amazon AWS Certified Advanced Networking - Specialty - ANS-C00 practice test

page 1 out of 28

Viewing questions 1-15 out of 407


Question 1

A company is building a hybrid PCI-DSS compliant application that runs in the us-west-2 Region and on-premises. The
application sends access logs from all locations to a single Amazon S3 bucket in uswest-2. To protect this sensitive data, the
bucket policy is configured to deny access from public IP addresses.
How should an engineer configure the network to meet these requirements?

  • A. Configure an AWS Direct Connect private virtual interface to the company's AWS VPC in us-west-2. Create a VPC endpoint and configure the on-premises systems to leverage an HTTPS proxy in the VPC to access Amazon S3.
  • B. Configure a VPN connection to the company's AWS VPC in us-west-2 and use BGP to advertise routes for Amazon S3.
  • C. Configure a Direct Connect connection public virtual interface to us-west-2. Leverage an on-premises HTTPS proxy to send traffic to Amazon S3 over a Direct Connect connection.
  • D. Configure a VPN connection to the companys AWS VPC in us-west-2. Create a NAT gateway and configure the on- premises systems to leverage an HTTPS proxy in the VPC to access Amazon S3.
Answer:

C

Discussions
0 / 1000

Question 2

You have two VPCs that you've peered. You created a route for VPC A to get to an instance in VPC. You are unable to ping
the instance. You have double checked your security groups and NACLs.
Why might this be?

  • A. You forgot to add a return route.
  • B. ICMP is not supported over peering connections.
  • C. You have to enable Source/Destination check in the VPCs.
  • D. You have to configure the peering connection to allow two way traffic.
Answer:

A

Explanation:
Every route needs a return route for ICMP traffic.

Discussions
0 / 1000

Question 3

Which is not a valid Route 53 record?

  • A. SPF
  • B. NAPTR
  • C. AAAA
  • D. BFD
Answer:

D

Explanation:
BFD stands for Bi-directional Forwarding Detection and has nothing to do with Route 53.

Discussions
0 / 1000

Question 4

A company hosts an application on Amazon EC2 instances behind an Application Load Balancer (ALB). The company
recently experienced a network security breach. A network engineer must collect and analyze logs that include the client IP
address, target IP address, target port, and user agent of each user that accesses the application.
What is the MOST operationally efficient solution that meets these requirements?

  • A. Configure the ALB to store logs in an Amazon S3 bucket. Download the files from Amazon S3, and use a spreadsheet application to analyze the logs.
  • B. Configure the ALB to push logs to Amazon Kinesis Data Streams. Use Amazon Kinesis Data Analytics to analyze the logs.
  • C. Configure Amazon Kinesis Data Streams to stream data from the ALB to Amazon Elasticsearch Service (Amazon ES). Use search operations in Amazon ES to analyze the data.
  • D. Configure the ALB to store logs in an Amazon S3 bucket. Use Amazon Athena to analyze the logs in Amazon S3.
Answer:

B

Explanation:
Reference: https://aws.amazon.com/blogs/big-data/implement-serverless-log-analytics-using-amazon-kinesis-analytics/

Discussions
0 / 1000

Question 5

A multinational organization has applications deployed in three different AWS regions. These applications must securely
communicate with each other by VPN. According to the organizations security team, the VPN must meet the following
requirements:
AES 128-bit encryption

SHA-1 hashing

User access via SSL VPN

PFS using DH Group 2

Ability to maintain/rotate keys and passwords Certificate-based authentication


Which solution should you recommend so that the organization meets the requirements?

  • A. AWS hardware VPN between the virtual private gateway and customer gateway
  • B. A third-party VPN solution deployed from AWS Marketplace
  • C. A private MPLS solution from an international carrier
  • D. AWS hardware VPN between the virtual private gateways in each region
Answer:

D

Discussions
0 / 1000

Question 6

Your company has decided to use AWS WorkSpaces for its hosted desktop solution. Your company has an existing AD of
about 57,000 users, and you want to minimize authentication traffic from AWS to your datacenter. Your company has a lot of
personnel changes, and it is crucial that these changes are reflected reliably. What two steps should you take? (Choose
two.)

  • A. Deploy Hosted AD in AWS.
  • B. Deploy an AD Connector in AWS.
  • C. Create a DX connection between the datacenter and AWS.
  • D. Create a VPN between the datacenter AWS.
Answer:

A C

Explanation:
A VPN is not reliable enough, and an AD connector will cause too much authentication traffic.

Discussions
0 / 1000

Question 7

Which other AWS service is used to track `Related Events' within the Configuration Item?

  • A. AWS WAF
  • B. SQS
  • C. AWS CloudTrail
  • D. S3
Answer:

C

Explanation:
`Related Events' displays the AWS CloudTrail event ID that is related to the change that triggered the creation of the CI.
There is a new CI made for every change made against a resource. As a result a different CloudTrail event IDs will be
created. This allows you you to deep-dive into who or what and when made the change that triggered this CI. A great feature
allowing for some great analysis to be taken, specifically when this affects security resources.
Reference: http://docs.aws.amazon.com/config/latest/developerguide/resource-config-reference.html#config-item-table

Discussions
0 / 1000

Question 8

You have two Direct Connect connections and two VPN connections to your network. Site A is VPN 10.1.0.0/24 AS 65000
65000, Site B is VPN 10.1.0.252/30 AS 65000, Site C is DX 10.0.0.0/8 AS 65000 and Site D is DX 10.0.0.0/16 AS 65000
65000 65000. Which site will AWS choose to reach your network?

  • A. Site A: VPN 10.0.1.0/24 AS 65000 65000
  • B. Site B: VPN 10.0.1.252/30 AS 65000 65000 65000
  • C. Site C: DX 10.0.0.0/8 AS 65000
  • D. Site D: DX 10.0.0.0/16
Answer:

B

Explanation:
Site B, the most specific prefix always wins.

Discussions
0 / 1000

Question 9

Your website utilizes EC2, S3, ELB-Classic, and CloudFront. Your manager has shifted focus to security and wants you to
ensure the site is as secure as possible. What two items could you recommend?
(Choose two.)

  • A. An NACL that blocks all ports to your subnets.
  • B. A restricted bucket policy.
  • C. A WAF on the load balancer.
  • D. A WAF on your CloudFront distribution.
Answer:

B D

Explanation:
A WAF on CloudFront and a restricted bucket policy to ensure the only access is from CloudFront. You cannot apply a WAF
to a classic load balancer and an NACL that blocks all ports would block access to the load balancer.

Discussions
0 / 1000

Question 10

You are configuring multiple Direct Connect links for your organization and need them to be in an HA Active/Passive
configuration with extreme sensitivity to outages in order to encourage very quick failover times. You also need to be able to
control which link is active.
What two configuration changes should you implement? (Choose two.)

  • A. MPLS
  • B. BFD
  • C. AS_PATH Prepending
  • D. BGP
Answer:

B C

Explanation:
Bidirectional-Forwarding Detection will allow for faster failover times. AS_PATH Prepending will allow you to choose the
default path. BGP is already implemented and MPLS does not matter.

Discussions
0 / 1000

Question 11

Your customer's internal security teams receive requests to allow Amazon S3 access from inside the corporate network. All
external traffic must be explicitly whitelisted through your corporate firewalls.
How can your security team grant this access?

  • A. Obtain the list of IP prefixes from AWS Forum announcements, and use those prefixes in firewall rules.
  • B. Obtain the list of IP prefixes from ip-ranges.json, and use those prefixes in firewall rules.
  • C. Obtain the list of IP prefixes by performing a DNS lookup on Amazon S3 endpoints, and use those prefixes in firewall rules.
  • D. Connect your data center to a VPC via Direct Connect. Create routes that forward traffic from your data center to an S3 private endpoint.
Answer:

B

Explanation:
ip-ranges.json contains the latest list of IP addresses used by AWS. AWS no longer posts IP prefixes in Forum
announcements. DNS lookups would not provide an exhaustive list of possible IP prefixes. D would require transitive routing,
which is not possible.

Discussions
0 / 1000

Question 12

What is NOT a benefit of CloudFront?

  • A. Helps ease the strain on your web servers
  • B. Distributes traffic evenly to EC2 instances
  • C. Speeds up distribution of RTMP content
  • D. Speeds up distribution of static and dynamic web content
Answer:

B

Explanation:
Elastic Load balancers distribute traffic to EC2 instances.

Discussions
0 / 1000

Question 13

A network engineer has configured a private hosted zone using Amazon Route 53. The engineer needs to configure health
checks for record sets within the zone that are associated with instances.
How can the engineer meet the requirements?

  • A. Configure a Route 53 health check to a private IP associated with the instances inside the VPC to be checked.
  • B. Configure a Route 53 health check pointing to an Amazon SNS topic that notifies an Amazon CloudWatch alarm when the Amazon EC2 StatusCheckFailed metric fails.
  • C. Create a CloudWatch metric that checks the status of the EC2 StatusCheckFailed metric, add an alarm to the metric, and then create a health check that is based on the state of the alarm.
  • D. Create a CloudWatch alarm for the StatusCheckFailed metric and choose Recover this instance, selecting a threshold value of 1.
Answer:

A

Discussions
0 / 1000

Question 14

Which of the following statements does not describe Jumbo Frames in an AWS VPC environment?

  • A. For instances that are collocated inside a placement group, jumbo frames help to achieve the maximum network throughput possible
  • B. Jumbo Frames are not supported for traffic that exits the Virtual Private Gateway
  • C. Jumbo Frames are not supported for traffic that exits the Internet Gateway
  • D. T2.micro instances do not support Jumbo Frames
Answer:

D

Explanation:
All answers except for Answer D are correct. Answer D is incorrect in that AWS does indeed support Jumbo Frames on all
instance types within the T2 family class - including the T2.micro instance type.
Reference: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/network_mtu.html

Discussions
0 / 1000

Question 15

You have multiple Amazon Elastic Compute Cloud (EC2) instances running a web server in a VPC configured with security
groups and NACL. You need to ensure layer 7 protocol level logging of all network traffic (ACCEPT/REJECT) on the
instances. What should be enabled to complete this task?

  • A. CloudWatch Logs at the VPC level
  • B. Packet sniffing at the instance level
  • C. VPC flow logs at the subnet level
  • D. Packet sniffing at the VPC level
Answer:

A

Discussions
0 / 1000
To page 2