ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 278 - SCS-C01 discussion

Report
Export


A company is deploying a new web application on AWS. Based on their other web applications, they anticipate being the target of frequent DDoS attacks. Which steps can the company use to protect their application? Select 2 answers from the options given below.

Please select:

A.
Associate the EC2 instances with a security group that blocks traffic from blacklisted IP addresses.
Answers
A.
Associate the EC2 instances with a security group that blocks traffic from blacklisted IP addresses.
B.
Use an ELB Application Load Balancer and Auto Scaling group to scale to absorb application layer traffic.
Answers
B.
Use an ELB Application Load Balancer and Auto Scaling group to scale to absorb application layer traffic.
C.
Use Amazon Inspector on the EC2 instances to examine incoming traffic and discard malicious traffic.
Answers
C.
Use Amazon Inspector on the EC2 instances to examine incoming traffic and discard malicious traffic.
D.
Use CloudFront and AWS WAF to prevent malicious traffic from reaching the application
Answers
D.
Use CloudFront and AWS WAF to prevent malicious traffic from reaching the application
E.
Enable GuardDuty to block malicious traffic from reaching the application
Answers
E.
Enable GuardDuty to block malicious traffic from reaching the application
Suggested answer: B, D

Explanation:

The below diagram from AWS shows the best case scenario for avoiding DDos attacks using services such as AWS Cloudfro WAF, ELB and Autoscaling

Option A is invalid because by default security groups don't allow access

Option C is invalid because AWS Inspector cannot be used to examine traffic

Option E is invalid because this can be used for attacks on EC2 Instances but not against DDos attacks on the entire application For more information on DDos mitigation from AWS, please visit the below URL:

https://aws.amazon.com/answers/networking/aws-ddos-attack-mitieationiThe correct answers are: Use an ELB Application Load Balancer and Auto Scaling group to scale toabsorb application layer traffic., Use CloudFront and AWS WAF to prevent malicious traffic fromreaching the applicationSubmit your Feedback/Queries to our Experts

asked 16/09/2024
Oleksii Ivanov
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first