture consists of many AWS accounts, and all results must be delivered to a central location. Which solution will meet this requirement, while minimizing downtime and costs?

A) Deploy a third-party vendor solution to perform deep packet inspection in a transit VPC.
B) Enable VPC Flow Logs on each VPC. Set up a stream of the flow logs to a central Amazon Elasticsearch cluster.
C) Enable Amazon Macie on each AWS account and configure central reporting.
D) Enable Amazon GuardDuty on each account as members of a central account.
Question
You have been asked to monitor traffic flows on your Amazon EC2 instance. You will be performing deep packet inspection, looking for atypical patterns. Which tool will enable you to look at this data?

A) Wireshark
B) VPC Flow Logs
C) AWS CLI
D) CloudWatch Logs
Question
You have to set up an AWS Direct Connect connection to connect your on-premises to an AWS VPC. Due to budget requirements, you can only provision a single Direct Connect port. You have two border gateway routers at your on-premises data center that can peer with the Direct Connect routers for redundancy. Which two design methodologies, in combination, will achieve this connectivity? (Choose two.)

A) Terminate the Direct Connect circuit on a L2 border switch, which in turn has trunk connections to the two routers.
B) Create two Direct Connect private VIFs for the same VPC, each with a different peer IP.
C) Terminate the Direct Connect circuit on any of the one routers, which in turn will have an IBGP session with the other router.
D) Create one Direct Connect private VIF for the VPC with two customer peer IPs.
E) Provision two VGWs for the VPC and create one Direct Connect private VIF per VGW.
Question
You are designing an AWS Direct Connect solution into your VPC. You need to consider requirements for the customer router to terminate the Direct Connect link at the Direct Connect location. Which three factors that must be supported should you consider when choosing the customer router? (Choose three.)

A) 802.1q trunking
B) 802.1ax or 802.3ad link aggregation
C) OSPF
D) BGP
E) single-mode optical fiber connectivity
F) 1-Gbps copper connectivity
Question
You have a three-tier web application with separate subnets for Web, Applications, and Database tiers. Your CISO suspects your application will be the target of malicious activity. You are tasked with notifying the security team in the event your application is port scanned by external systems. Which two AWS Services cloud you leverage to build an automated notification system? (Choose two.)

A) Internet gateway
B) VPC Flow Logs
C) AWS CloudTrail
D) Lambda
E) AWS Inspector
Question
Your organization uses a VPN to connect to your VPC but must upgrade to a 1-G AWS Direct Connect connection for stability and performance. Your telecommunications provider has provisioned the circuit from your data center to an AWS Direct Connect facility and needs information on how to cross-connect (e.g., which rack/port to connect). What is the AWS-recommended procedure for providing this information?

A) Create a support ticket. Provide your AWS account number and telecommunications company's name and where you need the Direct Connect connection to terminate.
B) Create a new connection through your AWS Management Console and wait for an email from AWS with information.
C) Ask your telecommunications provider to contact AWS through an AWS Partner Channel. Provide your AWS account number.
D) Contact an AWS Account Manager and provide your AWS account number, telecommunications company's name, and where you need the Direct Connect connection to terminate.
Question
A Lambda function needs to access the private address of an Amazon ElastiCache cluster in a VPC. The Lambda function also needs to write messages to Amazon SQS. The Lambda function has been configured to run in a subnet in the VPC. Which of the following actions meet the requirements? (Choose two.)

A) The Lambda function needs an IAM role to access Amazon SQS
B) The Lambda function must route through a NAT gateway or NAT instance in another subnet to access the public SQS API.
C) The Lambda function must be assigned a public IP address to access the public Amazon SQS API.
D) The ElastiCache server outbound security group rules must be configured to permit the Lambda function's security group.
E) The Lambda function must consume auto-assigned public IP addresses but not elastic IP addresses.
Question
Your organization leverages an IP Address Management (IPAM) product to manage IP address distribution. The IPAM exposes an API. Development teams use CloudFormation to provision approved reference architectures. At deployment time, IP addresses must be allocated to the VPC. When the VPC is deleted, the IPAM must reclaim the VPC's IP allocation. Which method allows for efficient, automated integration of the IPAM with CloudFormation?

A) AWS CloudFormation parameters using the "Ref::" intrinsic function
B) AWS CloudFormation custom resource using an AWS Lambda invocation.
C) CloudFormation::OpsWorks::Stack with custom Chef configuration.
D) AWS CloudFormation parameters using the "Fn::FindInMap" intrinsic function.
Question
You ping an Amazon Elastic Compute Cloud (EC2) instance from an on-premises server. VPC Flow Logs record the following: 2 123456789010 eni-1235b8ca 10.123.234.78 172.11.22.33 0 0 1 8 672 1432917027 1432917142 ACCEPT OK 2 123456789010 eni-1235b8ca 172.11.22.33 10.123.234.78 0 0 1 4 336 1432917027 1432917082 ACCEPT OK 2 123456789010 eni-1235b8ca 172.11.22.33 10.123.234.78 0 0 1 4 336 1432917094 1432917142 REJECT OK Why are ICMP responses not received by the on-premises system?

A) The inbound network access control list is blocking the traffic
B) The outbound network access control list is blocking the traffic
C) The inbound security group is blocking the traffic.
D) The outbound security group is blocking the traffic.
Question
You run a well-architected, multi-AZ application in the eu-central-1 (Frankfurt) AWS region. The application is hosted in a VPC and is only accessed from the corporate network. To support large volumes of data transfer and administration of the application, you use a single 10-Gbps AWS Direct Connect connection with multiple private virtual interfaces. As part of a review, you decide to improve the resilience of your connection to AWS and make sure that any additional connectivity does not share the same Direct Connect routers at AWS. You need to provide the best levels of resilience to meet the application's needs. Which two options should you consider? (Choose two.)

A) Install a second 10-Gbps Direct Connect connection to the same Direct Connection location.
B) Deploy an IPsec VPN over a public virtual interface on a new 10-Gbps Direct Connect connection.
C) Install a second 10-Gbps Direct Connect connection to a Direct Connect location in eu-west-1.
D) Deploy an IPsec VPN over the Internet to the eu-west-1 region for diversity.
E) Install a second 10-Gbps Direct Connect connection to a second Direct Connect location for eu-central-1.
Question
Your organization runs a popular e-commerce application deployed on AWS that uses autoscaling in conjunction with an Elastic Load balancing (ELB) service with an HTTPS listener. Your security team reports that an exploitable vulnerability has been discovered in the encryption protocol and cipher that your site uses. Which step should you take to fix this problem?

A) Generate new SSL certificates for all web servers and replace current certificates.
B) Change the security policy on the ELB to disable vulnerable protocols and ciphers.
C) Generate new SSL certificates and use ELB to front-end the encrypted traffic for all web servers.
D) Leverage your current configuration management system to update SSL policy on all web servers.
Question
You are designing the network infrastructure for an application server in Amazon VPC. Users will access all the application instances from the Internet and from an on-premises network. The on-premises network is connected to your VPC over an AWS Direct Connect link. How should you design routing to meet these requirements?

A) Configure a single routing table with two default routes: one to the Internet via an IGW, the other to the on-premises network via the VGW. Use this routing table across all subnets in your VPC.
B) Configure two routing tables: one that has a default route via the IGW, and another that has a default route via the VGW. Associate both routing tables with each VPC subnet.
C) Configure a single routing table with a default route via the IGW. Propagate a default route via BGP on the AWS Direct Connect customer router. Associate the routing table with all VPC subnet.
D) Configure a single routing table with a default route via the IGW. Propagate specific routes for the on-premises networks via BGP on the AWS Direct Connect customer router. Associate the routing table with all VPC subnets.
Question
Your company's policy requires that all VPCs peer with a "common services: VPC. This VPC contains a fleet of layer 7 proxies and an Internet gateway. No other VPC is allowed to provision an Internet gateway. You configure a new VPC and peer with the common service VPC as required by policy. You launch an Amazon EC2. Windows instance configured to forward all traffic to the layer 7 proxies in the common services VPC. The application on this server should successfully interact with Amazon S3 using its properly configured AWS Identity and Access Management (IAM) role. However, Amazon S3 is returning 403 errors to the application. Which step should you take to enable access to Amazon S3?

A) Update the S3 bucket policy with the private IP address of the instance.
B) Exclude 169.254.169.0/24 from the instance's proxy configuration.
C) Configure a VPC endpoint for Amazon S3 in the same subnet as the instance.
D) Update the CORS configuration for Amazon S3 to allow traffic from the proxy.
Question
You need to set up an Amazon Elastic Compute Cloud (EC2) instance for an application that requires the lowest latency and the highest packet-per-second network performance. The application will talk to other servers in a peered VPC. Which two of the following components should be part of the design? (Choose two.)

A) Select an instance with support for single root I/O virtualization.
B) Select an instance that has support for multiple ENIs.
C) Ensure that the instance supports jumbo frames and set 9001 MTU.
D) Select an instance with Amazon Elastic Block Store (EBS)-optimization.
E) Ensure that proper OS drivers are installed.
Question
An organization runs a consumer-facing website on AWS. The Amazon EC2-based web fleet is load balanced using the AWS Application Load Balancer, Amazon Route 53 is used to provide the public DNS services. The following URLs need to server content to end users: test.example.com web.example.com example.com Based on this information, what combination of services must be used to meet the requirement? (Choose two.)

A) Path condition in ALB listener to route example.com to appropriate target groups.
B) Host condition in ALB listener to route *.example.com to appropriate target groups.
C) Host condition in ALB listener to route example.com to appropriate target groups.
D) Path condition in ALB listener to route *.example.com to appropriate target groups.
E) Host condition in ALB listener to route .example.com to appropriate target groups.
Question
You have multiple Amazon Elastic Compute Cloud (EC2) instances running a web server in a VPC configured with security groups and NACL. You need to ensure layer 7 protocol level logging of all network traffic (ACCEPT/REJECT) on the instances. What should be enabled to complete this task?

A) CloudWatch Logs at the VPC level
B) Packet sniffing at the instance level
C) VPC flow logs at the subnet level
D) Packet sniffing at the VPC level
Question
Your organization requires strict adherence to a change control process for its Amazon Elastic Compute Cloud (EC2) and VPC environments. The organization uses AWS CloudFormation as the AWS service to control and implement changes. Which combination of three services provides an alert for changes made outside of AWS CloudFormation? (Choose three.)

A) AWS Config
B) AWS Simple Notification Service
C) AWS CloudWatch metrics
D) AWS Lambda
E) AWS CloudFormation
F) AWS Identify and Access Management
Question
An organization launched an IPv6-only web portal to support IPv6-native mobile clients. Front-end instances launch in an Amazon VPC associated with an appropriate IPv6 CIDR. The VPC IPv4 CIDR is fully utilized. A single subnet exists in each of two Availability Zones with appropriately configured IPv6 CIDR associations. Auto Scaling is properly configured, and no Elastic Load Balancing is used. Customers say the service is unavailable during peak load times. The network engineer attempts to launch an instance manually and receives the following message: "There are not enough free addresses in subnet 'subnet-12345678' to satisfy the requested number of instances." What action will resolve the availability problem?

A) Create a new subnet using a VPC secondary IPv6 CIDR, and associate an IPv6 CIDR. Include the new subnet in the Auto Scaling group.
B) Create a new subnet using a VPC secondary IPv4 CIDR, and associate an IPv6 CIDR. Include the new subnet in the Auto Scaling group.
C) Resize the IPv6 CIDR on each of the existing subnets. Modify the Auto Scaling group maximum number of instances.
D) Add a secondary IPv4 CIDR to the Amazon VPC. Assign secondary IPv4 address space to each of the existing subnets.
Question
You operate a production VPC with both a public and a private subnet. Your organization maintains a restricted Amazon S3 bucket to support this production workload. Only Amazon EC2 instances in the private subnet should access the bucket. You implement VPC endpoints(VPC-E) for Amazon S3 and remove the NAT that previously provided a network path to Amazon S3. The default VPC-E policy is applied. Neither EC2 instances in the public or private subnets are able to access the S3 bucket. What should you do to enable Amazon S3 access from EC2 instances in the private subnet?

A) Add the CIDR address range of the private subnet to the S3 bucket policy.
B) Add the VPC-E identified to the S3 bucket policy.
C) Add the VPC identifier for the production VPC to the S3 bucket policy.
D) Add the VPC-E identifier for the production VPC to endpoint policy.
Question
A Network Engineer is designing a new system on AWS that will take advantage of Amazon CloudFront for both content caching and for protecting the underlying origin. There is concern that an external agency might be able to access the IP addresses for the application's origin and then attack the origin despite it being served by CloudFront. Which of the following solutions provides the strongest level of protection to the origin?

A) Use an IP whitelist rule in AWS WAF within CloudFront to ensure that only known-client IPs are able to access the application.
B) Configure CloudFront to use a custom header and configure an AWS WAF rule on the origin's Application Load Balancer to accept only traffic that contains that header.
C) Configure an AWS Lambda@Edge function to validate that the traffic to the Application Load Balancer originates from CloudFront.
D) Attach an origin access identity to the CloudFront origin that allows traffic to the origin that originates from only CloudFront.
Question
You deploy an Amazon EC2 instance that runs a web server into a subnet in a VPC. An Internet gateway is attached, and the main route table has a default route (0.0.0.0/0) configured with a target of the Internet gateway. The instance has a security group configured to allow as follows: Protocol: TCP Port: 80 inbound, nothing outbound The Network ACL for the subnet is configured to allow as follows: When you try to browse to the web server, you receive no response. Which additional step should you take to receive a successful response?

A) Add an entry to the security group outbound rules for Protocol: TCP, Port Range: 80
B) Add an entry to the security group outbound rules for Protocol: TCP, Port Range: 1024-65535
C) Add an entry to the Network ACL outbound rules for Protocol: TCP, Port Range: 80
D) Add an entry to the Network ACL outbound rules for Protocol: TCP, Port Range: 1024-65535
Question
You have a global corporate network with 153 individual IP prefixes in your internal routing table. You establish a private virtual interface over AWS Direct Connect to a VPC that has an Internet gateway (IGW). All instances in the VPC must be able to route to the Internet via an IGW and route to the global corporate network via the VGW. How should you configure your on-premises BGP peer to meet these requirements?

A) Configure AS-Prepending on your BGP session
B) Summarize your prefix announcement to less than 100
C) Announce a default route to the VPC over the BGP session
D) Enable route propagation on the VPC route table
Question
You deploy your Internet-facing application is the us-west-2(Oregon) region. To manage this application and upload content from your corporate network, you have a 1-Gbps AWS Direct Connect connection with a private virtual interface via one of the associated Direct Connect locations. In normal operation, you use approximately 300 Mbps of the available bandwidth, which is more than your Internet connection from the corporate network. You need to deploy another identical instance of the application is us-east-1(N Virginia) as soon as possible. You need to use the benefits of Direct Connect. Your design must be the most effective solution regarding cost, performance, and time to deploy. Which design should you choose?

A) Use the inter-region capabilities of Direct Connect to establish a private virtual interface from us-west-2 Direct Connect location to the new VPC in us-east-1.
B) Deploy an IPsec VPN over your corporate Internet connection to us-east-1 to provide access to the new VPC.
C) Use the inter-region capabilities of Direct Connect to deploy an IPsec VPN over a public virtual interface to the new VPC in us-east-1.
D) Use VPC peering to connect the existing VPC in us-west-2 to the new VPC in us-east-1, and then route traffic over Direct Connect and transit the peering connection.
Question
You are building an application that provides real-time audio and video services to customers on the Internet. The application requires high throughput. To ensure proper audio and video transmission, minimal latency is required. Which of the following will improve transmission quality?

A) Enable enhanced networking
B) Select G2 instance types
C) Enable jumbo frames
D) Use multiple elastic network interfaces
Question
Your security team implements a host-based firewall on all of your Amazon Elastic Compute Cloud (EC2) instances to block all outgoing traffic. Exceptions must be requested for each specific requirement. Until you request a new rule, you cannot access the instance metadata service. Which firewall rule should you request to be added to your instances to allow instance metadata access?

A) Inbound; Protocol tcp; Source [Instance's EIP]; Destination 169.254.169.254
B) Inbound; Protocol tcp; Destination 169.254.169.254; Destination port 80
C) Outbound; Protocol tcp; Destination 169.254.169.254; Destination port 80
D) Outbound; Protocol tcp; Destination 169 .254.169.254; Destination port 443
Question
Your company operates a single AWS account. A common services VPC is deployed to provide shared services, such as network scanning and compliance tools. Each AWS workload uses its own VPC, and each VPC must peer with the common services VPC. You must choose the most efficient and cost effective approach. Which approach should be used to automate the required VPC peering?

A) AWS CloudTrail integration with Amazon CloudWatch Logs to trigger a Lambda function.
B) An OpsWorks Chef recipe to execute a command-line peering request.
C) Cfn-init with AWS CloudFormation to execute a command-line peering request.
D) An AWS CloudFormation template that includes a peering request.
Question
A network engineer is managing two AWS Direct Connect connections. Each connection has a public virtual interface configured with a private ASN. The engineer wants to configure active/passive routing between the Direct Connect connections to access Amazon public endpoints. What BGP configuration is required for the on-premises equipment? (Choose two.)

A) Use Local Pref to control outbound traffic.
B) Use AS Prepending to control inbound traffic.
C) Use eBGP multi-hop between loopback interfaces.
D) Use BGP Communities to control outbound traffic.
E) Advertise more specific prefixes over one Direct Connect connection.
Question
An organization will be extending its existing on-premises infrastructure into the cloud. The design consists of a transit VPC that contains stateful firewalls that will be deployed in a highly available configuration across two Availability Zones for automatic failover. What MUST be configured for this design to work? (Choose two.)

A) A different Autonomous System Number (ASN) for each firewall.
B) Border Gateway Protocol (BGP) routing
C) Autonomous system (AS) path prepending
D) Static routing
E) Equal-cost multi-path routing (ECMP)
Question
Your organization has a newly installed 1-Gbps AWS Direct Connect connection. You order the cross-connect from the Direct Connect location provider to the port on your router in the same facility. To enable the use of your first virtual interface, your router must be configured appropriately. What are the minimum requirements for your router?

A) 1-Gbps Multi Mode Fiber Interface, 802.1Q VLAN, Peer IP Address, BGP Session with MD5.
B) 1-Gbps Single Mode Fiber Interface, 802.1Q VLAN, Peer IP Address, BGP Session with MD5.
C) IPsec Parameters, Pre-Shared key, Peer IP Address, BGP Session with MD5
D) BGP Session with MD5, 802.1Q VLAN, Route-Map, Prefix List, IPsec encrypted GRE Tunnel
Question
The Payment Card Industry Data Security Standard (PCI DSS) merchants that handle credit card data must use strong cryptography. These merchants must also use security protocols to protect sensitive data during transmission over public networks. You are migrating your PCI DSS application from on-premises SSL appliance and Apache to a VPC behind Amazon CloudFront. How should you configure CloudFront to meet this requirement?

A) Configure the CloudFront Cache Behavior to require HTTPS and the CloudFront Origin's Protocol Policy to 'Match Viewer'.
B) Configure the CloudFront Cache Behavior to allow TCP connections and to forward all requests to the origin without TLS termination at the edge.
C) Configure the CloudFront Cache Behavior to require HTTPS and to forward requests to the origin via AWS Direct Connect.
D) Configure the CloudFront Cache Behavior to redirect HTTP requests to HTTPS and to forward request to the origin via the Amazon private network.
Question
Your company maintains an Amazon Route 53 private hosted zone. DNS resolution is restricted to a single, pre-existing VPC. For a new application deployment, you create an additional VPC in the same AWS account. Both this new VPC and your on-premises DNS infrastructure must resolve records in the existing private hosted zone. Which two activities are required to enable DNS resolution both within the new VPC and from the on-premises infrastructure? (Choose two.)

A) Update the DHCP options set for the new VPC with the Route 53 nameserver IP addresses.
B) Update the Route 53 private hosted zone's VPC associations to include the new VPC.
C) Launch Amazon EC2-based DNS proxies in the new VPC. Specify the proxies as forwarders in the on-premises DNS.
D) Update the on-premises DNS to include forwarders to the Route 53 nameserver IP addresses.
E) Launch Amazon EC2-based DNS proxies in the new VPC. Specify the proxies in the DHCP options set.
Question
You are configuring a virtual interface for access to your VPC on a newly provisioned 1-Gbps AWS Direct Connect connection. Which two configuration values do you need to provide? (Choose two.)

A) Public AS number
B) VLAN ID
C) IP prefixes to advertise
D) Direct Connect location
E) Virtual private gateway
Question
A company is about to migrate an application from its on-premises data center to AWS. As part of the planning process, the following requirements involving DNS have been identified. On-premises systems must be able to resolve the entries in an Amazon Route 53 private hosted zone. Amazon EC2 instances running in the organization's VPC must be able to resolve the DNS names of on-premises systems The organization's VPC uses the CIDR block 172.16.0.0/16. Assuming that there is no DNS namespace overlap, how can these requirements be met?

A) Change the DHCP options set for the VPC to use both the Amazon-provided DNS server and the on-premises DNS systems. Configure the on-premises DNS systems with a stub-zone, delegating the name server 172.16.0.2 as authoritative for the Route 53 private hosted zone.
B) Deploy and configure a set of EC2 instances into the company VPC to act as DNS proxies. Configure the proxies to forward queries for the on-premises domain to the on-premises DNS systems, and forward all other queries to 172.16.0.2. Change the DHCP options set for the VPC to use the new DNS proxies. Configure the on-premises DNS systems with a stub-zone, delegating the name server 172.16.0.2 as authoritative for the Route 53 private hosted zone.
C) Deploy and configure a set of EC2 instances into the company VPC to act as DNS proxies. Configure the proxies to forward queries for the on-premises domain to the on-premises DNS systems, and forward all other queries to the Amazon-provided DNS server (172.16.0.2). Change the DHCP options set for the VPC to use the new DNS proxies. Configure the on-premises DNS systems with a stub-zone, delegating the proxies as authoritative for the Route 53 private hosted zone.
D) Change the DHCP options set for the VPC to use both the on-premises DNS systems. Configure the on-premises DNS systems with a stub-zone, delegating the Route 53 private hosted zone's name servers as authoritative for the Route 53 private hosted zone.
Question
A corporate network routing table contains 624 individual RFC 1918 and public IP prefixes. You have two AWS Direct Connect connectors. You con?gure a private virtual interface on both connections to a virtual private gateway. The virtual private gateway is not currently attached to a VPC. Neither BGP session will maintain the Established state on the customer router. The AWS Management Console reports the private virtual interfaces as Down. What could you do to address the problem so that the AWS Management Console reports the private virtual interface as Available ?

A) Attach the virtual private gateway to a VPC and enable route propagation.
B) Filter the public IP pre?xes on the corporate network from the private virtual interface.
C) Change the BGP advertisements from the corporate network to only be a default route.
D) Attach the second virtual interface to an alternative virtual private gateway.
Question
A department in your company has created a new account that is not part of the organization's consolidated billing family. The department has also created a VPC for its workload. Access is restricted by network access control lists to the department's on-premises private IP allocation. An AWS Direct Connect private virtual interface for this VPC advertises a default route to the company network. When the department downloads data from an Amazon Elastic Compute Cloud(EC2) instance in its new VPC, what are the associated charges?

A) The company pays Internet Data Out charges.
B) The company pays AWS Direct Connect Data Out charges.
C) The department pays Internet Data Out charges.
D) The department pays AWS Direct Connect Data Out charges.
Question
An organization has three AWS accounts with each containing VPCs in Virginia, Canada and the Sydney regions. The organization wants to determine whether all available Elastic IP addresses (EIPs) in these accounts are attached to Amazon EC2 instances or in use elastic network interfaces (ENIs) in all of the specified regions for compliance and cost-optimization purposes. Which of the following meets the requirements with the LEAST management overhead?

A) Use an Amazon CloudWatch Events rule to schedule an AWS Lambda function in each account in all three regions to find the unattached and unused EIPs.
B) Use a CloudWatch event bus to schedule Lambda functions in each account in all three regions to find the unattached and unused EIPs.
C) Add an AWS managed, EIP-attached AWS Config rule in each region in all three accounts to find unattached and unused EIPs.
D) Use AWS CloudFormation StackSets to deploy an AWS Config EIP-attached rule in all accounts and regions to find the unattached and unused EIPs.
Question
A Systems Administrator is designing a hybrid DNS solution with spilt-view. The apex-domain "example.com" should be served through name servers across multiple top-level domains (TLDs). The name server for subdomain "dev.example.com" should reside on-premises. The administrator has decided to use Amazon Route 53 to achieve this scenario. What procedurals steps must be taken to implement the solution?

A) Use a Route 53 public hosted zone for example.com and a private hosted zone for dev.example.com
B) Use a Route 53 public and private hosted zone for example.com and perform subdomain delegation for dev.example.com
C) Use a Route 53 public hosted zone for example.com and perform subdomain delegation for dev.example.com
D) Use a Route 53 private hosted zone for example.com and perform subdomain delegation for dev.example.com
Question
A Network Engineer is troubleshooting a network connectivity issue for an instance within a public subnet that cannot connect to the internet. The first step the Engineer takes is to SSH to the instance via a local bastion within the VPC and runs an ifconfig command to inspect the IP addresses configured on the instance. The output is as follows: <strong>A Network Engineer is troubleshooting a network connectivity issue for an instance within a public subnet that cannot connect to the internet. The first step the Engineer takes is to SSH to the instance via a local bastion within the VPC and runs an ifconfig command to inspect the IP addresses configured on the instance. The output is as follows:   The Engineer notices that the command output does not contain a public IP address. In the AWS Management Console, the public subnet has a route to the internet gateway. The instance also has a public IP address associated with it. What should the Engineer do next to troubleshoot this situation?</strong> A) Configure the public IP on the interface. B) Disable source/destination checking for the instance. C) Associate an Elastic IP address to the interface. D) Evaluate the security groups and the network access control list. <div style=padding-top: 35px> The Engineer notices that the command output does not contain a public IP address. In the AWS Management Console, the public subnet has a route to the internet gateway. The instance also has a public IP address associated with it. What should the Engineer do next to troubleshoot this situation?

A) Configure the public IP on the interface.
B) Disable source/destination checking for the instance.
C) Associate an Elastic IP address to the interface.
D) Evaluate the security groups and the network access control list.
Question
A company has an application running on Amazon EC2 instances in a private subnet that connects to a third-party service provider's public HTTP endpoint through a NAT gateway. As request rates increase, new connections are starting to fail. At the same time, the ErrorPortAllocation Amazon CloudWatch metric count for the NAT gateway is increasing. Which of the following actions should improve the connectivity issues? (Choose two.)

A) Allocate additional elastic IP addresses to the NAT gateway.
B) Request that the third-party service provider implement HTTP keepalive.
C) Implement TCP keepalive on the client instances.
D) Create additional NAT gateways and update the private subnet route table to introduce the new NAT gateways.
E) Create additional NAT gateways in the public subnet and split client instances into multiple private subnets, each with a route to a different NAT gateway.
Question
An organization has created a web application inside a VPC and wants to make it available to 200 client VPCs. The client VPCs are in the same region but are owned by other business units within the organization. What is the best way to meet this requirement, without making the application publicly available?

A) Configure the application as an AWS PrivateLink-powered service, and have the client VPCs connect to the endpoint service by using an interface VPC endpoint.
B) Enable VPC peering between the web application VPC and all client VPCs.
C) Deploy the web application behind an internet-facing Application Load Balancer and control which clients have access by using security groups.
D) Deploy the web application behind an internal Application Load Balancer and control which clients have access by using security groups.
Question
A company uses a single connection to the internet when connecting its on-premises location to AWS. It has selected an AWS Partner Network (APN) Partner to provide a point-to-point circuit for its first-ever 10 Gbps AWS Direct Connect connection. What steps must be taken to order the cross-connect at the Direct Connect location?

A) Obtain the LOA/CFA from the APN Partner when ordering connectivity. Upload it to the AWS Management Console when creating a new Direct Connect connection. AWS will ensure that the cross-connect is installed.
B) Obtain the LOA/CFA from the AWS Management Console when ordering the Direct Connect connection. Provide it to the APN Partner when ordering connectivity. The Direct Connect partner will ensure that the cross-connect is installed.
C) Obtain one LOA/CFA each from the AWS Management Console and the APN Partner. Provide both to the Facility Operator of the Direct Connect location. The Facility Operator will ensure that the cross-connect is installed.
D) Identify the APN Partner in the AWS Management Console when creating the Direct Connect connection. Provide the resulting Connection ID to the APN Partner, who will ensure that the cross-connect is installed.
Question
A Network Engineer has enabled VPC Flow Logs to troubleshoot an ICMP reachability issue for an echo reply from an Amazon EC2 instance. The flow logs reveal an ACCEPT record for the request from the client to the EC2 instance, and a REJECT record for the response from the EC2 instance to the client. What is the MOST likely reason for there to be a REJECT record?

A) The security group is denying inbound ICMP.
B) The network ACL is denying inbound ICMP.
C) The security group is denying outbound ICMP.
D) The network ACL is denying outbound ICMP.
Question
An organization is replacing a tape backup system with a storage gateway. there is currently no connectivity to AWS. Initial testing is needed. What connection option should the organization use to get up and running at minimal cost?

A) Use an internet connection.
B) Set up an AWS VPN connection.
C) Provision an AWS Direct Connection private virtual interface.
D) Provision a Direct Connect public virtual interface.
Question
The Security department has mandated that all outbound traffic from a VPC toward an on-premises datacenter must go through a security appliance that runs on an Amazon EC2 instance. Which of the following maximizes network performance on AWS? (Choose two.)

A) Support for the enhanced networking drivers
B) Support for sending traffic over the Direct Connect connection
C) The instance sizes and families supported by the security appliance
D) Support for placement groups within the VPC
E) Security appliance support for multiple elastic network interfaces
Question
A company's Network Engineering team is solely responsible for deploying VPC infrastructure using AWS CloudFormation. The company wants to give its Developers the ability to launch applications using CloudFormation templates so that subnets can be created using available CIDR ranges. What should be done to meet these requirements?

A) Create a CloudFormation templates with Amazon EC2 resources that rely on cfn-init and cfn-signals to inform the stack of available CIDR ranges.
B) Create a CloudFormation template with a custom resource that analyzes traffic activity in VPC Flow Logs and reports on available CIDR ranges.
C) Create a CloudFormation template that references the Fn::Cidr intrinsic function within a subnet resource to select an available CIDR range.
D) Create a CloudFormation template with a custom resource that uses AWS Lambda and Amazon DynamoDB to manage available CIDR ranges.
Question
A network engineer has configured a private hosted zone using Amazon Route 53. The engineer needs to configure health checks for record sets within the zone that are associated with instances. How can the engineer meet the requirements?

A) Configure a Route 53 health check to a private IP associated with the instances inside the VPC to be checked.
B) Configure a Route 53 health check pointing to an Amazon SNS topic that notifies an Amazon CloudWatch alarm when the Amazon EC2 StatusCheckFailed metric fails.
C) Create a CloudWatch metric that checks the status of the EC2 StatusCheckFailed metric, add an alarm to the metric, and then create a health check that is based on the state of the alarm.
D) Create a CloudWatch alarm for the StatusCheckFailed metric and choose Recover this instance, selecting a threshold value of 1.
Question
An organization is using a VPC endpoint for Amazon S3. When the security group rules for a set of instances were initially configured, access was restricted to allow traffic only to the IP addresses of the Amazon S3 API endpoints in the region from the published JSON file. The application was working properly, but now is logging a growing number of timeouts when connecting with Amazon S3. No internet gateway is configured for the VPC. Which solution will fix the connectivity failures with the LEAST amount of effort?

A) Create a Lambda function to update the security group based on AmazonIPSpaceChanged notifications.
B) Update the VPC routing to direct Amazon S3 prefix-list traffic to the VPC endpoint using the route table APIs.
C) Update the application server's outbound security group to use the prefix-list for Amazon S3 in the same region.
D) Create an additional VPC endpoint for Amazon S3 in the same route table to scale the concurrent connections to Amazon S3.
Question
A company has two redundant AWS Direct Connect connections to a VPC. The VPC is configured using BGP metrics so that one Direct Connect connection is used as the primary traffic path. The company wants the primary Direct Connect connection to fail to the secondary in less than one second. What should be done to meet this requirement?

A) Configure BGP on the company's router with a keep-alive to 300 ms and the BGP hold timer to 900 ms.
B) Enable Bidirectional Forwarding Detection (BFD) on the company's router with a detection minimum interval of 300 ms and a BFD liveness detection multiplier of 3.
C) Enable Dead Peer Detection (DPD) on the company's router with a detection minimum interval of 300 ms and a DPD liveliness detection multiplier of 3.
D) Enable Bidirectional Forwarding Detection (BFD) echo mode on the company's router and disable sending the Internet Control Message Protocol (ICMP) IP packet requests.
Question
An organization is migrating its on-premises applications to AWS by using a lift-and-shift approach, taking advantage of managed AWS services wherever possible. The company must be able to edit the application code during the migration phase. One application is a traditional three-tier application, consisting of a web presentation tier, an application tier, and a database tier. The external calling client applications need their sessions to remain sticky to both the web and application nodes that they initially connect to. Which load balancing solution would allow the web and application tiers to scale horizontally independent from one another other?

A) Use an Application Load Balancer at the web tier and a Classic Load Balancer at the application tier. Set session stickiness on both, but update the application code to create an application-controlled cookie on the Classic Load Balancer.
B) Use an Application Load Balancer at both the web and application tiers, setting session stickiness at the target group level for both tiers.
C) Deploy a web node and an application node as separate containers on the same host, using task linking to create a relationship between the pair. Add an Application Load Balancer with session stickiness in front of all web node containers.
D) Use a Network Load Balancer at the web tier, and an Application Load Balancer at the application tier. Enable session stickiness on the Application Load Balancer, but take advantage of the native WebSockets protocols available to the Network Load Balancer.
Question
A company is connecting to a VPC over an AWS Direct Connect using a private VIF, and a dynamic VPN connection as a backup. The company's Reliability Engineering team has been running failover and resiliency tests on the network and the existing VPC by simulating an outage situation on the Direct Connect connection. During the resiliency tests, traffic failed to switch over to the backup VPN connection. How can this failure be troubleshot?

A) Ensure that Bidirectional Forwarding Detection is enabled on the Direct Connect connection
B) Confirm that the same routes are being advertised over both the VPN and Direct Connect.
C) Reconfigure the Direct Connect session from static routes to Border Gateway Protocol (BGP) peering.
D) Configure a virtual private gateway for the VPN and another virtual private gateway for Direct Connect.
Question
A network architect is designing an internet website. It has web, application, and database tiers that will run in AWS. The website uses Amazon DynamoDB. Which architecture will minimize public exposure of the back-end instances?

A) A VPC with public subnets for the NLB, public subnets for the web tier, private subnets for the application tier, and private subnets for DynamoDB.
B) A VPC with public subnets for the ALB, private subnets for the web tier, and private subnets for the application tier. The application tier connects DynamoDB through a VPC endpoint.
C) A VPC with public subnets for the ALB, public subnets for the web tier, private subnets for the application tier, and private subnets for DynamoDB.
D) A VPC with public subnets for the NLB, private subnets for the web tier, and public subnets for the application tier. The application tier connects DynamoDB through a VPC endpoint.
Question
An architecture is being designed to support an Amazon WorkSpaces deployment of 1,000 desktops. Which architecture will support this deployment while allowing for future expansion?

A) A VPC with a /16 CIDR and one /21 subnet
B) A VPC with a /20 CIDR and two /21 subnets
C) A VPC with a /16 CIDR and one /22 subnet
D) A VPC with a /20 CIDR and two /23 subnets
Question
A company deployed its production Amazon VPC using CIDR block 33.16.0.0/16. The company has nearly depleted its addresses and now needs to extend the VPC network. Which CIDR blocks meet the company's requirement to extend the VPC network with a secondary CIDR? (Choose two.)

A) 33.17.0.0/16
B) 172.16.0.0/18
C) 100.70.0.0/17
D) 192.168.1.0/24
E) 10.0.0.0/8
Question
Changes made to a security group attached to an Application Load Balancer resulted in connectivity issues for a company's production web application. The Network Engineer needs to lock down permissions for the company's AWS account, automate auditing for any changes, and set up notifications. What actions should accomplish this?

A) Configure IAM user policies to lock down permissions for specific users. Enable AWS CloudTrail to identify API calls from users. Use AWS Config to audit any changes, and configure Amazon SNS to send notifications.
B) Configure IAM user policies to lock down permissions for specific users. Enable AWS CloudTrail to identify the API calls from users. Configure AWS CodeCommit to audit any changes in configurations, and configure Amazon SNS to send notifications.
C) Configure IAM user policies to lock down permissions for specific users. Enable AWS CloudTrail to identify the API calls from users. Configure Amazon Macie to use machine learning to identify any configuration changes, and configure Amazon SNS to send notifications.
D) Configure IAM role policies to lock down permissions for specific users. Configure Amazon GuardDuty to audit and monitor configuration changes, and configure Amazon SNS to send notifications.
Question
A company's web application is deployed on Amazon EC2 instances behind a public Application Load Balancer. The application flags malicious requests and uses an AWS Lambda function to add the offending IP addresses to the network ACL to block any further request for 24 hours. Recently, the application has been receiving more malicious requests, which causes the network ACL to reach its limit of allowed entries. Which action should be taken to block more IP addresses, without compromising the existing security requirements?

A) Update the AWS Lambda function to remove blocked entries from the network ACL after 2 hours.
B) Update the AWS Lambda function to block malicious IPs in security groups rather than the network ACL.
C) Update the AWS Lambda function to block malicious IPs in AWS WAF attached to the Application Load Balancer.
D) Update the AWS Lambda function to add an additional network ACL to the subnets once the limit for the previous ones has been reached.
Question
Your hybrid networking environment consists of two application VPCs, a shared services VPC, and your corporate network. The corporate network is connected to the shared services VPC via an IPsec VPN with dynamic (BGP) routing enabled. The applications require access to a common authentication service in the shared services VPC. You need to enable native network access from the corporate network to both application VPCs. Which step should you take to meet the requirements?

A) Use VPC peering to peer the application VPCs with the shared services VPC, and enable associated routing in the shared services VPC via the corporate VPN.
B) Configure an IPsec VPN between the virtual private gateway in each application VPC to the virtual private gateway in the shared services VPC.
C) Configure additional IPsec VPNs for each application VPC back to the corporate network, and enable VPC peering to the shared services VPC.
D) Enable CloudHub functionality to route traffic between the three VPCs and the corporate network using dynamic BGP routing.
Question
You need to set up an Amazon Elastic Compute Cloud (EC2) instance for an application that requires the lowest latency and the highest packet-per-second network performance. The application will talk to other servers in a peered VPC. Which two of the following components should be part of the design? (Select two.)

A) Select an instance with support for single root I/O virtualization.
B) Select an instance that has support for multiple ENIs.
C) Ensure that the instance supports jumbo frames and set 9001 MTU.
D) Select an instance with Amazon Elastic Block Store (EBS)-optimization.
E) Ensure that proper OS drivers are installed.
Question
Your organization's corporate website must be available on www.acme.com and acme.com. How should you configure Amazon Route 53 to meet this requirement?

A) Configure acme.com with an ALIAS record targeting the ELB. www.acme.com with an ALIAS record targeting the ELB.
B) Configure acme.com with an A record targeting the ELB. www.acme.com with a CNAME record targeting the acme.com record.
C) Configure acme.com with a CNAME record targeting the ELB. www.acme.com with a CNAME record targeting the acme.com record.
D) Configure acme.com using a second ALIAS record with the ELB target. www.acme.com using a PTR record with the acme.com record target.
Question
You currently use a single security group assigned to all nodes in a clustered NoSQL database. Only your cluster members in one region must be able to connect to each other. This security group uses a self-referencing rule using the cluster security group's group-id to make it easier to add or remove nodes from the cluster. You need to make this database comply with out-of-region disaster recovery requirements and ensure that the network traffic between the nodes is encrypted when travelling between regions. How should you enable secure cluster communication while deploying additional cluster members in another AWS region?

A) Create an IPsec VPN between AWS regions, use private IP addresses to route traffic, and create cluster security group rules that reference each other's security group-id in each region.
B) Create an IPsec VPN between AWS regions, use private IP addresses to route traffic, and create cluster security group CIDR-based rules that correspond with the VPC CIDR in the other region.
C) Use public IP addresses and TLS to securely communicate between cluster nodes in each AWS region, and create cluster security group CIDR-based rules that correspond with the VPC CIDR in the other region.
D) Use public IP addresses and TLS to securely communicate between cluster nodes in each AWS region, and create cluster security group rules that reference each other's security group-id in each region.
Question
The Web Application Development team is worried about malicious activity from 200 random IP addresses. Which action will ensure security and scalability from this type of threat?

A) Use inbound security group rules to block the IP addresses.
B) Use inbound network ACL rules to block the IP addresses.
C) Use AWS WAF to block the IP addresses.
D) Write iptables rules on the instance to block the IP addresses.
Question
You are preparing to launch Amazon WorkSpaces and need to configure the appropriate networking resources. What must be configured to meet this requirement?

A) At least two subnets in different Availability Zones.
B) A dedicated VPC with Active Directory Services.
C) An IPsec VPN to on-premises Active Directory
D) Network address translation for outbound traffic.
Question
A network engineer is managing two AWS Direct Connect connections. Each connection has a public virtual interface configured with a private ASN. The engineer wants to configure active/passive routing between the Direct Connect connections to access Amazon public endpoints. What BGP configuration is required for the on-premises equipment? (Select two.)

A) Use Local Pref to control outbound traffic.
B) Use AS Prepending to control inbound traffic.
C) Use eBGP multi-hop between loopback interfaces.
D) Use BGP Communities to control outbound traffic.
E) Advertise more specific prefixes over one Direct Connect connection.
Question
Your company has a 1-Gbps AWS Direct Connect connection to AWS. Your company needs to send traffic from on-premises to a VPC owned by a partner company. The connectivity must have minimal latency at the lowest price. Which of the following connectivity options should you choose?

A) Create a new Direct Connect connection, and set up a new circuit to connect to the partner VPC using a private virtual interface.
B) Create a new Direct Connect connection, and leverage the existing circuit to connect to the partner VPC.
C) Create a new private virtual interface, and leverage the existing connection to connect to the partner VPC.
D) Enable VPC peering and use your VPC as a transitive point to reach the partner VPC.
Question
You are deploying an EC2 instance in a private subnet that requires access to the Internet. One of the requirements for this solution is to restrict access to only particular URLs on a whitelist. In addition to the whitelisted URL, the instances should be able to access any Amazon S3 bucket in the same region via any URL. Which of the following solutions should you deploy? (Select two.)

A) Include s3.amazonaws.com in the whitelist.
B) Create a VPC endpoint for S3.
C) Run Squid proxy on a NAT instance.
D) Deploy a NAT gateway into your VPC.
E) Utilize a security group to restrict access.
Question
You need to set up a VPN between AWS VPC and your on-premises network. You create a VPN connection in the AWS Management Console, download the configuration file, and install it on your on-premises router. The tunnel is not coming up because of firewall restrictions on your router. Which two network traffic options should you allow through the firewall? (Select two.)

A) UDP port 500
B) IP protocol 50
C) IP protocol 5
D) TCP port 50
E) TCP port 500
Question
An organization will be extending its existing on-premises infrastructure into the cloud. The design consists of a transit VPC that contains stateful firewalls that will be deployed in a highly available configuration across two Availability Zones for automatic failover. What MUST be configured for this design to work? (Select two.)

A) A different Autonomous System Number (ASN) for each firewall.
B) Border Gateway Protocol (BGP) routing
C) Autonomous system (AS) path prepending
D) Static routing
E) Equal-cost multi-path routing (ECMP)
Question
A customer has set up multiple VPCs for Dev, Test, Prod, and Management. You need to set up AWS Direct Connect to enable data flow from on-premises to each VPC. The customer has monitoring software running in the Management VPC that collects metrics from the instances in all the other VPCs. Due to budget requirements, data transfer charges should be kept at minimum. Which design should be recommended?

A) Create a total of four private VIFs, one for each VPC owned by the customer, and route traffic between VPCs using the Direct Connect link.
B) Create a private VIF to the Management VPC, and peer this VPC to all other VPCs.
C) Create a private VIF to the Management VPC, and peer this VPC to all other VPCs, enable source/destination NAT in the Management VPC.
D) Create a total of four private VIFs, and enable VPC peering between all VPCs.
Question
You manage a web service that is used by client applications deployed in 300 offices worldwide. The web service architecture is an Elastic Load balancer (ELB) distributing traffic across four application servers deployed in an autoscaling group across two availability zones. The ELB is configured to use round robin, and sticky sessions are disabled. You have configured the NACLs and Security Groups to allow port 22 from your bastion host, and port 80 from 0.0.0.0/0. The client configuration is managed by each regional IT team. Upon inspection you find that a large amount of requests from incorrectly configured sites are causing a single application server to degrade. The remainder of the requests are equally distributed across all servers with no negative effects. What should you do to remedy the situation and prevent future occurrences?

A) Mark the affected instance as degraded in the ELB and raise it with the client application team.
B) Update the NACL to only allow port 80 to the application servers from the ELB servers.
C) Update the Security Groups to only allow port 80 to the application servers from the ELB.
D) Terminate the affected instance and allow Auto Scaling to create a new instance.
Question
A multinational organization has applications deployed in three different AWS regions. These applications must securely communicate with each other by VPN. According to the organization's security team, the VPN must meet the following requirements: AES 128-bit encryption SHA-1 hashing User access via SSL VPN PFS using DH Group 2 Ability to maintain/rotate keys and passwords Certificate-based authentication Which solution should you recommend so that the organization meets the requirements?

A) AWS hardware VPN between the virtual private gateway and customer gateway
B) A third-party VPN solution deployed from AWS Marketplace
C) A private MPLS solution from an international carrier
D) AWS hardware VPN between the virtual private gateways in each region
Question
You are moving a two-tier application into an Amazon VPC. An Elastic Load Balancing (ELB) load balancer is configured in front of the application tier. The application tier is driven through RESTful interfaces. The data tier uses relational database service (RDS) MySQL. Company policy requires end-to-end encryption of all data in transit. What ELB configuration complies with the corporate encryption policy?

A) Configure the ELB load balancer protocol as HTTP. Configure the application instances for SSL termination. Configure Amazon RDS for SSL, and use REQUIRE SSL grants.
B) Configure the ELB protocols in TCP mode. Configure the application instances for SSL termination. Configure Amazon RDS for SSL, and use REQUIRE SSL grants.
C) Configure the ELB load balancer protocol as HTTPS. Offload application instance encryption to the load balancer. Install your SSL certificate on Amazon RDS, and configure SSL.
D) Configure the ELB protocols in SSL mode. Offload application instance encryption to the load balancer. Install your SSL/TLS certificate on Amazon RDS, and configure SSL.
Question
A company has 225 mobile and desktop devices and 300 partner VPNs that need access to an AWS VPC. VPN users should not be able to reach one another. Which approach will meet the technical and security requirements while minimizing costs?

A) Use the AWS IPsec VPN for the mobile, desktop, and partner VPN connections. Use network access control lists (Network ACLs) and security groups to maintain routing separation.
B) Use the AWS IPsec VPN for the partner VPN connections. Use an Amazon EC2 instance VPN for the mobile and desktop devices. Use Network ACLs and security groups to maintain routing separation.
C) Create an AWS Direct Connect connection between on-premises and AWS Use a public virtual interface to connect to the AWS IPsec VPN for the mobile, desktop, and partner VPN connections.
D) Use an Amazon EC2 instance VPN for the desktop, mobile, and partner VPN connections. Use features of the VPN instance to limit routing and connectivity.
Question
You have a three-tier web application with separate subnets for Web, Applications, and Database tiers. Your CISO suspects your application will be the target of malicious activity. You are tasked with notifying the security team in the event your application is port scanned by external systems. Which two AWS Services cloud you leverage to build an automated notification system? (Select two.)

A) Internet gateway
B) VPC Flow Logs
C) AWS CloudTrail
D) Lambda
E) AWS Inspector
Question
You have to set up an AWS Direct Connect connection to connect your on-premises to an AWS VPC. Due to budget requirements, you can only provision a single Direct Connect port. You have two border gateway routers at your on-premises data center that can peer with the Direct Connect routers for redundancy. Which two design methodologies, in combination, will achieve this connectivity? (Select two.)

A) Terminate the Direct Connect circuit on a L2 border switch, which in turn has trunk connections to the two routers.
B) Create two Direct Connect private VIFs for the same VPC, each with a different peer IP.
C) Terminate the Direct Connect circuit on any of the one routers, which in turn will have an IBGP session with the other router.
D) Create one Direct Connect private VIF for the VPC with two customer peer IPs.
E) Provision two VGWs for the VPC and create one Direct Connect private VIF per VGW.
Question
Your application is hosted behind an Elastic Load Balancer (ELB) within an autoscaling group. The autoscaling group is configured with a minimum of 2, a maximum of 14, and a desired value of 2. The autoscaling cooldown and the termination policies are set to the default value. CloudWatch reports that the site typically requires just two servers, but spikes at the start and end of the business day can require eight to ten servers. You receive intermittent reports of timeouts and partially loaded web pages. Which configuration change should you make to address this issue?

A) Configure connection draining on the ELB.
B) Configure the autoscaling cooldown to 600 seconds.
C) Configure the termination policy to oldest instance.
D) Configure a Terminating: Wait lifecycle hook on a scale in event.
Question
You use a VPN to extend your corporate network into a VPC. Instances in the VPC are able to resolve resource records in an Amazon Route 53 private hosted zone. Your on-premises DNS server is configured with a forwarder to the VPC DNS server IP address. On-premises users are unable to resolve names in the private hosted zone, although instances in a peered VPC can. What should you do to provide on-premises users with access to the private hosted zone?

A) Create a proxy resolver within the VPC. Point the on-premises forwarder to the proxy resolver.
B) Modify the network access control list on the VPC to allow DNS queries from on-premises systems.
C) Configure the on-premises server as a secondary DNS for the private zone. Update the NS records.
D) Update the on-premises forwarders with the four name servers assigned to the private hosted zone.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/397
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: AWS Certified Advanced Networking - Specialty (ANS-C00)
1
You are deploying an EC2 instance in a private subnet that requires access to the Internet. One of the requirements for this solution is to restrict access to only particular URLs on a whitelist. In addition to the whitelisted URLs, the instances should be able to access any Amazon S3 bucket in the same region via any URL. Which of the following solutions should you deploy? (Choose two.)

A) Include s3.amazonaws.com in the whitelist.
B) Create a VPC endpoint for S3.
C) Run Squid proxy on a NAT instance.
D) Deploy a NAT gateway into your VPC.
E) Utilize a security group to restrict access.
Run Squid proxy on a NAT instance.
Deploy a NAT gateway into your VPC.
2
Your organization needs to resolve DNS entries stored in an Amazon Route 53 private zone "awscloud:internal" from the corporate network. An AWS Direct Connect connection with a private virtual interface is configured to provide access to a VPC with the CIDR block 192.168.0.0/16. A DNS Resolver (BIND) is configured on an Amazon Elastic Compute Cloud (EC2) instance with the IP address 192.168.10.5 within the VPC. The DNS Resolver has standard root server hints configured and conditional forwarding for "awscloud.internal" to the IP address 192.168.0.2. From your PC on the corporate network, you query the DNS server at 192.168.10.5 for www.amazon.com. The query is successful and returns the appropriate response. When you query for "server.awscloud.internal", the query times out. You receive no response. How should you enable successful queries for "server.awscloud.internal"?

A) Attach an internet gateway to the VPC and create a default route.
B) Configure the VPC settings for enableDnsHostnames and enableDnsSupport as True
C) Relocate the BIND DNS Resolver to the corporate network.
D) Update the security group for the EC2 instance at 192.168.10.5 to allow UDP Port 53 outbound.
Configure the VPC settings for enableDnsHostnames and enableDnsSupport as True
3
You need to set up a VPN between AWS VPC and your on-premises network. You create a VPN connection in the AWS Management Console, download the configuration file, and install it on your on-premises router. The tunnel is not coming up because of firewall restrictions on your router. Which two network traffic options should you allow through the firewall? (Choose two.)

A) UDP port 500
B) IP protocol 50
C) IP protocol 5
D) TCP port 50
E) TCP port 500
UDP port 500
IP protocol 50
4
Your company runs an HTTPS application using an Elastic Load Balancing (ELB) load balancer/PHP on nginx server/RDS in multiple Availability Zones. You need to apply Geographic Restriction and identify the client's IP address in your application to generate dynamic content. How should you utilize AWS services in a scalable fashion to perform this task?

A) Modify the nginx log configuration to record value in X-Forwarded-For and use CloudFront to apply the Geographic Restriction.
B) Enable ELB access logs to store the client IP address and parse these to dynamically modify a blacklist.
C) Use X-Forwarded-For with security groups to apply the Geographic Restriction.
D) Modify the application code to use value of X-Forwarded-For and CloudFront to apply the Geographic Restriction.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
5
Your company decides to use Amazon S3 to augment its on-premises data store. Instead of using the company's highly controlled, on-premises Internet gateway, a Direct Connect connection is ordered to provide high bandwidth, low latency access to S3. Since the company does not own a publically routable IPv4 address block, a request was made to AWS for an AWS-owned address for a Public Virtual Interface (VIF). The security team is calling this new connection a "backdoor", and you have been asked to clarify the risk to the company. Which concern from the security team is valid and should be addressed?

A) AWS advertises its aggregate routes to the Internet allowing anyone on the Internet to reach the router.
B) Direct Connect customers with a Public VIF in the same region could directly reach the router.
C) EC2 instances in the same region with access to the Internet could directly reach the router.
D) The S3 service could reach the router through a pre-configured VPC Endpoint.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
6
Under increased cybersecurity concerns, a company is deploying a near real-time intrusion detection system (IDS) solution. A system must be put in place as soon as possible. The architecture consists of many AWS accounts, and all results must be delivered to a central location. Which solution will meet this requirement, while minimizing downtime and costs?

A) Deploy a third-party vendor solution to perform deep packet inspection in a transit VPC.
B) Enable VPC Flow Logs on each VPC. Set up a stream of the flow logs to a central Amazon Elasticsearch cluster.
C) Enable Amazon Macie on each AWS account and configure central reporting.
D) Enable Amazon GuardDuty on each account as members of a central account.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
7
You have been asked to monitor traffic flows on your Amazon EC2 instance. You will be performing deep packet inspection, looking for atypical patterns. Which tool will enable you to look at this data?

A) Wireshark
B) VPC Flow Logs
C) AWS CLI
D) CloudWatch Logs
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
8
You have to set up an AWS Direct Connect connection to connect your on-premises to an AWS VPC. Due to budget requirements, you can only provision a single Direct Connect port. You have two border gateway routers at your on-premises data center that can peer with the Direct Connect routers for redundancy. Which two design methodologies, in combination, will achieve this connectivity? (Choose two.)

A) Terminate the Direct Connect circuit on a L2 border switch, which in turn has trunk connections to the two routers.
B) Create two Direct Connect private VIFs for the same VPC, each with a different peer IP.
C) Terminate the Direct Connect circuit on any of the one routers, which in turn will have an IBGP session with the other router.
D) Create one Direct Connect private VIF for the VPC with two customer peer IPs.
E) Provision two VGWs for the VPC and create one Direct Connect private VIF per VGW.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
9
You are designing an AWS Direct Connect solution into your VPC. You need to consider requirements for the customer router to terminate the Direct Connect link at the Direct Connect location. Which three factors that must be supported should you consider when choosing the customer router? (Choose three.)

A) 802.1q trunking
B) 802.1ax or 802.3ad link aggregation
C) OSPF
D) BGP
E) single-mode optical fiber connectivity
F) 1-Gbps copper connectivity
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
10
You have a three-tier web application with separate subnets for Web, Applications, and Database tiers. Your CISO suspects your application will be the target of malicious activity. You are tasked with notifying the security team in the event your application is port scanned by external systems. Which two AWS Services cloud you leverage to build an automated notification system? (Choose two.)

A) Internet gateway
B) VPC Flow Logs
C) AWS CloudTrail
D) Lambda
E) AWS Inspector
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
11
Your organization uses a VPN to connect to your VPC but must upgrade to a 1-G AWS Direct Connect connection for stability and performance. Your telecommunications provider has provisioned the circuit from your data center to an AWS Direct Connect facility and needs information on how to cross-connect (e.g., which rack/port to connect). What is the AWS-recommended procedure for providing this information?

A) Create a support ticket. Provide your AWS account number and telecommunications company's name and where you need the Direct Connect connection to terminate.
B) Create a new connection through your AWS Management Console and wait for an email from AWS with information.
C) Ask your telecommunications provider to contact AWS through an AWS Partner Channel. Provide your AWS account number.
D) Contact an AWS Account Manager and provide your AWS account number, telecommunications company's name, and where you need the Direct Connect connection to terminate.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
12
A Lambda function needs to access the private address of an Amazon ElastiCache cluster in a VPC. The Lambda function also needs to write messages to Amazon SQS. The Lambda function has been configured to run in a subnet in the VPC. Which of the following actions meet the requirements? (Choose two.)

A) The Lambda function needs an IAM role to access Amazon SQS
B) The Lambda function must route through a NAT gateway or NAT instance in another subnet to access the public SQS API.
C) The Lambda function must be assigned a public IP address to access the public Amazon SQS API.
D) The ElastiCache server outbound security group rules must be configured to permit the Lambda function's security group.
E) The Lambda function must consume auto-assigned public IP addresses but not elastic IP addresses.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
13
Your organization leverages an IP Address Management (IPAM) product to manage IP address distribution. The IPAM exposes an API. Development teams use CloudFormation to provision approved reference architectures. At deployment time, IP addresses must be allocated to the VPC. When the VPC is deleted, the IPAM must reclaim the VPC's IP allocation. Which method allows for efficient, automated integration of the IPAM with CloudFormation?

A) AWS CloudFormation parameters using the "Ref::" intrinsic function
B) AWS CloudFormation custom resource using an AWS Lambda invocation.
C) CloudFormation::OpsWorks::Stack with custom Chef configuration.
D) AWS CloudFormation parameters using the "Fn::FindInMap" intrinsic function.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
14
You ping an Amazon Elastic Compute Cloud (EC2) instance from an on-premises server. VPC Flow Logs record the following: 2 123456789010 eni-1235b8ca 10.123.234.78 172.11.22.33 0 0 1 8 672 1432917027 1432917142 ACCEPT OK 2 123456789010 eni-1235b8ca 172.11.22.33 10.123.234.78 0 0 1 4 336 1432917027 1432917082 ACCEPT OK 2 123456789010 eni-1235b8ca 172.11.22.33 10.123.234.78 0 0 1 4 336 1432917094 1432917142 REJECT OK Why are ICMP responses not received by the on-premises system?

A) The inbound network access control list is blocking the traffic
B) The outbound network access control list is blocking the traffic
C) The inbound security group is blocking the traffic.
D) The outbound security group is blocking the traffic.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
15
You run a well-architected, multi-AZ application in the eu-central-1 (Frankfurt) AWS region. The application is hosted in a VPC and is only accessed from the corporate network. To support large volumes of data transfer and administration of the application, you use a single 10-Gbps AWS Direct Connect connection with multiple private virtual interfaces. As part of a review, you decide to improve the resilience of your connection to AWS and make sure that any additional connectivity does not share the same Direct Connect routers at AWS. You need to provide the best levels of resilience to meet the application's needs. Which two options should you consider? (Choose two.)

A) Install a second 10-Gbps Direct Connect connection to the same Direct Connection location.
B) Deploy an IPsec VPN over a public virtual interface on a new 10-Gbps Direct Connect connection.
C) Install a second 10-Gbps Direct Connect connection to a Direct Connect location in eu-west-1.
D) Deploy an IPsec VPN over the Internet to the eu-west-1 region for diversity.
E) Install a second 10-Gbps Direct Connect connection to a second Direct Connect location for eu-central-1.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
16
Your organization runs a popular e-commerce application deployed on AWS that uses autoscaling in conjunction with an Elastic Load balancing (ELB) service with an HTTPS listener. Your security team reports that an exploitable vulnerability has been discovered in the encryption protocol and cipher that your site uses. Which step should you take to fix this problem?

A) Generate new SSL certificates for all web servers and replace current certificates.
B) Change the security policy on the ELB to disable vulnerable protocols and ciphers.
C) Generate new SSL certificates and use ELB to front-end the encrypted traffic for all web servers.
D) Leverage your current configuration management system to update SSL policy on all web servers.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
17
You are designing the network infrastructure for an application server in Amazon VPC. Users will access all the application instances from the Internet and from an on-premises network. The on-premises network is connected to your VPC over an AWS Direct Connect link. How should you design routing to meet these requirements?

A) Configure a single routing table with two default routes: one to the Internet via an IGW, the other to the on-premises network via the VGW. Use this routing table across all subnets in your VPC.
B) Configure two routing tables: one that has a default route via the IGW, and another that has a default route via the VGW. Associate both routing tables with each VPC subnet.
C) Configure a single routing table with a default route via the IGW. Propagate a default route via BGP on the AWS Direct Connect customer router. Associate the routing table with all VPC subnet.
D) Configure a single routing table with a default route via the IGW. Propagate specific routes for the on-premises networks via BGP on the AWS Direct Connect customer router. Associate the routing table with all VPC subnets.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
18
Your company's policy requires that all VPCs peer with a "common services: VPC. This VPC contains a fleet of layer 7 proxies and an Internet gateway. No other VPC is allowed to provision an Internet gateway. You configure a new VPC and peer with the common service VPC as required by policy. You launch an Amazon EC2. Windows instance configured to forward all traffic to the layer 7 proxies in the common services VPC. The application on this server should successfully interact with Amazon S3 using its properly configured AWS Identity and Access Management (IAM) role. However, Amazon S3 is returning 403 errors to the application. Which step should you take to enable access to Amazon S3?

A) Update the S3 bucket policy with the private IP address of the instance.
B) Exclude 169.254.169.0/24 from the instance's proxy configuration.
C) Configure a VPC endpoint for Amazon S3 in the same subnet as the instance.
D) Update the CORS configuration for Amazon S3 to allow traffic from the proxy.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
19
You need to set up an Amazon Elastic Compute Cloud (EC2) instance for an application that requires the lowest latency and the highest packet-per-second network performance. The application will talk to other servers in a peered VPC. Which two of the following components should be part of the design? (Choose two.)

A) Select an instance with support for single root I/O virtualization.
B) Select an instance that has support for multiple ENIs.
C) Ensure that the instance supports jumbo frames and set 9001 MTU.
D) Select an instance with Amazon Elastic Block Store (EBS)-optimization.
E) Ensure that proper OS drivers are installed.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
20
An organization runs a consumer-facing website on AWS. The Amazon EC2-based web fleet is load balanced using the AWS Application Load Balancer, Amazon Route 53 is used to provide the public DNS services. The following URLs need to server content to end users: test.example.com web.example.com example.com Based on this information, what combination of services must be used to meet the requirement? (Choose two.)

A) Path condition in ALB listener to route example.com to appropriate target groups.
B) Host condition in ALB listener to route *.example.com to appropriate target groups.
C) Host condition in ALB listener to route example.com to appropriate target groups.
D) Path condition in ALB listener to route *.example.com to appropriate target groups.
E) Host condition in ALB listener to route .example.com to appropriate target groups.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
21
You have multiple Amazon Elastic Compute Cloud (EC2) instances running a web server in a VPC configured with security groups and NACL. You need to ensure layer 7 protocol level logging of all network traffic (ACCEPT/REJECT) on the instances. What should be enabled to complete this task?

A) CloudWatch Logs at the VPC level
B) Packet sniffing at the instance level
C) VPC flow logs at the subnet level
D) Packet sniffing at the VPC level
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
22
Your organization requires strict adherence to a change control process for its Amazon Elastic Compute Cloud (EC2) and VPC environments. The organization uses AWS CloudFormation as the AWS service to control and implement changes. Which combination of three services provides an alert for changes made outside of AWS CloudFormation? (Choose three.)

A) AWS Config
B) AWS Simple Notification Service
C) AWS CloudWatch metrics
D) AWS Lambda
E) AWS CloudFormation
F) AWS Identify and Access Management
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
23
An organization launched an IPv6-only web portal to support IPv6-native mobile clients. Front-end instances launch in an Amazon VPC associated with an appropriate IPv6 CIDR. The VPC IPv4 CIDR is fully utilized. A single subnet exists in each of two Availability Zones with appropriately configured IPv6 CIDR associations. Auto Scaling is properly configured, and no Elastic Load Balancing is used. Customers say the service is unavailable during peak load times. The network engineer attempts to launch an instance manually and receives the following message: "There are not enough free addresses in subnet 'subnet-12345678' to satisfy the requested number of instances." What action will resolve the availability problem?

A) Create a new subnet using a VPC secondary IPv6 CIDR, and associate an IPv6 CIDR. Include the new subnet in the Auto Scaling group.
B) Create a new subnet using a VPC secondary IPv4 CIDR, and associate an IPv6 CIDR. Include the new subnet in the Auto Scaling group.
C) Resize the IPv6 CIDR on each of the existing subnets. Modify the Auto Scaling group maximum number of instances.
D) Add a secondary IPv4 CIDR to the Amazon VPC. Assign secondary IPv4 address space to each of the existing subnets.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
24
You operate a production VPC with both a public and a private subnet. Your organization maintains a restricted Amazon S3 bucket to support this production workload. Only Amazon EC2 instances in the private subnet should access the bucket. You implement VPC endpoints(VPC-E) for Amazon S3 and remove the NAT that previously provided a network path to Amazon S3. The default VPC-E policy is applied. Neither EC2 instances in the public or private subnets are able to access the S3 bucket. What should you do to enable Amazon S3 access from EC2 instances in the private subnet?

A) Add the CIDR address range of the private subnet to the S3 bucket policy.
B) Add the VPC-E identified to the S3 bucket policy.
C) Add the VPC identifier for the production VPC to the S3 bucket policy.
D) Add the VPC-E identifier for the production VPC to endpoint policy.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
25
A Network Engineer is designing a new system on AWS that will take advantage of Amazon CloudFront for both content caching and for protecting the underlying origin. There is concern that an external agency might be able to access the IP addresses for the application's origin and then attack the origin despite it being served by CloudFront. Which of the following solutions provides the strongest level of protection to the origin?

A) Use an IP whitelist rule in AWS WAF within CloudFront to ensure that only known-client IPs are able to access the application.
B) Configure CloudFront to use a custom header and configure an AWS WAF rule on the origin's Application Load Balancer to accept only traffic that contains that header.
C) Configure an AWS Lambda@Edge function to validate that the traffic to the Application Load Balancer originates from CloudFront.
D) Attach an origin access identity to the CloudFront origin that allows traffic to the origin that originates from only CloudFront.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
26
You deploy an Amazon EC2 instance that runs a web server into a subnet in a VPC. An Internet gateway is attached, and the main route table has a default route (0.0.0.0/0) configured with a target of the Internet gateway. The instance has a security group configured to allow as follows: Protocol: TCP Port: 80 inbound, nothing outbound The Network ACL for the subnet is configured to allow as follows: When you try to browse to the web server, you receive no response. Which additional step should you take to receive a successful response?

A) Add an entry to the security group outbound rules for Protocol: TCP, Port Range: 80
B) Add an entry to the security group outbound rules for Protocol: TCP, Port Range: 1024-65535
C) Add an entry to the Network ACL outbound rules for Protocol: TCP, Port Range: 80
D) Add an entry to the Network ACL outbound rules for Protocol: TCP, Port Range: 1024-65535
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
27
You have a global corporate network with 153 individual IP prefixes in your internal routing table. You establish a private virtual interface over AWS Direct Connect to a VPC that has an Internet gateway (IGW). All instances in the VPC must be able to route to the Internet via an IGW and route to the global corporate network via the VGW. How should you configure your on-premises BGP peer to meet these requirements?

A) Configure AS-Prepending on your BGP session
B) Summarize your prefix announcement to less than 100
C) Announce a default route to the VPC over the BGP session
D) Enable route propagation on the VPC route table
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
28
You deploy your Internet-facing application is the us-west-2(Oregon) region. To manage this application and upload content from your corporate network, you have a 1-Gbps AWS Direct Connect connection with a private virtual interface via one of the associated Direct Connect locations. In normal operation, you use approximately 300 Mbps of the available bandwidth, which is more than your Internet connection from the corporate network. You need to deploy another identical instance of the application is us-east-1(N Virginia) as soon as possible. You need to use the benefits of Direct Connect. Your design must be the most effective solution regarding cost, performance, and time to deploy. Which design should you choose?

A) Use the inter-region capabilities of Direct Connect to establish a private virtual interface from us-west-2 Direct Connect location to the new VPC in us-east-1.
B) Deploy an IPsec VPN over your corporate Internet connection to us-east-1 to provide access to the new VPC.
C) Use the inter-region capabilities of Direct Connect to deploy an IPsec VPN over a public virtual interface to the new VPC in us-east-1.
D) Use VPC peering to connect the existing VPC in us-west-2 to the new VPC in us-east-1, and then route traffic over Direct Connect and transit the peering connection.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
29
You are building an application that provides real-time audio and video services to customers on the Internet. The application requires high throughput. To ensure proper audio and video transmission, minimal latency is required. Which of the following will improve transmission quality?

A) Enable enhanced networking
B) Select G2 instance types
C) Enable jumbo frames
D) Use multiple elastic network interfaces
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
30
Your security team implements a host-based firewall on all of your Amazon Elastic Compute Cloud (EC2) instances to block all outgoing traffic. Exceptions must be requested for each specific requirement. Until you request a new rule, you cannot access the instance metadata service. Which firewall rule should you request to be added to your instances to allow instance metadata access?

A) Inbound; Protocol tcp; Source [Instance's EIP]; Destination 169.254.169.254
B) Inbound; Protocol tcp; Destination 169.254.169.254; Destination port 80
C) Outbound; Protocol tcp; Destination 169.254.169.254; Destination port 80
D) Outbound; Protocol tcp; Destination 169 .254.169.254; Destination port 443
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
31
Your company operates a single AWS account. A common services VPC is deployed to provide shared services, such as network scanning and compliance tools. Each AWS workload uses its own VPC, and each VPC must peer with the common services VPC. You must choose the most efficient and cost effective approach. Which approach should be used to automate the required VPC peering?

A) AWS CloudTrail integration with Amazon CloudWatch Logs to trigger a Lambda function.
B) An OpsWorks Chef recipe to execute a command-line peering request.
C) Cfn-init with AWS CloudFormation to execute a command-line peering request.
D) An AWS CloudFormation template that includes a peering request.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
32
A network engineer is managing two AWS Direct Connect connections. Each connection has a public virtual interface configured with a private ASN. The engineer wants to configure active/passive routing between the Direct Connect connections to access Amazon public endpoints. What BGP configuration is required for the on-premises equipment? (Choose two.)

A) Use Local Pref to control outbound traffic.
B) Use AS Prepending to control inbound traffic.
C) Use eBGP multi-hop between loopback interfaces.
D) Use BGP Communities to control outbound traffic.
E) Advertise more specific prefixes over one Direct Connect connection.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
33
An organization will be extending its existing on-premises infrastructure into the cloud. The design consists of a transit VPC that contains stateful firewalls that will be deployed in a highly available configuration across two Availability Zones for automatic failover. What MUST be configured for this design to work? (Choose two.)

A) A different Autonomous System Number (ASN) for each firewall.
B) Border Gateway Protocol (BGP) routing
C) Autonomous system (AS) path prepending
D) Static routing
E) Equal-cost multi-path routing (ECMP)
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
34
Your organization has a newly installed 1-Gbps AWS Direct Connect connection. You order the cross-connect from the Direct Connect location provider to the port on your router in the same facility. To enable the use of your first virtual interface, your router must be configured appropriately. What are the minimum requirements for your router?

A) 1-Gbps Multi Mode Fiber Interface, 802.1Q VLAN, Peer IP Address, BGP Session with MD5.
B) 1-Gbps Single Mode Fiber Interface, 802.1Q VLAN, Peer IP Address, BGP Session with MD5.
C) IPsec Parameters, Pre-Shared key, Peer IP Address, BGP Session with MD5
D) BGP Session with MD5, 802.1Q VLAN, Route-Map, Prefix List, IPsec encrypted GRE Tunnel
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
35
The Payment Card Industry Data Security Standard (PCI DSS) merchants that handle credit card data must use strong cryptography. These merchants must also use security protocols to protect sensitive data during transmission over public networks. You are migrating your PCI DSS application from on-premises SSL appliance and Apache to a VPC behind Amazon CloudFront. How should you configure CloudFront to meet this requirement?

A) Configure the CloudFront Cache Behavior to require HTTPS and the CloudFront Origin's Protocol Policy to 'Match Viewer'.
B) Configure the CloudFront Cache Behavior to allow TCP connections and to forward all requests to the origin without TLS termination at the edge.
C) Configure the CloudFront Cache Behavior to require HTTPS and to forward requests to the origin via AWS Direct Connect.
D) Configure the CloudFront Cache Behavior to redirect HTTP requests to HTTPS and to forward request to the origin via the Amazon private network.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
36
Your company maintains an Amazon Route 53 private hosted zone. DNS resolution is restricted to a single, pre-existing VPC. For a new application deployment, you create an additional VPC in the same AWS account. Both this new VPC and your on-premises DNS infrastructure must resolve records in the existing private hosted zone. Which two activities are required to enable DNS resolution both within the new VPC and from the on-premises infrastructure? (Choose two.)

A) Update the DHCP options set for the new VPC with the Route 53 nameserver IP addresses.
B) Update the Route 53 private hosted zone's VPC associations to include the new VPC.
C) Launch Amazon EC2-based DNS proxies in the new VPC. Specify the proxies as forwarders in the on-premises DNS.
D) Update the on-premises DNS to include forwarders to the Route 53 nameserver IP addresses.
E) Launch Amazon EC2-based DNS proxies in the new VPC. Specify the proxies in the DHCP options set.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
37
You are configuring a virtual interface for access to your VPC on a newly provisioned 1-Gbps AWS Direct Connect connection. Which two configuration values do you need to provide? (Choose two.)

A) Public AS number
B) VLAN ID
C) IP prefixes to advertise
D) Direct Connect location
E) Virtual private gateway
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
38
A company is about to migrate an application from its on-premises data center to AWS. As part of the planning process, the following requirements involving DNS have been identified. On-premises systems must be able to resolve the entries in an Amazon Route 53 private hosted zone. Amazon EC2 instances running in the organization's VPC must be able to resolve the DNS names of on-premises systems The organization's VPC uses the CIDR block 172.16.0.0/16. Assuming that there is no DNS namespace overlap, how can these requirements be met?

A) Change the DHCP options set for the VPC to use both the Amazon-provided DNS server and the on-premises DNS systems. Configure the on-premises DNS systems with a stub-zone, delegating the name server 172.16.0.2 as authoritative for the Route 53 private hosted zone.
B) Deploy and configure a set of EC2 instances into the company VPC to act as DNS proxies. Configure the proxies to forward queries for the on-premises domain to the on-premises DNS systems, and forward all other queries to 172.16.0.2. Change the DHCP options set for the VPC to use the new DNS proxies. Configure the on-premises DNS systems with a stub-zone, delegating the name server 172.16.0.2 as authoritative for the Route 53 private hosted zone.
C) Deploy and configure a set of EC2 instances into the company VPC to act as DNS proxies. Configure the proxies to forward queries for the on-premises domain to the on-premises DNS systems, and forward all other queries to the Amazon-provided DNS server (172.16.0.2). Change the DHCP options set for the VPC to use the new DNS proxies. Configure the on-premises DNS systems with a stub-zone, delegating the proxies as authoritative for the Route 53 private hosted zone.
D) Change the DHCP options set for the VPC to use both the on-premises DNS systems. Configure the on-premises DNS systems with a stub-zone, delegating the Route 53 private hosted zone's name servers as authoritative for the Route 53 private hosted zone.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
39
A corporate network routing table contains 624 individual RFC 1918 and public IP prefixes. You have two AWS Direct Connect connectors. You con?gure a private virtual interface on both connections to a virtual private gateway. The virtual private gateway is not currently attached to a VPC. Neither BGP session will maintain the Established state on the customer router. The AWS Management Console reports the private virtual interfaces as Down. What could you do to address the problem so that the AWS Management Console reports the private virtual interface as Available ?

A) Attach the virtual private gateway to a VPC and enable route propagation.
B) Filter the public IP pre?xes on the corporate network from the private virtual interface.
C) Change the BGP advertisements from the corporate network to only be a default route.
D) Attach the second virtual interface to an alternative virtual private gateway.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
40
A department in your company has created a new account that is not part of the organization's consolidated billing family. The department has also created a VPC for its workload. Access is restricted by network access control lists to the department's on-premises private IP allocation. An AWS Direct Connect private virtual interface for this VPC advertises a default route to the company network. When the department downloads data from an Amazon Elastic Compute Cloud(EC2) instance in its new VPC, what are the associated charges?

A) The company pays Internet Data Out charges.
B) The company pays AWS Direct Connect Data Out charges.
C) The department pays Internet Data Out charges.
D) The department pays AWS Direct Connect Data Out charges.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
41
An organization has three AWS accounts with each containing VPCs in Virginia, Canada and the Sydney regions. The organization wants to determine whether all available Elastic IP addresses (EIPs) in these accounts are attached to Amazon EC2 instances or in use elastic network interfaces (ENIs) in all of the specified regions for compliance and cost-optimization purposes. Which of the following meets the requirements with the LEAST management overhead?

A) Use an Amazon CloudWatch Events rule to schedule an AWS Lambda function in each account in all three regions to find the unattached and unused EIPs.
B) Use a CloudWatch event bus to schedule Lambda functions in each account in all three regions to find the unattached and unused EIPs.
C) Add an AWS managed, EIP-attached AWS Config rule in each region in all three accounts to find unattached and unused EIPs.
D) Use AWS CloudFormation StackSets to deploy an AWS Config EIP-attached rule in all accounts and regions to find the unattached and unused EIPs.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
42
A Systems Administrator is designing a hybrid DNS solution with spilt-view. The apex-domain "example.com" should be served through name servers across multiple top-level domains (TLDs). The name server for subdomain "dev.example.com" should reside on-premises. The administrator has decided to use Amazon Route 53 to achieve this scenario. What procedurals steps must be taken to implement the solution?

A) Use a Route 53 public hosted zone for example.com and a private hosted zone for dev.example.com
B) Use a Route 53 public and private hosted zone for example.com and perform subdomain delegation for dev.example.com
C) Use a Route 53 public hosted zone for example.com and perform subdomain delegation for dev.example.com
D) Use a Route 53 private hosted zone for example.com and perform subdomain delegation for dev.example.com
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
43
A Network Engineer is troubleshooting a network connectivity issue for an instance within a public subnet that cannot connect to the internet. The first step the Engineer takes is to SSH to the instance via a local bastion within the VPC and runs an ifconfig command to inspect the IP addresses configured on the instance. The output is as follows: <strong>A Network Engineer is troubleshooting a network connectivity issue for an instance within a public subnet that cannot connect to the internet. The first step the Engineer takes is to SSH to the instance via a local bastion within the VPC and runs an ifconfig command to inspect the IP addresses configured on the instance. The output is as follows:   The Engineer notices that the command output does not contain a public IP address. In the AWS Management Console, the public subnet has a route to the internet gateway. The instance also has a public IP address associated with it. What should the Engineer do next to troubleshoot this situation?</strong> A) Configure the public IP on the interface. B) Disable source/destination checking for the instance. C) Associate an Elastic IP address to the interface. D) Evaluate the security groups and the network access control list. The Engineer notices that the command output does not contain a public IP address. In the AWS Management Console, the public subnet has a route to the internet gateway. The instance also has a public IP address associated with it. What should the Engineer do next to troubleshoot this situation?

A) Configure the public IP on the interface.
B) Disable source/destination checking for the instance.
C) Associate an Elastic IP address to the interface.
D) Evaluate the security groups and the network access control list.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
44
A company has an application running on Amazon EC2 instances in a private subnet that connects to a third-party service provider's public HTTP endpoint through a NAT gateway. As request rates increase, new connections are starting to fail. At the same time, the ErrorPortAllocation Amazon CloudWatch metric count for the NAT gateway is increasing. Which of the following actions should improve the connectivity issues? (Choose two.)

A) Allocate additional elastic IP addresses to the NAT gateway.
B) Request that the third-party service provider implement HTTP keepalive.
C) Implement TCP keepalive on the client instances.
D) Create additional NAT gateways and update the private subnet route table to introduce the new NAT gateways.
E) Create additional NAT gateways in the public subnet and split client instances into multiple private subnets, each with a route to a different NAT gateway.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
45
An organization has created a web application inside a VPC and wants to make it available to 200 client VPCs. The client VPCs are in the same region but are owned by other business units within the organization. What is the best way to meet this requirement, without making the application publicly available?

A) Configure the application as an AWS PrivateLink-powered service, and have the client VPCs connect to the endpoint service by using an interface VPC endpoint.
B) Enable VPC peering between the web application VPC and all client VPCs.
C) Deploy the web application behind an internet-facing Application Load Balancer and control which clients have access by using security groups.
D) Deploy the web application behind an internal Application Load Balancer and control which clients have access by using security groups.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
46
A company uses a single connection to the internet when connecting its on-premises location to AWS. It has selected an AWS Partner Network (APN) Partner to provide a point-to-point circuit for its first-ever 10 Gbps AWS Direct Connect connection. What steps must be taken to order the cross-connect at the Direct Connect location?

A) Obtain the LOA/CFA from the APN Partner when ordering connectivity. Upload it to the AWS Management Console when creating a new Direct Connect connection. AWS will ensure that the cross-connect is installed.
B) Obtain the LOA/CFA from the AWS Management Console when ordering the Direct Connect connection. Provide it to the APN Partner when ordering connectivity. The Direct Connect partner will ensure that the cross-connect is installed.
C) Obtain one LOA/CFA each from the AWS Management Console and the APN Partner. Provide both to the Facility Operator of the Direct Connect location. The Facility Operator will ensure that the cross-connect is installed.
D) Identify the APN Partner in the AWS Management Console when creating the Direct Connect connection. Provide the resulting Connection ID to the APN Partner, who will ensure that the cross-connect is installed.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
47
A Network Engineer has enabled VPC Flow Logs to troubleshoot an ICMP reachability issue for an echo reply from an Amazon EC2 instance. The flow logs reveal an ACCEPT record for the request from the client to the EC2 instance, and a REJECT record for the response from the EC2 instance to the client. What is the MOST likely reason for there to be a REJECT record?

A) The security group is denying inbound ICMP.
B) The network ACL is denying inbound ICMP.
C) The security group is denying outbound ICMP.
D) The network ACL is denying outbound ICMP.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
48
An organization is replacing a tape backup system with a storage gateway. there is currently no connectivity to AWS. Initial testing is needed. What connection option should the organization use to get up and running at minimal cost?

A) Use an internet connection.
B) Set up an AWS VPN connection.
C) Provision an AWS Direct Connection private virtual interface.
D) Provision a Direct Connect public virtual interface.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
49
The Security department has mandated that all outbound traffic from a VPC toward an on-premises datacenter must go through a security appliance that runs on an Amazon EC2 instance. Which of the following maximizes network performance on AWS? (Choose two.)

A) Support for the enhanced networking drivers
B) Support for sending traffic over the Direct Connect connection
C) The instance sizes and families supported by the security appliance
D) Support for placement groups within the VPC
E) Security appliance support for multiple elastic network interfaces
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
50
A company's Network Engineering team is solely responsible for deploying VPC infrastructure using AWS CloudFormation. The company wants to give its Developers the ability to launch applications using CloudFormation templates so that subnets can be created using available CIDR ranges. What should be done to meet these requirements?

A) Create a CloudFormation templates with Amazon EC2 resources that rely on cfn-init and cfn-signals to inform the stack of available CIDR ranges.
B) Create a CloudFormation template with a custom resource that analyzes traffic activity in VPC Flow Logs and reports on available CIDR ranges.
C) Create a CloudFormation template that references the Fn::Cidr intrinsic function within a subnet resource to select an available CIDR range.
D) Create a CloudFormation template with a custom resource that uses AWS Lambda and Amazon DynamoDB to manage available CIDR ranges.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
51
A network engineer has configured a private hosted zone using Amazon Route 53. The engineer needs to configure health checks for record sets within the zone that are associated with instances. How can the engineer meet the requirements?

A) Configure a Route 53 health check to a private IP associated with the instances inside the VPC to be checked.
B) Configure a Route 53 health check pointing to an Amazon SNS topic that notifies an Amazon CloudWatch alarm when the Amazon EC2 StatusCheckFailed metric fails.
C) Create a CloudWatch metric that checks the status of the EC2 StatusCheckFailed metric, add an alarm to the metric, and then create a health check that is based on the state of the alarm.
D) Create a CloudWatch alarm for the StatusCheckFailed metric and choose Recover this instance, selecting a threshold value of 1.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
52
An organization is using a VPC endpoint for Amazon S3. When the security group rules for a set of instances were initially configured, access was restricted to allow traffic only to the IP addresses of the Amazon S3 API endpoints in the region from the published JSON file. The application was working properly, but now is logging a growing number of timeouts when connecting with Amazon S3. No internet gateway is configured for the VPC. Which solution will fix the connectivity failures with the LEAST amount of effort?

A) Create a Lambda function to update the security group based on AmazonIPSpaceChanged notifications.
B) Update the VPC routing to direct Amazon S3 prefix-list traffic to the VPC endpoint using the route table APIs.
C) Update the application server's outbound security group to use the prefix-list for Amazon S3 in the same region.
D) Create an additional VPC endpoint for Amazon S3 in the same route table to scale the concurrent connections to Amazon S3.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
53
A company has two redundant AWS Direct Connect connections to a VPC. The VPC is configured using BGP metrics so that one Direct Connect connection is used as the primary traffic path. The company wants the primary Direct Connect connection to fail to the secondary in less than one second. What should be done to meet this requirement?

A) Configure BGP on the company's router with a keep-alive to 300 ms and the BGP hold timer to 900 ms.
B) Enable Bidirectional Forwarding Detection (BFD) on the company's router with a detection minimum interval of 300 ms and a BFD liveness detection multiplier of 3.
C) Enable Dead Peer Detection (DPD) on the company's router with a detection minimum interval of 300 ms and a DPD liveliness detection multiplier of 3.
D) Enable Bidirectional Forwarding Detection (BFD) echo mode on the company's router and disable sending the Internet Control Message Protocol (ICMP) IP packet requests.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
54
An organization is migrating its on-premises applications to AWS by using a lift-and-shift approach, taking advantage of managed AWS services wherever possible. The company must be able to edit the application code during the migration phase. One application is a traditional three-tier application, consisting of a web presentation tier, an application tier, and a database tier. The external calling client applications need their sessions to remain sticky to both the web and application nodes that they initially connect to. Which load balancing solution would allow the web and application tiers to scale horizontally independent from one another other?

A) Use an Application Load Balancer at the web tier and a Classic Load Balancer at the application tier. Set session stickiness on both, but update the application code to create an application-controlled cookie on the Classic Load Balancer.
B) Use an Application Load Balancer at both the web and application tiers, setting session stickiness at the target group level for both tiers.
C) Deploy a web node and an application node as separate containers on the same host, using task linking to create a relationship between the pair. Add an Application Load Balancer with session stickiness in front of all web node containers.
D) Use a Network Load Balancer at the web tier, and an Application Load Balancer at the application tier. Enable session stickiness on the Application Load Balancer, but take advantage of the native WebSockets protocols available to the Network Load Balancer.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
55
A company is connecting to a VPC over an AWS Direct Connect using a private VIF, and a dynamic VPN connection as a backup. The company's Reliability Engineering team has been running failover and resiliency tests on the network and the existing VPC by simulating an outage situation on the Direct Connect connection. During the resiliency tests, traffic failed to switch over to the backup VPN connection. How can this failure be troubleshot?

A) Ensure that Bidirectional Forwarding Detection is enabled on the Direct Connect connection
B) Confirm that the same routes are being advertised over both the VPN and Direct Connect.
C) Reconfigure the Direct Connect session from static routes to Border Gateway Protocol (BGP) peering.
D) Configure a virtual private gateway for the VPN and another virtual private gateway for Direct Connect.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
56
A network architect is designing an internet website. It has web, application, and database tiers that will run in AWS. The website uses Amazon DynamoDB. Which architecture will minimize public exposure of the back-end instances?

A) A VPC with public subnets for the NLB, public subnets for the web tier, private subnets for the application tier, and private subnets for DynamoDB.
B) A VPC with public subnets for the ALB, private subnets for the web tier, and private subnets for the application tier. The application tier connects DynamoDB through a VPC endpoint.
C) A VPC with public subnets for the ALB, public subnets for the web tier, private subnets for the application tier, and private subnets for DynamoDB.
D) A VPC with public subnets for the NLB, private subnets for the web tier, and public subnets for the application tier. The application tier connects DynamoDB through a VPC endpoint.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
57
An architecture is being designed to support an Amazon WorkSpaces deployment of 1,000 desktops. Which architecture will support this deployment while allowing for future expansion?

A) A VPC with a /16 CIDR and one /21 subnet
B) A VPC with a /20 CIDR and two /21 subnets
C) A VPC with a /16 CIDR and one /22 subnet
D) A VPC with a /20 CIDR and two /23 subnets
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
58
A company deployed its production Amazon VPC using CIDR block 33.16.0.0/16. The company has nearly depleted its addresses and now needs to extend the VPC network. Which CIDR blocks meet the company's requirement to extend the VPC network with a secondary CIDR? (Choose two.)

A) 33.17.0.0/16
B) 172.16.0.0/18
C) 100.70.0.0/17
D) 192.168.1.0/24
E) 10.0.0.0/8
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
59
Changes made to a security group attached to an Application Load Balancer resulted in connectivity issues for a company's production web application. The Network Engineer needs to lock down permissions for the company's AWS account, automate auditing for any changes, and set up notifications. What actions should accomplish this?

A) Configure IAM user policies to lock down permissions for specific users. Enable AWS CloudTrail to identify API calls from users. Use AWS Config to audit any changes, and configure Amazon SNS to send notifications.
B) Configure IAM user policies to lock down permissions for specific users. Enable AWS CloudTrail to identify the API calls from users. Configure AWS CodeCommit to audit any changes in configurations, and configure Amazon SNS to send notifications.
C) Configure IAM user policies to lock down permissions for specific users. Enable AWS CloudTrail to identify the API calls from users. Configure Amazon Macie to use machine learning to identify any configuration changes, and configure Amazon SNS to send notifications.
D) Configure IAM role policies to lock down permissions for specific users. Configure Amazon GuardDuty to audit and monitor configuration changes, and configure Amazon SNS to send notifications.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
60
A company's web application is deployed on Amazon EC2 instances behind a public Application Load Balancer. The application flags malicious requests and uses an AWS Lambda function to add the offending IP addresses to the network ACL to block any further request for 24 hours. Recently, the application has been receiving more malicious requests, which causes the network ACL to reach its limit of allowed entries. Which action should be taken to block more IP addresses, without compromising the existing security requirements?

A) Update the AWS Lambda function to remove blocked entries from the network ACL after 2 hours.
B) Update the AWS Lambda function to block malicious IPs in security groups rather than the network ACL.
C) Update the AWS Lambda function to block malicious IPs in AWS WAF attached to the Application Load Balancer.
D) Update the AWS Lambda function to add an additional network ACL to the subnets once the limit for the previous ones has been reached.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
61
Your hybrid networking environment consists of two application VPCs, a shared services VPC, and your corporate network. The corporate network is connected to the shared services VPC via an IPsec VPN with dynamic (BGP) routing enabled. The applications require access to a common authentication service in the shared services VPC. You need to enable native network access from the corporate network to both application VPCs. Which step should you take to meet the requirements?

A) Use VPC peering to peer the application VPCs with the shared services VPC, and enable associated routing in the shared services VPC via the corporate VPN.
B) Configure an IPsec VPN between the virtual private gateway in each application VPC to the virtual private gateway in the shared services VPC.
C) Configure additional IPsec VPNs for each application VPC back to the corporate network, and enable VPC peering to the shared services VPC.
D) Enable CloudHub functionality to route traffic between the three VPCs and the corporate network using dynamic BGP routing.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
62
You need to set up an Amazon Elastic Compute Cloud (EC2) instance for an application that requires the lowest latency and the highest packet-per-second network performance. The application will talk to other servers in a peered VPC. Which two of the following components should be part of the design? (Select two.)

A) Select an instance with support for single root I/O virtualization.
B) Select an instance that has support for multiple ENIs.
C) Ensure that the instance supports jumbo frames and set 9001 MTU.
D) Select an instance with Amazon Elastic Block Store (EBS)-optimization.
E) Ensure that proper OS drivers are installed.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
63
Your organization's corporate website must be available on www.acme.com and acme.com. How should you configure Amazon Route 53 to meet this requirement?

A) Configure acme.com with an ALIAS record targeting the ELB. www.acme.com with an ALIAS record targeting the ELB.
B) Configure acme.com with an A record targeting the ELB. www.acme.com with a CNAME record targeting the acme.com record.
C) Configure acme.com with a CNAME record targeting the ELB. www.acme.com with a CNAME record targeting the acme.com record.
D) Configure acme.com using a second ALIAS record with the ELB target. www.acme.com using a PTR record with the acme.com record target.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
64
You currently use a single security group assigned to all nodes in a clustered NoSQL database. Only your cluster members in one region must be able to connect to each other. This security group uses a self-referencing rule using the cluster security group's group-id to make it easier to add or remove nodes from the cluster. You need to make this database comply with out-of-region disaster recovery requirements and ensure that the network traffic between the nodes is encrypted when travelling between regions. How should you enable secure cluster communication while deploying additional cluster members in another AWS region?

A) Create an IPsec VPN between AWS regions, use private IP addresses to route traffic, and create cluster security group rules that reference each other's security group-id in each region.
B) Create an IPsec VPN between AWS regions, use private IP addresses to route traffic, and create cluster security group CIDR-based rules that correspond with the VPC CIDR in the other region.
C) Use public IP addresses and TLS to securely communicate between cluster nodes in each AWS region, and create cluster security group CIDR-based rules that correspond with the VPC CIDR in the other region.
D) Use public IP addresses and TLS to securely communicate between cluster nodes in each AWS region, and create cluster security group rules that reference each other's security group-id in each region.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
65
The Web Application Development team is worried about malicious activity from 200 random IP addresses. Which action will ensure security and scalability from this type of threat?

A) Use inbound security group rules to block the IP addresses.
B) Use inbound network ACL rules to block the IP addresses.
C) Use AWS WAF to block the IP addresses.
D) Write iptables rules on the instance to block the IP addresses.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
66
You are preparing to launch Amazon WorkSpaces and need to configure the appropriate networking resources. What must be configured to meet this requirement?

A) At least two subnets in different Availability Zones.
B) A dedicated VPC with Active Directory Services.
C) An IPsec VPN to on-premises Active Directory
D) Network address translation for outbound traffic.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
67
A network engineer is managing two AWS Direct Connect connections. Each connection has a public virtual interface configured with a private ASN. The engineer wants to configure active/passive routing between the Direct Connect connections to access Amazon public endpoints. What BGP configuration is required for the on-premises equipment? (Select two.)

A) Use Local Pref to control outbound traffic.
B) Use AS Prepending to control inbound traffic.
C) Use eBGP multi-hop between loopback interfaces.
D) Use BGP Communities to control outbound traffic.
E) Advertise more specific prefixes over one Direct Connect connection.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
68
Your company has a 1-Gbps AWS Direct Connect connection to AWS. Your company needs to send traffic from on-premises to a VPC owned by a partner company. The connectivity must have minimal latency at the lowest price. Which of the following connectivity options should you choose?

A) Create a new Direct Connect connection, and set up a new circuit to connect to the partner VPC using a private virtual interface.
B) Create a new Direct Connect connection, and leverage the existing circuit to connect to the partner VPC.
C) Create a new private virtual interface, and leverage the existing connection to connect to the partner VPC.
D) Enable VPC peering and use your VPC as a transitive point to reach the partner VPC.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
69
You are deploying an EC2 instance in a private subnet that requires access to the Internet. One of the requirements for this solution is to restrict access to only particular URLs on a whitelist. In addition to the whitelisted URL, the instances should be able to access any Amazon S3 bucket in the same region via any URL. Which of the following solutions should you deploy? (Select two.)

A) Include s3.amazonaws.com in the whitelist.
B) Create a VPC endpoint for S3.
C) Run Squid proxy on a NAT instance.
D) Deploy a NAT gateway into your VPC.
E) Utilize a security group to restrict access.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
70
You need to set up a VPN between AWS VPC and your on-premises network. You create a VPN connection in the AWS Management Console, download the configuration file, and install it on your on-premises router. The tunnel is not coming up because of firewall restrictions on your router. Which two network traffic options should you allow through the firewall? (Select two.)

A) UDP port 500
B) IP protocol 50
C) IP protocol 5
D) TCP port 50
E) TCP port 500
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
71
An organization will be extending its existing on-premises infrastructure into the cloud. The design consists of a transit VPC that contains stateful firewalls that will be deployed in a highly available configuration across two Availability Zones for automatic failover. What MUST be configured for this design to work? (Select two.)

A) A different Autonomous System Number (ASN) for each firewall.
B) Border Gateway Protocol (BGP) routing
C) Autonomous system (AS) path prepending
D) Static routing
E) Equal-cost multi-path routing (ECMP)
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
72
A customer has set up multiple VPCs for Dev, Test, Prod, and Management. You need to set up AWS Direct Connect to enable data flow from on-premises to each VPC. The customer has monitoring software running in the Management VPC that collects metrics from the instances in all the other VPCs. Due to budget requirements, data transfer charges should be kept at minimum. Which design should be recommended?

A) Create a total of four private VIFs, one for each VPC owned by the customer, and route traffic between VPCs using the Direct Connect link.
B) Create a private VIF to the Management VPC, and peer this VPC to all other VPCs.
C) Create a private VIF to the Management VPC, and peer this VPC to all other VPCs, enable source/destination NAT in the Management VPC.
D) Create a total of four private VIFs, and enable VPC peering between all VPCs.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
73
You manage a web service that is used by client applications deployed in 300 offices worldwide. The web service architecture is an Elastic Load balancer (ELB) distributing traffic across four application servers deployed in an autoscaling group across two availability zones. The ELB is configured to use round robin, and sticky sessions are disabled. You have configured the NACLs and Security Groups to allow port 22 from your bastion host, and port 80 from 0.0.0.0/0. The client configuration is managed by each regional IT team. Upon inspection you find that a large amount of requests from incorrectly configured sites are causing a single application server to degrade. The remainder of the requests are equally distributed across all servers with no negative effects. What should you do to remedy the situation and prevent future occurrences?

A) Mark the affected instance as degraded in the ELB and raise it with the client application team.
B) Update the NACL to only allow port 80 to the application servers from the ELB servers.
C) Update the Security Groups to only allow port 80 to the application servers from the ELB.
D) Terminate the affected instance and allow Auto Scaling to create a new instance.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
74
A multinational organization has applications deployed in three different AWS regions. These applications must securely communicate with each other by VPN. According to the organization's security team, the VPN must meet the following requirements: AES 128-bit encryption SHA-1 hashing User access via SSL VPN PFS using DH Group 2 Ability to maintain/rotate keys and passwords Certificate-based authentication Which solution should you recommend so that the organization meets the requirements?

A) AWS hardware VPN between the virtual private gateway and customer gateway
B) A third-party VPN solution deployed from AWS Marketplace
C) A private MPLS solution from an international carrier
D) AWS hardware VPN between the virtual private gateways in each region
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
75
You are moving a two-tier application into an Amazon VPC. An Elastic Load Balancing (ELB) load balancer is configured in front of the application tier. The application tier is driven through RESTful interfaces. The data tier uses relational database service (RDS) MySQL. Company policy requires end-to-end encryption of all data in transit. What ELB configuration complies with the corporate encryption policy?

A) Configure the ELB load balancer protocol as HTTP. Configure the application instances for SSL termination. Configure Amazon RDS for SSL, and use REQUIRE SSL grants.
B) Configure the ELB protocols in TCP mode. Configure the application instances for SSL termination. Configure Amazon RDS for SSL, and use REQUIRE SSL grants.
C) Configure the ELB load balancer protocol as HTTPS. Offload application instance encryption to the load balancer. Install your SSL certificate on Amazon RDS, and configure SSL.
D) Configure the ELB protocols in SSL mode. Offload application instance encryption to the load balancer. Install your SSL/TLS certificate on Amazon RDS, and configure SSL.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
76
A company has 225 mobile and desktop devices and 300 partner VPNs that need access to an AWS VPC. VPN users should not be able to reach one another. Which approach will meet the technical and security requirements while minimizing costs?

A) Use the AWS IPsec VPN for the mobile, desktop, and partner VPN connections. Use network access control lists (Network ACLs) and security groups to maintain routing separation.
B) Use the AWS IPsec VPN for the partner VPN connections. Use an Amazon EC2 instance VPN for the mobile and desktop devices. Use Network ACLs and security groups to maintain routing separation.
C) Create an AWS Direct Connect connection between on-premises and AWS Use a public virtual interface to connect to the AWS IPsec VPN for the mobile, desktop, and partner VPN connections.
D) Use an Amazon EC2 instance VPN for the desktop, mobile, and partner VPN connections. Use features of the VPN instance to limit routing and connectivity.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
77
You have a three-tier web application with separate subnets for Web, Applications, and Database tiers. Your CISO suspects your application will be the target of malicious activity. You are tasked with notifying the security team in the event your application is port scanned by external systems. Which two AWS Services cloud you leverage to build an automated notification system? (Select two.)

A) Internet gateway
B) VPC Flow Logs
C) AWS CloudTrail
D) Lambda
E) AWS Inspector
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
78
You have to set up an AWS Direct Connect connection to connect your on-premises to an AWS VPC. Due to budget requirements, you can only provision a single Direct Connect port. You have two border gateway routers at your on-premises data center that can peer with the Direct Connect routers for redundancy. Which two design methodologies, in combination, will achieve this connectivity? (Select two.)

A) Terminate the Direct Connect circuit on a L2 border switch, which in turn has trunk connections to the two routers.
B) Create two Direct Connect private VIFs for the same VPC, each with a different peer IP.
C) Terminate the Direct Connect circuit on any of the one routers, which in turn will have an IBGP session with the other router.
D) Create one Direct Connect private VIF for the VPC with two customer peer IPs.
E) Provision two VGWs for the VPC and create one Direct Connect private VIF per VGW.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
79
Your application is hosted behind an Elastic Load Balancer (ELB) within an autoscaling group. The autoscaling group is configured with a minimum of 2, a maximum of 14, and a desired value of 2. The autoscaling cooldown and the termination policies are set to the default value. CloudWatch reports that the site typically requires just two servers, but spikes at the start and end of the business day can require eight to ten servers. You receive intermittent reports of timeouts and partially loaded web pages. Which configuration change should you make to address this issue?

A) Configure connection draining on the ELB.
B) Configure the autoscaling cooldown to 600 seconds.
C) Configure the termination policy to oldest instance.
D) Configure a Terminating: Wait lifecycle hook on a scale in event.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
80
You use a VPN to extend your corporate network into a VPC. Instances in the VPC are able to resolve resource records in an Amazon Route 53 private hosted zone. Your on-premises DNS server is configured with a forwarder to the VPC DNS server IP address. On-premises users are unable to resolve names in the private hosted zone, although instances in a peered VPC can. What should you do to provide on-premises users with access to the private hosted zone?

A) Create a proxy resolver within the VPC. Point the on-premises forwarder to the proxy resolver.
B) Modify the network access control list on the VPC to allow DNS queries from on-premises systems.
C) Configure the on-premises server as a secondary DNS for the private zone. Update the NS records.
D) Update the on-premises forwarders with the four name servers assigned to the private hosted zone.
Unlock Deck
Unlock for access to all 397 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 397 flashcards in this deck.