Amazon ANS-C00 Practice Test - Questions Answers, Page 3
List of questions
Question 21
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A company runs its applications on Amazon EC2 instances. A network engineer must deny specific ports for all applications and must allow only approved ports for each application. All outbound traffic from the instances must be allowed. Which solution will meet these requirements?
Explanation:
Explanation:
You can create a custom network ACL and associate it with a subnet. By default, each custom network ACL denies all inbound and outbound traffic until you add rules. Reference: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
Question 22
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Your AWS WorkSpaces users are unable to authenticate. What could be one reason for this?
Explanation:
Explanation:
AD requires port 389.
Question 23
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Your organization requires strict adherence to a change control process for its Amazon Elastic Compute Cloud (EC2) and VPC environments. The organization uses AWS CloudFormation as the AWS service to control and implement changes.
Which combination of three services provides an alert for changes made outside of AWS CloudFormation? (Choose three.)
Question 24
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A bank built a new version of its banking application in AWS using containers that connect to an on-premises database over a VPN connection. This application version requires users to also update their client application. The bank plans to deprecate the earlier client version. However, the company wants to keep supporting earlier clients through their onpremises version of the application to serve a small portion of the customers who haven't yet upgraded. What design will allow the company to serve both newer and earlier clients in the MOST efficient way?
Question 25
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
You have two Direct Connect connections and two VPN connections to your network. Site A is VPN 10.1.0.0/24 AS 65000 65000, Site B is VPN 10.1.0.252/30 AS 65000, Site C is DX 10.0.0.0/8 AS 65000 and Site D is DX 10.0.0.0/16 AS 65000 65000 65000. Which site will AWS choose to reach your network?
Explanation:
Explanation:
Site B, the most specific prefix always wins.
Question 26
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Fill in the blanks: One of the basic characteristics of security groups for your VPC is that you ______ .
Explanation:
Explanation:
Security Groups in VPC allow you to specify rules with reference to the protocols and ports through which communications with your instances can be established. One such rule is that you can specify allow rules, but not deny rules.
Reference: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html
Question 27
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
You are configuring a VPN to AWS for your company. You have configured the VGW and CGW. You have created the VPN.
You have also run the necessary commands on your router. You allowed all TCP and UDP traffic between your datacenter and your VPC. The tunnel still doesn't come up. What is the most likely reason?
Explanation:
Explanation:
You haven't allowed protocol 50 through the firewall. Protocol 50 is different from UDP (17) and TCP (6) and requires a rule in your firewall for your VPN tunnel to come up.
Question 28
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An organization with a growing ecommerce presence uses the AWS CloudHSM to offload the SSL/TLS processing of its web server fleet. The company leverages Amazon EC2 Auto Scaling for web servers to handle the growth. What architectural approach is optimal to scale the encryption operation?
Question 29
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A user has created a VPC with CIDR 20.0.0.0/16 with only a private subnet and VPN connection using the VPC wizard. The user wants to connect to the instance in a private subnet over SSH. How should the user define the security rule for SSH?
Explanation:
Explanation:
The user can create subnets as per the requirement within a VPC. If the user wants to connect VPC from his own data centre, the user can setup a case with a VPN only subnet (private) which uses VPN access to connect with his data centre.
When the user has configured this setup with Wizard, all network connections to the instances in the subnet will come from his data centre. The user has to configure the security group of the private subnet which allows the inbound traffic on SSH (port 22) from the data centre's network range.
Reference: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Scenario4.html
Question 30
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which statement about placement groups is incorrect?
Explanation:
Explanation:
There may not be sufficient capacity in the placement group.
Question