Chapter 2 - Networking: VPC, ELB, API Gateway, AWS App Mesh, Direct Connect, Private Link, Global Accelerator, Transit Gateway, VPN Flashcards
What are the characteristics of VPC security groups? Choose 3.
- You can specify allow rules, but not deny rules.
- You can specify separate rules for inbound and outbound traffic.
- You can specify deny rules, but not allow rules.
- When you create a security group, it has no inbound rules.
- When you create a security group, it has no outbound rules.
- You can specify allow rules, but not deny rules.
- You can specify separate rules for inbound and outbound traffic.
- You can specify deny rules, but not allow rules.
- When you create a security group, it has no inbound rules.
- When you create a security group, it has no outbound rules.
Which of the following statements are true for security groups? Choose 3.
- Security groups are stateful.
- Security groups are stateless.
- If you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules.
- Responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules.
- Security groups are stateful.
- Security groups are stateless.
- If you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules.
- Responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules.
Which of the following statements are true for default security group? Choose 3.
- If you don’t specify a security group when you launch an instance, the instance is automatically associated with the default security group for the VPC.
- Allows all inbound traffic from outside world.
- Allows all inbound traffic from other instances associated with the default security group.
- Allows all outbound traffic from the instance.
- Denys all outbound traffic from the instance.
- If you don’t specify a security group when you launch an instance, the instance is automatically associated with the default security group for the VPC.
- Allows all inbound traffic from outside world.
- Allows all inbound traffic from other instances associated with the default security group.
- Allows all outbound traffic from the instance.
- Denys all outbound traffic from the instance.
What are the default rules of a new security group? Choose 2.
- Allows inbound traffic
- Denys outbound traffic
- Allows no inbound traffic
- Allows all outbound traffic
- Allows inbound traffic
- Denys outbound traffic
- Allows no inbound traffic
- Allows all outbound traffic
You want to create a public-facing web server to host a blog. You are planning to place the Linux EC2 web server in a VPC with a subnet having an IPv4 CIDR block. You also want to access the EC2 instance form your laptop. Which of the following steps are applicable? Choose 4.
- Create a nondefault VPC with a single public subnet and internet gateway.
- Attach route tables to the VPC which allows traffic to flow from the subnet to the Internet gateway.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http, Https and access from your home network address.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http. Https.
- Launch an Amazon EC2 instance into your subnet and associate an Elastic IP address with your instance.
- Create a nondefault VPC with a single public subnet and internet gateway.
- Attach route tables to the VPC which allows traffic to flow from the subnet to the Internet gateway.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http, Https and access from your home network address.
- Create a security group for your instance that allows traffic only through specific ports to enable inbound Http. Https.
- Launch an Amazon EC2 instance into your subnet and associate an Elastic IP address with your instance.
Which of the following statements are true regarding VPC and subnets? Choose 2.
- A VPC spans all the Availability Zones in the region.
- Each subnet must reside entirely within one Availability Zone and cannot span zones.
- Each subnet can span more than one availability zones.
- A VPC needs to be mapped to availability zones in a region.
- A VPC spans all the Availability Zones in the region.
- Each subnet must reside entirely within one Availability Zone and cannot span zones.
- Each subnet can span more than one availability zones.
- A VPC needs to be mapped to availability zones in a region.
There are three subnets 1A, 2A, and 3A each with one EC2 instance. The figure above depicts the ip address of VPC, subnet and instances. The route tables attached to three subnets are also depicted on the right side of figure. Q7. Which subnet in the figure above is a public subnet?
- 1A
- 2A
- 3A
- None of the above
- 1A
- 2A
- 3A
- None of the above
Which subnet in the figure above is a private subnet?
- 1A
- 2A
- 3A
- None of the above
- 1A
- 2A
- 3A
- None of the above
Which subnet in the figure above is a vpn-only subnet?
- 1A
- 2A
- 3A
- None of the above
- 1A
- 2A
- 3A
- None of the above
Which of the following statements are correct regarding CIDR block range of a VPC subnet? Choose 2.
- The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be a subset of the CIDR block for the VPC (for multiple subnets).
- The CIDR block of a subnet can be a subset of the CIDR block for the VPC (for multiple subnets).
- The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be the same as the CIDR block for the VPC (for a single subnet in the VPC).
- The CIDR block of a subnet cannot be a subset of the CIDR block for the VPC (for multiple subnets).
- The CIDR block of a subnet can be a subset of the CIDR block for the VPC (for multiple subnets).
Which of the following statements are correct regarding IPv4 CIDR block range of a VPC subnet? Choose 2.
- The allowed block size is between a min: /28 netmask and max: /16 netmask.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets cannot overlap.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets can overlap.
- The allowed block size is between a min: /16 netmask and max: /28 netmask.
- The allowed block size is between a min: /28 netmask and max: /16 netmask.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets cannot overlap.
- If you create more than one subnet in a VPC, the CIDR blocks of the subnets can overlap.
- The allowed block size is between a min: /16 netmask and max: /28 netmask.
How many IP addresses in each subnet CIDR block are not available for you to use, and cannot be assigned to an instance?
- 2
- 3
- 4
- 5
- 2
- 3
- 4
- 5
Which of the following rules apply when you add IPv4 CIDR blocks to a VPC that’s part of a VPC peering connection? Choose 3
- If the VPC peering connection is active, you can add CIDR blocks to a VPC provided they do not overlap with a CIDR block of the peer VPC.
- If the VPC peering connection is pending-acceptance, the owner of the requester VPC cannot add any CIDR block to the VPC, regardless of whether it overlaps with the CIDR block of the accepter VPC. Either the owner of the accepter VPC must accept the peering connection, or the owner of the requester VPC must delete the VPC peering connection request, add the CIDR block, and then request a new VPC peering connection.
- If the VPC peering connection is pending-acceptance, the owner of the accepter VPC can add CIDR blocks to the VPC. If a secondary CIDR block overlaps with a CIDR block of the requester VPC, the VPC peering connection request fails and cannot be accepted.
- If the VPC peering connection is active, you can add CIDR blocks to a VPC which overlap with a CIDR block of the peer VPC.
- If the VPC peering connection is active, you can add CIDR blocks to a VPC provided they do not overlap with a CIDR block of the peer VPC.
- If the VPC peering connection is pending-acceptance, the owner of the requester VPC cannot add any CIDR block to the VPC, regardless of whether it overlaps with the CIDR block of the accepter VPC. Either the owner of the accepter VPC must accept the peering connection, or the owner of the requester VPC must delete the VPC peering connection request, add the CIDR block, and then request a new VPC peering connection.
- If the VPC peering connection is pending-acceptance, the owner of the accepter VPC can add CIDR blocks to the VPC. If a secondary CIDR block overlaps with a CIDR block of the requester VPC, the VPC peering connection request fails and cannot be accepted.
- If the VPC peering connection is active, you can add CIDR blocks to a VPC which overlap with a CIDR block of the peer VPC.
Which subnet security feature is extra layer of security and can be optional?
- Security Groups
- Network ACLs
- Routing Table
- Internet Gateway
- Security Groups
- Network ACLs
- Routing Table
- Internet Gateway
You have created a VPC, Subnet, Instances as below:
A VPC with CIDR block 10.0.0.0/16
A subnet in that VPC with CIDR block 10.0.1.0/24
Instances running in that subnet with IP addresses 10.0.1.6 and 10.0.1.7
On-premises host networks using CIDR blocks 10.0.30.0/24 and 10.1.31.0/24
You have appropriately configured their security group settings so that inbound and outbound connection can be made between the VPC and your on-premise network. However when those instances in the VPC try to talk to hosts in the 10.0.30.0/24 address space in your corporate network, the traffic is dropped but they can talk to the instances in 10.1.31.0/24 address space? What could be the reason? Choose 2.
- You have to also configure the Network ACL for communication between VPC and your corporate address space.
- Your VPC address space 10.0.0.0/16 overlaps with one of your on-premise networks’ prefixes 10.0.30.0/24, so the traffic to the network’s prefix is dropped.
- Your VPC instances can talk to hosts in the 10.1.31.0/24 space because that block isn’t part of 10.0.0.0/16.
- You have not enabled flow logs.
- You have to also configure the Network ACL for communication between VPC and your corporate address space.
- Your VPC address space 10.0.0.0/16 overlaps with one of your on-premise networks’ prefixes 10.0.30.0/24, so the traffic to the network’s prefix is dropped.
- Your VPC instances can talk to hosts in the 10.1.31.0/24 space because that block isn’t part of 10.0.0.0/16.
- You have not enabled flow logs.
Which of the following statements are correct about default VPC and default subnet? Choose 3.
- A default subnet is a private subnet.
- A default subnet is a public subnet.
- Instances that you launch into a default subnet receive both a public IPv4 address and a private IPv4 address, and both public and private DNS hostnames.
- A default security group is associated with your default VPC.
- A default subnet is a private subnet.
- A default subnet is a public subnet.
- Instances that you launch into a default subnet receive both a public IPv4 address and a private IPv4 address, and both public and private DNS hostnames.
- A default security group is associated with your default VPC.
By default, Amazon EC2 and Amazon VPC use which addressing protocol?
- IPv6
- TCP
- IPv4
- UDP
- IPv6
- TCP
- IPv4
- UDP
It is necessary to associate an IPv6 CIDR block with your VPC?
- True
- False
- True
- False
When you assign both IPv4 and IPv6 CIDR block to your VPC, which of the following statements are correct? Choose 2.
- Your VPC resources can communicate over IPv6 only.
- Your VPC resources can communicate over IPv4, or IPv6, or both.
- IPv4 and IPv6 addresses are independent of each other; you must configure routing and security in your VPC separately for IPv4 and IPv6.
- You must configure routing and security in your VPC only for IPv6.
- Your VPC resources can communicate over IPv6 only.
- Your VPC resources can communicate over IPv4, or IPv6, or both.
- IPv4 and IPv6 addresses are independent of each other; you must configure routing and security in your VPC separately for IPv4 and IPv6.
- You must configure routing and security in your VPC only for IPv6.
What are the values you can configure within a DHCP option set for a VPC? Choose 3.
- Domain-name-servers and Domain-name
- Static Public IP address
- ntp-servers and netbios-name-servers
- netbios-node-type
- Domain-name-servers and Domain-name
- Static Public IP address
- ntp-servers and netbios-name-servers
- netbios-node-type
How can you ensure that a network interface created in the subnet automatically receives a public IPv4 address? Choose 2
- Modifying the public IP addressing attribute of your VPC.
- Modifying the public IP addressing attribute of your AZ.
- Modifying the public IP addressing attribute of your subnet.
- Enabling or disabling the public IP addressing feature during instance launch, which overrides the subnet’s public IP addressing attribute.
- Modifying the public IP addressing attribute of your VPC.
- Modifying the public IP addressing attribute of your AZ.
- Modifying the public IP addressing attribute of your subnet.
- Enabling or disabling the public IP addressing feature during instance launch, which overrides the subnet’s public IP addressing attribute.
Which are the features provided by Amazon Virtual Private Cloud that you can use to increase and monitor the security for your virtual private cloud (VPC)? Choose 3.
- Security groups
- Network access control lists (ACLs)
- Flow logs
- Cloudwatch
- Security groups
- Network access control lists (ACLs)
- Flow logs
- Cloudwatch
Which of the following statements are true regarding security groups (SG) and network ACLs? Choose 2.
- SG operates at instance level and network ACLs operates at subnet level.
- SG supports allow rules only and network ACLs support allow and deny rules.
- Network ACLs operates at instance level and SG operates at subnet level.
- Network ACLs supports allow rules only and SG support allow and deny rules.
- SG operates at instance level and network ACLs operates at subnet level.
- SG supports allow rules only and network ACLs support allow and deny rules.
- Network ACLs operates at instance level and SG operates at subnet level.
- Network ACLs supports allow rules only and SG support allow and deny rules.
You have ensured that an instance interface created in the subnet automatically receives a public IPv4 address by modifying the public IP addressing attribute of your subnet and enabling the public IP addressing feature during instance launch. How can you ensure that instances launched in the VPC receive public DNS hostnames that correspond to their public IP addresses and DNS resolution through the Amazon DNS server is supported for the VPC?
- You don’t need to do anything, DNS hostnames are automatically provided by AWS once an instance gets a public ip address.
- Set VPC attribute enableDnsHostnames and enableDnsSupport to true.
- Set only VPC attribute to enableDnsHostnames true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.
- Set only VPC attribute to enableDnsSupport true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.
- You don’t need to do anything, DNS hostnames are automatically provided by AWS once an instance gets a public ip address.
- Set VPC attribute enableDnsHostnames and enableDnsSupport to true.
- Set only VPC attribute to enableDnsHostnames true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.
- Set only VPC attribute to enableDnsSupport true for ensuring instances with public IP addresses get corresponding public DNS hostnames. This will also ensure DNS resolution.