ExamGecko
Home Home / Amazon / ANS-C00

Amazon ANS-C00 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











A company wants to migrate its workloads to the AWS Cloud. The company has two web applications and wants to run them in separate, isolated VPCs. The company needs to use Elastic Load Balancing to distribute requests between application instances.

For security reasons, internet gateways must not be attached to the application VPCs. Inbound HTTP requests to theapplication must be routed through a centralized VPC, and the application VPCs must not be exposed to any other inboundtraffic. The application VPCs cannot be allowed to initiate any outbound connections. What should a network engineer do to meet these requirements?

A.
Run the applications behind private Application Load Balancers (ALBs) in separate VPCs. Create a public Network Load Balancer (NLB) in the centralized VPC. Create target groups for the private DNS names of the ALBs. Configurehost-based routing to route application traffic to the corresponding target group through the NLB.
A.
Run the applications behind private Application Load Balancers (ALBs) in separate VPCs. Create a public Network Load Balancer (NLB) in the centralized VPC. Create target groups for the private DNS names of the ALBs. Configurehost-based routing to route application traffic to the corresponding target group through the NLB.
Answers
B.
Run the applications behind private Application Load Balancers (ALBs) in separate VPCs. Create a public Network Load Balancer (NLB) in the centralized VPC. Create target groups for the private IP addresses of the ALBs. Configurehost-based routing to route application traffic to the corresponding target group through the NLB.
B.
Run the applications behind private Application Load Balancers (ALBs) in separate VPCs. Create a public Network Load Balancer (NLB) in the centralized VPC. Create target groups for the private IP addresses of the ALBs. Configurehost-based routing to route application traffic to the corresponding target group through the NLB.
Answers
C.
Run the applications behind private Network Load Balancers (NLBs) in separate VPCs. Create VPC peering connections between the application VPCs and the centralized VPCreate a public Application Load Balancer (ALB) in thecentralized VPCreate target groups for the private DNS names of the NLBs. Configure host-based routing to route application traffic between individual applications though the ALB.
C.
Run the applications behind private Network Load Balancers (NLBs) in separate VPCs. Create VPC peering connections between the application VPCs and the centralized VPCreate a public Application Load Balancer (ALB) in thecentralized VPCreate target groups for the private DNS names of the NLBs. Configure host-based routing to route application traffic between individual applications though the ALB.
Answers
D.
Run the applications behind private Network Load Balancers (NLBs) in separate VPCs. Configure each NLB as an AWS PrivateLink endpoint service with associated VPC endpoints in the centralized VPC. Create target groups thatinclude the private IP addresses of each endpoint. Create a public Application Load Balancer (ALB) in the centralized VPC. Configure host-based routing to route application traffic to the corresponding target group through the ALB.
D.
Run the applications behind private Network Load Balancers (NLBs) in separate VPCs. Configure each NLB as an AWS PrivateLink endpoint service with associated VPC endpoints in the centralized VPC. Create target groups thatinclude the private IP addresses of each endpoint. Create a public Application Load Balancer (ALB) in the centralized VPC. Configure host-based routing to route application traffic to the corresponding target group through the ALB.
Answers
Suggested answer: D

An organization will be extending its existing on-premises infrastructure into the cloud. The design consists of a transit VPC that contains stateful firewalls that will be deployed in a highly available configuration across two Availability Zones for automatic failover.

What MUST be configured for this design to work? (Choose two.)

A.
A different Autonomous System Number (ASN) for each firewall
A.
A different Autonomous System Number (ASN) for each firewall
Answers
B.
Border Gateway Protocol (BGP) routing
B.
Border Gateway Protocol (BGP) routing
Answers
C.
Autonomous system (AS) path prepending
C.
Autonomous system (AS) path prepending
Answers
D.
Static routing
D.
Static routing
Answers
E.
Equal-cost multi-path routing (ECMP)
E.
Equal-cost multi-path routing (ECMP)
Answers
Suggested answer: B, E

You have just deployed a website that utilizes CloudFront, ELB, and S3 to serve content. When users access your site, they are seeing broken image links. You know you configured CloudFront to use cdn.yourdomain.com. What is the most likely reason why your users not seeing the images?

A.
There is no rule in your bucket policy allowing public access.
A.
There is no rule in your bucket policy allowing public access.
Answers
B.
The images in S3 are saved as .png instead of .jpg.
B.
The images in S3 are saved as .png instead of .jpg.
Answers
C.
There is no record in Route 53 pointing cdn.yourdomain.com to the ALIAS.
C.
There is no record in Route 53 pointing cdn.yourdomain.com to the ALIAS.
Answers
D.
The users are using Internet Explorer.
D.
The users are using Internet Explorer.
Answers
Suggested answer: C

Explanation:

Explanation:

You must have a Route 53 record. You never want to give public access to your content bucket.

You have many IAM users with the ability to create EC2 volumes. Most of the data your team works with is sensitive, so you would like to make sure all volumes are encrypted. How might you facilitate this requirement?

A.
Create an AWS KMS policy and attach it to all IAM users that can create EC2 volumes.
A.
Create an AWS KMS policy and attach it to all IAM users that can create EC2 volumes.
Answers
B.
Use AWS Config and create a rule that requires all volumes, upon creation, be encrypted.
B.
Use AWS Config and create a rule that requires all volumes, upon creation, be encrypted.
Answers
C.
Use AWS Config to send out reminders to IAM users every time they create an EC2 volume.
C.
Use AWS Config to send out reminders to IAM users every time they create an EC2 volume.
Answers
D.
Set EC2 to notify creators to encrypt their EC2 volumes.
D.
Set EC2 to notify creators to encrypt their EC2 volumes.
Answers
Suggested answer: B

Explanation:

Explanation:

AWS Config is used to evaluate the configuration settings of many AWS resources. When an EC2 volume in created, AWS Config can evaluate the volume against a rule that requires volumes to be encrypted. If the volume is not encrypted, AWS Config flags the volume and the rule as noncompliant.

Reference: http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config.html

A company has a service that runs on TCP port 443 in VPC A within AWS account A network engineer is using AWS PrivateLink for the configuration. Which set of procedures should the network engineer follow to meet these requirements?

A.
The company wants to expose the service to Amazon EC2 instances in VPC B within AWS account B. The service must not be made public, and all other services in VPC A must not be accessible from VPC In VPC A, create an Application Load Balancer (ALB) that has an HTTPS listener. Create an endpoint service in VPC A that points to the ALB. Add the principal ARN of account B to the service endpoints allow list.In VPC B, create an interface endpoint that points to the service identifier of the endpoint service in AWS account A.
A.
The company wants to expose the service to Amazon EC2 instances in VPC B within AWS account B. The service must not be made public, and all other services in VPC A must not be accessible from VPC In VPC A, create an Application Load Balancer (ALB) that has an HTTPS listener. Create an endpoint service in VPC A that points to the ALB. Add the principal ARN of account B to the service endpoints allow list.In VPC B, create an interface endpoint that points to the service identifier of the endpoint service in AWS account A.
Answers
B.
In VPC A, create a Network Load Balancer (NLB) that has a TCP listener. Create an endpoint service in VPC A that points to the NLAdd the principal ARN of account B to the service endpoints allow list. In VPC B, create an interfaceendpoint that points to the service identifier of the endpoint service in AWS account A.
B.
In VPC A, create a Network Load Balancer (NLB) that has a TCP listener. Create an endpoint service in VPC A that points to the NLAdd the principal ARN of account B to the service endpoints allow list. In VPC B, create an interfaceendpoint that points to the service identifier of the endpoint service in AWS account A.
Answers
C.
In VPC A, create a Network Load Balancer (NLB) that has a TCP listener. Create an endpoint service in VPC A that points to the NLB. Add the principal ARN of account B to the service endpoints allow list. In VPC B, create a gatewayendpoint that points to the service identifier of the endpoint service in AWS account A.
C.
In VPC A, create a Network Load Balancer (NLB) that has a TCP listener. Create an endpoint service in VPC A that points to the NLB. Add the principal ARN of account B to the service endpoints allow list. In VPC B, create a gatewayendpoint that points to the service identifier of the endpoint service in AWS account A.
Answers
D.
In VPC A, create an Application Load Balancer (ALB) that has a TCP listener. Create an endpoint service in VPC A that points to the ALB. Add the principal ARN of account B to the service endpoints allow list. In VPC B, create aGateway Load Balancer endpoint that points to the service identifier of the endpoint service in AWS account A.
D.
In VPC A, create an Application Load Balancer (ALB) that has a TCP listener. Create an endpoint service in VPC A that points to the ALB. Add the principal ARN of account B to the service endpoints allow list. In VPC B, create aGateway Load Balancer endpoint that points to the service identifier of the endpoint service in AWS account A.
Answers
Suggested answer: A

Explanation:

Explanation:

Reference: https://docs.aws.amazon.com/vpc/latest/privatelink/vpce-interface.html

Non-compliant resources identified through the use of AWS Config Rules are automatically removed from operational service.

A.
It depends on the Rule configuration
A.
It depends on the Rule configuration
Answers
B.
Only if it remains non-compliant for more than 6 hours
B.
Only if it remains non-compliant for more than 6 hours
Answers
C.
True
C.
True
Answers
D.
False
D.
False
Answers
Suggested answer: D

Explanation:

Explanation:

Each time a change is made to one of your supported resources, AWS config will check its compliance against any Config Rules that you have in place. If there is a violation against these rules then AWS Config will send a message to the Configuration Stream via SNS and the resource will be marked as `noncompliant'.

It's important to note that this does not mean the resource will be taken out of service or it will stop working. It will continue to operate exactly as it is with its new configuration. AWS Config simply alerts you that there is a violation and it's up to you to take the appropriate action.

Reference: http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_view-compliance.html

Your company wishes to improve the performance of its EC2 instances. They require low latency and high throughput. They are currently deployed on T2.medium. It is imperative that you experience as little downtime as possible, but cost and performance are most important. How should you accomplish this?

A.
Create AMIs from the instances, create new instances on t2.medium, and start those instances in a placement group.
A.
Create AMIs from the instances, create new instances on t2.medium, and start those instances in a placement group.
Answers
B.
Create AMIs from the instances, deploy the instances as i3.large, and start those instances in a placement group.
B.
Create AMIs from the instances, deploy the instances as i3.large, and start those instances in a placement group.
Answers
C.
Stop the instances and restart them in a placement group.
C.
Stop the instances and restart them in a placement group.
Answers
D.
Add an extra ENI to the instances and team them to provide greater throughput.
D.
Add an extra ENI to the instances and team them to provide greater throughput.
Answers
Suggested answer: B

Explanation:

Explanation:

T2. medium is not compatible with placement groups. You cannot team ENIs to add more throughput on AWS.

When an AWS Config rule is triggered a JSON object known as an AWS Config Event is created. This object contains another JSON string in its ____ parameter, which describes the event that triggered the rule.

A.
resultToken
A.
resultToken
Answers
B.
eventLeftScope
B.
eventLeftScope
Answers
C.
invokingEvent
C.
invokingEvent
Answers
D.
configRuleName
D.
configRuleName
Answers
Suggested answer: C

Explanation:

Explanation:

The JSON object for an AWS Config event contains an invoking Event attribute, which describes the event that triggers the evaluation for a rule. If the event is published in response to a resource configuration change, the value for this attribute is a string that contains a JSON configuration Item or a configuration Item Summary (for oversized configuration items). The configuration item represents the state of the resource at the moment that AWS Config detected the change. If the event is published for a periodic evaluation, the value is a string that contains a JSON object. The object includes information about the evaluation that was triggered. For each type of event, a function must parse the string with a JSON parser to be able to evaluate its contents.

Reference: http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_develop-rules_exa mple-events.html

Which of these modes is not a configuration mode for a WAF?

A.
Block
A.
Block
Answers
B.
Allow
B.
Allow
Answers
C.
Sleep
C.
Sleep
Answers
D.
Monitor
D.
Monitor
Answers
Suggested answer: C

Explanation:

Explanation:

There is no sleep mode for a WAF. WAFs are hard workers.

Your company is connecting one data center with one router to several VPCs and needs to access them transitively. What should you do?

A.
Create a VPN to one VPC and peer the others.
A.
Create a VPN to one VPC and peer the others.
Answers
B.
This is not possible.
B.
This is not possible.
Answers
C.
Use a transit VPC with a VPN running on one or more EC2 instances to route traffic between the VPCs.
C.
Use a transit VPC with a VPN running on one or more EC2 instances to route traffic between the VPCs.
Answers
D.
Just connect; VPCs are transitive in nature.
D.
Just connect; VPCs are transitive in nature.
Answers
Suggested answer: C

Explanation:

Explanation:

VPCs are not transitive, so you will need a "transit VPN" in order to route between the VPCs.

Total 414 questions
Go to page: of 42