exam questions

Exam AWS Certified Advanced Networking - Specialty ANS-C01 All Questions

View all questions & answers for the AWS Certified Advanced Networking - Specialty ANS-C01 exam

Exam AWS Certified Advanced Networking - Specialty ANS-C01 topic 1 question 6 discussion

A software-as-a-service (SaaS) provider hosts its solution on Amazon EC2 instances within a VPC in the AWS Cloud. All of the provider's customers also have their environments in the AWS Cloud.
A recent design meeting revealed that the customers have IP address overlap with the provider's AWS deployment. The customers have stated that they will not share their internal IP addresses and that they do not want to connect to the provider's SaaS service over the internet.
Which combination of steps is part of a solution that meets these requirements? (Choose two.)

  • A. Deploy the SaaS service endpoint behind a Network Load Balancer.
  • B. Configure an endpoint service, and grant the customers permission to create a connection to the endpoint service.
  • C. Deploy the SaaS service endpoint behind an Application Load Balancer.
  • D. Configure a VPC peering connection to the customer VPCs. Route traffic through NAT gateways.
  • E. Deploy an AWS Transit Gateway, and connect the SaaS VPC to it. Share the transit gateway with the customers. Configure routing on the transit gateway.
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
emmanuelodenyire
Highly Voted 1 year, 2 months ago
Selected Answer: AB
The correct answer is A and B. Option A, deploying the SaaS service endpoint behind a Network Load Balancer (NLB), allows the provider to present a single IP address to customers, while maintaining a highly available and scalable architecture. This is achieved by mapping the NLB's IP address to the SaaS service endpoint. Option B, configuring an endpoint service, enables customers to connect to the SaaS service endpoint using their own private IP addresses. This allows customers to avoid IP address overlap with the provider's AWS deployment and provides a secure, private connection to the SaaS service without traversing the internet.
upvoted 11 times
...
bogehad181
Highly Voted 1 year, 2 months ago
Selected Answer: AB
A&B: https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-access-saas.html
upvoted 7 times
...
Raphaello
Most Recent 3 months, 1 week ago
Selected Answer: AB
AB are the correct answers. Ideal use case for VPC service endpoint (PrivateLink)
upvoted 1 times
...
tromyunpak
3 months, 3 weeks ago
A and B that is the configuration to setup a private link
upvoted 1 times
...
patanjali
4 months ago
Answer are A and B D cant be the answer as per https://docs.aws.amazon.com/vpc/latest/peering/vpc-peering-basics.html#vpc-peering-limitations, You cannot create a VPC peering connection between VPCs that have matching or overlapping IPv4 or IPv6 CIDR blocks.
upvoted 2 times
...
Marfee400704
4 months, 4 weeks ago
I think that it's correct answer is AB according to SPOTO products.
upvoted 1 times
...
Marfee400704
5 months ago
I think that It's correct answer is AB according to SPOTO products.
upvoted 1 times
...
marfee
5 months ago
I think that it's correcty answer is A & B.
upvoted 1 times
...
Hisayuki
5 months, 3 weeks ago
Selected Answer: AB
With a PrivateLink, you can expose your own services to another VPC. But you can not choose the ALB as an endpoint for PrivateLink. Instead, Use the NLB for the PrivateLink.
upvoted 3 times
...
FayeG
8 months, 2 weeks ago
Selected Answer: AB
The correct answer is A and B
upvoted 1 times
...
MEDES
9 months, 3 weeks ago
The correct answer is A and B. Option A, deploying the SaaS service endpoint behind a Network Load Balancer (NLB), allows the provider to present a single IP address to customers, while maintaining a highly available and scalable architecture. This is achieved by mapping the NLB's IP address to the SaaS service endpoint. Option B, configuring an endpoint service, enables customers to connect to the SaaS service endpoint using their own private IP addresses. This allows customers to avoid IP address overlap with the provider's AWS deployment and provides a secure, private connection to the SaaS service without traversing the internet.
upvoted 1 times
...
dvaidya
10 months ago
Selected Answer: AB
this is standard use case of privatelink
upvoted 1 times
...
PhilMultiCloud
11 months, 2 weeks ago
The correct choices are: A. Deploy the SaaS service endpoint behind a Network Load Balancer. B. Configure an endpoint service, and grant the customers permission to create a connection to the endpoint service. The problem here is that there is an IP address overlap between the SaaS provider's deployment and the customers' environments. Given this, we need a solution that allows private connectivity without the need for specific IP addresses. Deploying the SaaS service behind a Network Load Balancer (NLB) will allow the service to scale and handle traffic in a reliable way. Also, NLB supports IP targets, which would allow the SaaS service to connect directly to the EC2 instances. AWS PrivateLink, which includes endpoint services, provides private connectivity between VPCs, AWS services, and on-premises applications, without exposing the traffic to the public internet. This is precisely the functionality we need in this scenario. When we create an endpoint service, the customers can create a connection to the service, which allows them to connect to the SaaS application privately.
upvoted 1 times
...
4bed5ff
1 year ago
I chose C instead of A, because "Elastic Load Balancing now supports forwarding traffic directly from Network Load Balancer (NLB) to Application Load Balancer (ALB). With this feature, you can now use AWS PrivateLink and expose static IP addresses for applications built on ALB." https://aws.amazon.com/about-aws/whats-new/2021/09/application-load-balancer-aws-privatelink-static-ip-addresses-network-load-balancer/
upvoted 1 times
...
slackbot
1 year, 3 months ago
Selected Answer: AB
A&B are correct ones
upvoted 3 times
...
gpt_test
1 year, 3 months ago
Selected Answer: AB
Deploying the SaaS service endpoint behind a Network Load Balancer (NLB) allows for better scalability and performance, while also supporting connections from AWS PrivateLink, which can provide secure access to the SaaS service without crossing the public internet. Configuring an endpoint service and granting the customers permission to create a connection to the endpoint service allows the customers to access the SaaS service securely and privately through AWS PrivateLink. This ensures that the traffic does not traverse the public internet and does not require sharing internal IP addresses, while also handling IP address overlaps.
upvoted 4 times
...
that1guy
1 year, 3 months ago
Selected Answer: AB
From: https://docs.aws.amazon.com/vpc/latest/privatelink/privatelink-share-your-services.html > " As the service provider, you create a Network Load Balancer in your VPC as the service front end. You then select this load balancer when you create the VPC endpoint service configuration. You grant permission to specific AWS principals so that they can connect to your service. As a service consumer, the customer creates an interface VPC endpoint, which establishes connections between the subnets that they select from their VPC and your endpoint service." ALB (C) isn't an option offered by AWS because private link requires NLB. VPC peering (D) and Transit Gateway (E) requires knowing the customers IP addresses that the customer is not willing to share.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago