ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 498 - SAA-C03 discussion

Report
Export

A company operates a two-tier application for image processing. The application uses two Availability Zones, each with one public subnet and one private subnet. An Application Load Balancer (ALB) for the web tier uses the public subnets. Amazon EC2 instances for the application tier use the private subnets.

Users report that the application is running more slowly than expected. A security audit of the web server log files shows that the application is receiving millions of illegitimate requests from a small number of IP addresses. A solutions architect needs to resolve the immediate performance problem while the company investigates a more permanent solution.

What should the solutions architect recommend to meet this requirement?

A.
Modify the inbound security group for the web tier. Add a deny rule for the IP addresses that are consuming resources.
Answers
A.
Modify the inbound security group for the web tier. Add a deny rule for the IP addresses that are consuming resources.
B.
Modify the network ACL for the web tier subnets. Add an inbound deny rule for the IP addresses that are consuming resources
Answers
B.
Modify the network ACL for the web tier subnets. Add an inbound deny rule for the IP addresses that are consuming resources
C.
Modify the inbound security group for the application tier. Add a deny rule for the IP addresses that are consuming resources.
Answers
C.
Modify the inbound security group for the application tier. Add a deny rule for the IP addresses that are consuming resources.
D.
Modify the network ACL for the application tier subnets. Add an inbound deny rule for the IP addresses that are consuming resources
Answers
D.
Modify the network ACL for the application tier subnets. Add an inbound deny rule for the IP addresses that are consuming resources
Suggested answer: B

Explanation:

Deny the request from the first entry at the public subnet, dont allow it to cross and get to the private subnet.

In this scenario, the security audit reveals that the application is receiving millions of illegitimate requests from a small number of IP addresses. To address this issue, it is recommended to modify the network ACL (Access Control List) for the web tier subnets. By adding an inbound deny rule specifically targeting the IP addresses that are consuming resources, the network ACL can block the illegitimate traffic at the subnet level before it reaches the web servers. This will help alleviate the excessive load on the web tier and improve the application's performance.

asked 16/09/2024
Lucas de Paula Mello
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first