Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified Advanced Networking - Specialty ANS-C01 All Questions

View all questions & answers for the AWS Certified Advanced Networking - Specialty ANS-C01 exam

Exam AWS Certified Advanced Networking - Specialty ANS-C01 topic 1 question 16 discussion

A company is using a NAT gateway to allow internet connectivity for private subnets in a VPC in the us-west-2 Region. After a security audit, the company needs to remove the NAT gateway.
In the private subnets, the company has resources that use the unified Amazon CloudWatch agent. A network engineer must create a solution to ensure that the unified CloudWatch agent continues to work after the removal of the NAT gateway.
Which combination of steps should the network engineer take to meet these requirements? (Choose three.)

  • A. Validate that private DNS is enabled on the VPC by setting the enableDnsHostnames VPC attribute and the enableDnsSupport VPC attribute to true.
  • B. Create a new security group with an entry to allow outbound traffic that uses the TCP protocol on port 443 to destination 0.0.0.0/0
  • C. Create a new security group with entries to allow inbound traffic that uses the TCP protocol on port 443 from the IP prefixes of the private subnets.
  • D. Create the following interface VPC endpoints in the VPC: com.amazonaws.us-west-2.logs and com.amazonaws.us-west-2.monitoring. Associate the new security group with the endpoint network interfaces.
  • E. Create the following interface VPC endpoint in the VPC: com.amazonaws.us-west-2.cloudwatch. Associate the new security group with the endpoint network interfaces.
  • F. Associate the VPC endpoint or endpoints with route tables that the private subnets use.
Show Suggested Answer Hide Answer
Suggested Answer: BDF 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
slackbot
Highly Voted 1 year, 5 months ago
Selected Answer: ACD
A,C and D
upvoted 16 times
...
Untamables
Highly Voted 1 year, 5 months ago
Selected Answer: ACD
A, C, and D An interface VPC endpoint provides reliable, scalable connectivity to CloudWatch without requiring a NAT gateway. https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/cloudwatch-and-interface-VPC.html https://docs.aws.amazon.com/vpc/latest/privatelink/aws-services-privatelink-support.html To use private DNS, you must enable DNS hostnames and DNS resolution for your VPC. The security group for the interface endpoint must allow communication between the endpoint network interface and the resources in your VPC that must communicate with the service. https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 8 times
ddtn
1 year, 4 months ago
D) would be correct if the URL are not messed up: monitoring.eu-west-2.amazonaws.com and logs.eu-west-2.amazonaws.com
upvoted 4 times
JoellaLi
6 months ago
No. The URL are correct. https://docs.aws.amazon.com/vpc/latest/privatelink/aws-services-privatelink-support.html
upvoted 1 times
...
...
...
zain1258
Most Recent 4 weeks ago
Selected Answer: ACD
A, C and D
upvoted 1 times
...
hedglin
2 months, 2 weeks ago
A,B and D. Option C is not needed because we're not concerned with inbound traffic for this scenario.
upvoted 1 times
AlohaEva
1 month ago
The security group is for Endpoint Network Interface, so the traffic which comes from the private subnet (our VPC) is inbound for Endpoint Network Interface. That's why we need inbound traffic allowance https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
[Removed]
5 months, 2 weeks ago
I would go for ABD and here is why. The VPC used to have access via NAT and this was removed so there must have been a security group rule for 0.0.0.0/0 via NAT and now we need a new one. Option B is the best we get in the scenario. As the traffic will be triggered outbound, no need for an new inbound rule as SGs are stateful. Option A makes sense always everytime and D is correct as there is no endpoint named "cloudwatch". Option F only makes sense for gateway endpoints but with interface endpoints what we get is an internally created private hosted zone that will resolve "public" endpoint names (like cloudwatch) to internal IP addresses (that of our interface endpoints) so no routes are needed and hence no updates to route tables.
upvoted 1 times
...
Raphaello
5 months, 2 weeks ago
Selected Answer: ACD
ACD are the correct answers. Service PrivateLink endpoints https://docs.aws.amazon.com/vpc/latest/privatelink/aws-services-privatelink-support.html
upvoted 1 times
AlohaEva
1 month ago
The security group is for Endpoint Network Interface, so the traffic which comes from the private subnet (our VPC) is inbound for Endpoint Network Interface. That's why we need inbound traffic allowance https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
patanjali
6 months, 2 weeks ago
Selected Answer: ACD
https://repost.aws/knowledge-center/cloudwatch-unified-agent-metrics-issues Confirm connectivity to the CloudWatch endpoints When traffic to CloudWatch should not transit the public internet, you can use VPC endpoints instead. If you are using VPC endpoints, check the following: If you are using private nameservers, confirm that DNS resolution provided accurate responses. Confirm that the CloudWatch endpoints resolve to private IP addresses. Confirm the security group associated with the VPC endpoint allows inbound traffic from the host.
upvoted 3 times
...
Marfee400704
7 months, 1 week ago
I think that it's correct answer is ACF according to SPOTO products.
upvoted 1 times
AlohaEva
1 month ago
The security group is for Endpoint Network Interface, so the traffic which comes from the private subnet (our VPC) is inbound for Endpoint Network Interface. That's why we need inbound traffic allowance https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
marfee
7 months, 2 weeks ago
I think that it's correcty answer is A & B & D.
upvoted 1 times
...
AmSpOkE
7 months, 2 weeks ago
Selected Answer: ACD
Answers are A, C and D 100% sure.
upvoted 1 times
AlohaEva
1 month ago
The security group is for Endpoint Network Interface, so the traffic which comes from the private subnet (our VPC) is inbound for Endpoint Network Interface. That's why we need inbound traffic allowance https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
WMF0187
1 year ago
The Unified CloudWatch Agent uses port 443, which is the default port for HTTPS traffic, for secure communication with CloudWatch. The endpoint name associated with CloudWatch is "monitoring.us-east-1.amazonaws.com" (for the US East region). The endpoint may vary depending on the AWS region where you are operating.
upvoted 1 times
...
siiiww
1 year ago
for sure A,B,D dont need inbound rules .... I tested 3 yrs ago. NEED ONLY OUTBOUND
upvoted 2 times
AlohaEva
1 month ago
The security group is for Endpoint Network Interface, so the traffic which comes from the private subnet (our VPC) is inbound for Endpoint Network Interface. That's why we need inbound traffic allowance https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
sp237
1 year, 1 month ago
How is A a valid option for private subnet? enableDnsHostname (= DNS Hostname setting) Indicates whether instances with public IP addresses get corresponding public DNS hostnames. If this attribute is true, instances in the VPC get public DNS hostnames, but only if the enableDnsSupport attribute is also set to true .
upvoted 1 times
AlohaEva
1 month ago
enabling enableDnsHostnames and enableDnsSupport VPC attributes will allow using private DNS resolution, and it is a prerequisites for creating Interface Endpoint https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
emmanuelodenyire
1 year, 4 months ago
Selected Answer: ADF
There seems to be some disagreement among different individuals about the answer to this question. However, based on the requirements provided and the skills being tested, I believe the correct answer is A, D, and F. F is correct because associating the VPC endpoint with the route tables that the private subnets use is necessary to ensure that traffic is routed through the VPC endpoint. Option C is incorrect because it suggests creating inbound rules for the TCP protocol on port 443 from the IP prefixes of the private subnets. However, this is not necessary to allow the unified CloudWatch agent to continue working after the removal of the NAT gateway. In fact, creating inbound rules for port 443 is not related to the problem statement, since the issue is about ensuring the CloudWatch agent can communicate with AWS services without using a NAT gateway. Creating inbound rules would only be necessary if you wanted to allow external traffic to access resources within your VPC over HTTPS on port 443.
upvoted 6 times
TravelKo
1 year, 2 months ago
I think it is other way round. If you need to route external traffic you need an entry in the route table. For external or internal you need an entry in the Security group.
upvoted 2 times
...
task_7
10 months, 4 weeks ago
I agree A enableDnsSupport Determines whether the VPC supports DNS resolution through the Amazon provided DNS server. If this attribute is true, queries to the Amazon provided DNS server succeed. For more information, see Amazon DNS server. D VPC end points for logs and CW Metrics F Subnet can route traffic to VPC endpoint Since NAT was running SG rule for 443 would be in place
upvoted 1 times
...
...
ILOVEVODKA
1 year, 5 months ago
https://repost.aws/knowledge-center/cloudwatch-unified-agent-metrics-issues ACD
upvoted 1 times
AlohaEva
1 month ago
The security group is for Endpoint Network Interface, so the traffic which comes from the private subnet (our VPC) is inbound for Endpoint Network Interface. That's why we need inbound traffic allowance https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
navi7
1 year, 6 months ago
Selected Answer: ACD
B is incorrect as we don't need to create outbound rules for interface endpoint. "Note: You don't need to create a rule in the outbound direction of the security group associated with the interface endpoint." https://repost.aws/knowledge-center/security-network-acl-vpc-endpoint A is also partially correct as normally CloudWatch Agent uses public endpoints but it can be overridden. But since other options are incorrect so A is a right choice here.
upvoted 4 times
AlohaEva
1 month ago
The security group is for Endpoint Network Interface, so the traffic which comes from the private subnet (our VPC) is inbound for Endpoint Network Interface. That's why we need inbound traffic allowance https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 1 times
...
...
Cappy46789
1 year, 6 months ago
Selected Answer: ABD
ABD - https://docs.aws.amazon.com/vpc/latest/privatelink/create-interface-endpoint.html
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...