ExamGecko
Home Home / Amazon / ANS-C00

Amazon ANS-C00 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Which two methods can be used to ensure items are distributed only to the correct parties? (Choose two.)

A.
Signed URLs
A.
Signed URLs
Answers
B.
Signed cookies
B.
Signed cookies
Answers
C.
Signed biscuits
C.
Signed biscuits
Answers
D.
Signed SSLs
D.
Signed SSLs
Answers
Suggested answer: A, B

Explanation:

Explanation:

Signed cookies and signed URLs are used to ensure only intended parties can access CloudFront resources.

You are deploying an EC2 instance in a private subnet that requires access to the Internet. One of the requirements for this solution is to restrict access to only particular URLs on a whitelist. In addition to the whitelisted URLs, the instances should be able to access any Amazon S3 bucket in the same region via any URL. Which of the following solutions should you deploy? (Choose two.)

A.
Include s3.amazonaws.com in the whitelist.
A.
Include s3.amazonaws.com in the whitelist.
Answers
B.
Create a VPC endpoint for S3.
B.
Create a VPC endpoint for S3.
Answers
C.
Run Squid proxy on a NAT instance.
C.
Run Squid proxy on a NAT instance.
Answers
D.
Deploy a NAT gateway into your VPC.
D.
Deploy a NAT gateway into your VPC.
Answers
E.
Utilize a security group to restrict access.
E.
Utilize a security group to restrict access.
Answers
Suggested answer: C, D

Your organization runs a popular e-commerce application deployed on AWS that uses auto scaling in conjunction with an Elastic Load balancing (ELB) service with an HTTPS listener. Your security team reports that an exploitable vulnerability has been discovered in the encryption protocol and cipher that your site uses. Which step should you take to fix this problem?

A.
Generate new SSL certificates for all web servers and replace current certificates.
A.
Generate new SSL certificates for all web servers and replace current certificates.
Answers
B.
Change the security policy on the ELB to disable vulnerable protocols and ciphers.
B.
Change the security policy on the ELB to disable vulnerable protocols and ciphers.
Answers
C.
Generate new SSL certificates and use ELB to front-end the encrypted traffic for all web servers.
C.
Generate new SSL certificates and use ELB to front-end the encrypted traffic for all web servers.
Answers
D.
Leverage your current configuration management system to update SSL policy on all web servers.
D.
Leverage your current configuration management system to update SSL policy on all web servers.
Answers
Suggested answer: D

You are configuring a CloudFront distribution, and when you try to attach an SSL, you do not see your SSL listed. What is the most likely reason for this?

A.
You must configure an https record in Route 53 first.
A.
You must configure an https record in Route 53 first.
Answers
B.
Sometimes, it won't show, and you need to retrieve the ARN for the SSL and enter it manually.
B.
Sometimes, it won't show, and you need to retrieve the ARN for the SSL and enter it manually.
Answers
C.
You requested an SSL for the wrong region.
C.
You requested an SSL for the wrong region.
Answers
D.
You didn't wait 48 hours after approving the SSL.
D.
You didn't wait 48 hours after approving the SSL.
Answers
Suggested answer: C

An organization's Security team has a requirement that all data leaving its on-premises data center be encrypted at the network layer and use dedicated connectivity. There is also a requirement to centrally log all traffic flow in Amazon VPC environments. An AWS Direct Connect connection has been ordered to build out this design.

What steps should be taken to ensure that connectivity to AWS meets these security requirements? (Choose two.)

A.
Provision a public virtual interface on AWS Direct Connect and set up a VPN to each VPC.
A.
Provision a public virtual interface on AWS Direct Connect and set up a VPN to each VPC.
Answers
B.
Provision a private virtual interface for each VPC connection.
B.
Provision a private virtual interface for each VPC connection.
Answers
C.
Enable VPC Flow Logs for each VPC.
C.
Enable VPC Flow Logs for each VPC.
Answers
D.
Use AWS KMS to encrypt traffic between on-premises and AWS.
D.
Use AWS KMS to encrypt traffic between on-premises and AWS.
Answers
E.
Provision a VPN connection to each VPC over the internet.
E.
Provision a VPN connection to each VPC over the internet.
Answers
Suggested answer: B, E

Explanation:

Explanation:

Reference: https://d1.awsstatic.com/whitepapers/building-a-scalable-and-secure-multi-vpc-aws-network-infrastructure.pdf

You have two VPCs that you've peered. You created a route for VPC A to get to an instance in VPC. You are unable to ping the instance. You have double checked your security groups and NACLs. Why might this be?

A.
You forgot to add a return route.
A.
You forgot to add a return route.
Answers
B.
ICMP is not supported over peering connections.
B.
ICMP is not supported over peering connections.
Answers
C.
You have to enable Source/Destination check in the VPCs.
C.
You have to enable Source/Destination check in the VPCs.
Answers
D.
You have to configure the peering connection to allow two way traffic.
D.
You have to configure the peering connection to allow two way traffic.
Answers
Suggested answer: A

Explanation:

Explanation:

Every route needs a return route for ICMP traffic.

In Amazon CloudFront, to link to your objects, if your domain name is d111111abcdef8.cloudfront.net and your object is image.jpg, then the URL for the link in your webpage will be _____.

A.
http://d111111abcdef8.cloudfront.net/images/image.jpg
A.
http://d111111abcdef8.cloudfront.net/images/image.jpg
Answers
B.
http://d111111abcdef8.dns/images/image.jpg
B.
http://d111111abcdef8.dns/images/image.jpg
Answers
C.
http://d111111abcdef8.dns/image.jpg
C.
http://d111111abcdef8.dns/image.jpg
Answers
D.
http://d111111abcdef8.cloudfront.net/image.jpg
D.
http://d111111abcdef8.cloudfront.net/image.jpg
Answers
Suggested answer: D

Explanation:

Explanation:

In Amazon CloudFront, to link to your objects, if your domain name was d111111abcdef8.cloudfront.net and your object was image.jpg, the URL for the link would be: http://d111111abcdef8.cloudfront.net/ image.jpg. If your object is in a folder within your bucket, include the folder in the URL. For example, if image.jpg is located in an images folder, then the URL would be: http://d111111abcdef8.cloudfront.net/images/image.jpg.

Reference: http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/GettingStarted.html

A multinational organization has applications deployed in three different AWS regions. These applications must securely communicate with each other by VPN. According to the organization's security team, the VPN must meet the following requirements:

AES 128-bit encryption

SHA-1 hashing

User access via SSL VPN

PFS using DH Group 2

Ability to maintain/rotate keys and passwords Certificate-based authentication Which solution should you recommend so that the organization meets the requirements?

A.
AWS hardware VPN between the virtual private gateway and customer gateway
A.
AWS hardware VPN between the virtual private gateway and customer gateway
Answers
B.
A third-party VPN solution deployed from AWS Marketplace
B.
A third-party VPN solution deployed from AWS Marketplace
Answers
C.
A private MPLS solution from an international carrier
C.
A private MPLS solution from an international carrier
Answers
D.
AWS hardware VPN between the virtual private gateways in each region
D.
AWS hardware VPN between the virtual private gateways in each region
Answers
Suggested answer: D

Your company just acquired a new company. You have two VPCs ?one is 172.31.0.0/16 and one is 10.111.0.0/16. The acquired company uses 10.111.0.0/16 for their VPC. Your VPC "A" has a group of 12 servers in the range 10.111.2.101 ?10.111.2.112. Their VPC "B" has 20 servers from 10.111.2.171 ?10.111.2.190. You need to access both VPCs from the 172.31.0.0/16 VPC "C". What is the best way to approach this problem?

A.
From VPC C, create a peering connection and add a route to VPC A's peering connection for 10.111.2.96/27 and a route to VPC B's peering connection for 10.111.2.0/24.
A.
From VPC C, create a peering connection and add a route to VPC A's peering connection for 10.111.2.96/27 and a route to VPC B's peering connection for 10.111.2.0/24.
Answers
B.
From VPC C, create a peering connection and add a route to VPC A's peering connection for 10.111.2.96/28 and a route to VPC B's peering connection for 10.111.2.0/24.
B.
From VPC C, create a peering connection and add a route to VPC A's peering connection for 10.111.2.96/28 and a route to VPC B's peering connection for 10.111.2.0/24.
Answers
C.
From VPC C, create a peering connection and adjust the route tables to direct traffic to the individual servers by exact IP address of the servers.
C.
From VPC C, create a peering connection and adjust the route tables to direct traffic to the individual servers by exact IP address of the servers.
Answers
D.
Invest the money and change the CIDR of one of the VPCs since one VPC cannot be peered to two VPCs with the same CIDR block.
D.
Invest the money and change the CIDR of one of the VPCs since one VPC cannot be peered to two VPCs with the same CIDR block.
Answers
Suggested answer: A

Explanation:

Explanation:

You can peer VPCs with the same CIDR block to a third VPC, so changing the CIDR block is not necessary. You can adjust the route tables to point to individual servers, but this would be very inefficient.

10.111.2.96/28 does not provide enough addresses for the AWS required addresses. AWS reserves 5 addresses per subnet and this only allows 11 addresses. 10.111.2.96/27 provides 32 addresses with 27 usable. Since it is a /27, it will take precedence over the /24 and route the traffic destined for these instances correctly.

A financial services company that has on-premises infrastructure has acquired a startup company that has an API that is deployed in the AWS Cloud. As part of the acquisition, the financial services company has deployed an AWS Direct Connect private VIF to establish IP connectivity between the on-premises data center and the AWS environment.

Initial IP connectivity testing and bidirectional DNS resolution testing are successful. However, when business users attempt to connect to the API. a network administrator discovers IP subnet overlap between the financial services company's existing network and the startup company's AWS deployment.

A network architect receives the following diagram that summarizes the situation:

What is the MOST operationally efficient solution to enable the connectivity?

A.
Provision additional subnets with a non-overlapping IP range in the VP
A.
Provision additional subnets with a non-overlapping IP range in the VP
Answers
B.
Deploy NAT gateways. Configure the virtual private gateway's next hop to be the NAT gateway. Advertise the new subnet IP address ranges through Direct Connect.Configure the on-premises hosts to target the API endpoint through the API servers.
B.
Deploy NAT gateways. Configure the virtual private gateway's next hop to be the NAT gateway. Advertise the new subnet IP address ranges through Direct Connect.Configure the on-premises hosts to target the API endpoint through the API servers.
Answers
C.
Provision additional subnets with a non-overlapping IP range in the VP
C.
Provision additional subnets with a non-overlapping IP range in the VP
Answers
D.
Deploy a Network Load Balancer (NLB) across the subnets. Configure the API endpoints in a target group that is associated with the NLAdvertise the new subnetIP address ranges through Direct Connect. Configure the on-premises hosts to target the API endpoint through the NLB.
D.
Deploy a Network Load Balancer (NLB) across the subnets. Configure the API endpoints in a target group that is associated with the NLAdvertise the new subnetIP address ranges through Direct Connect. Configure the on-premises hosts to target the API endpoint through the NLB.
Answers
E.
Provision additional subnets with a non-overlapping IP range in a new VPDeploy a Network Load Balancer (NLB) across the subnets. Configure the API endpoints as targets by IP address in a target group that is associated with the NLB.Peer the two VPCs together, and relocate the virtual private gateway into the new VPAdvertise the new subnet IP address ranges through Direct Connect. Configure the on-premises hosts to target the API endpoint through the NLB.
E.
Provision additional subnets with a non-overlapping IP range in a new VPDeploy a Network Load Balancer (NLB) across the subnets. Configure the API endpoints as targets by IP address in a target group that is associated with the NLB.Peer the two VPCs together, and relocate the virtual private gateway into the new VPAdvertise the new subnet IP address ranges through Direct Connect. Configure the on-premises hosts to target the API endpoint through the NLB.
Answers
F.
Provision additional subnets with a non-overlapping IP range in the VPC. Deploy a Network Load Balancer (NLB) across the existing subnets. Configure the API endpoints in a target group that is associated with the NLB. Configure aVPC endpoint service that targets the newly created NLB, and deploy VPC endpoints into the new subnet. Advertise the new subnet IP address ranges through Direct Connect. Configure the on-premises hosts to target the API endpoint through the VPC endpoints.
F.
Provision additional subnets with a non-overlapping IP range in the VPC. Deploy a Network Load Balancer (NLB) across the existing subnets. Configure the API endpoints in a target group that is associated with the NLB. Configure aVPC endpoint service that targets the newly created NLB, and deploy VPC endpoints into the new subnet. Advertise the new subnet IP address ranges through Direct Connect. Configure the on-premises hosts to target the API endpoint through the VPC endpoints.
Answers
Suggested answer: D
Total 414 questions
Go to page: of 42