Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified Advanced Networking - Specialty ANS-C01 All Questions

View all questions & answers for the AWS Certified Advanced Networking - Specialty ANS-C01 exam

Exam AWS Certified Advanced Networking - Specialty ANS-C01 topic 1 question 28 discussion

A software company offers a software-as-a-service (SaaS) accounting application that is hosted in the AWS Cloud The application requires connectivity to the company's on-premises network. The company has two redundant 10 GB AWS Direct Connect connections between AWS and its on-premises network to accommodate the growing demand for the application.
The company already has encryption between its on-premises network and the colocation. The company needs to encrypt traffic between AWS and the edge routers in the colocation within the next few months. The company must maintain its current bandwidth.
What should a network engineer do to meet these requirements with the LEAST operational overhead?

  • A. Deploy a new public VIF with encryption on the existing Direct Connect connections. Reroute traffic through the new public VIF.
  • B. Create a virtual private gateway Deploy new AWS Site-to-Site VPN connections from on premises to the virtual private gateway Reroute traffic from the Direct Connect private VIF to the new VPNs.
  • C. Deploy a new pair of 10 GB Direct Connect connections with MACsec. Configure MACsec on the edge routers. Reroute traffic to the new Direct Connect connections. Decommission the original Direct Connect connections
  • D. Deploy a new pair of 10 GB Direct Connect connections with MACsec. Deploy a new public VIF on the new Direct Connect connections. Deploy two AWS Site-to-Site VPN connections on top of the new public VIF. Reroute traffic from the existing private VIF to the new Site-to-Site connections. Decommission the original Direct Connect connections.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
linuxek21
Highly Voted 1 year, 5 months ago
Correct answer is C, B - you need a public VIF for VPN to VGW, only TGW VPNs can be used with a private VIF. Also, they are supposed to maintain current bandwidth. VPN limits their connection to 1.25Gbps Additional Notes: I am not a big fan of answer C as it assumes the edge router supports macsec.
upvoted 8 times
kaush4u
1 year, 2 months ago
MacSec does not encrypt AWS to colocation ,hence B
upvoted 2 times
Akshay0403
2 months, 2 weeks ago
We are talking about LEAST operational overhead so we cannot use Site to Site VPN here.
upvoted 1 times
...
AWS_Exam_Enjoyer
11 months, 2 weeks ago
B states that it will create the vif on-premise not colloc so B is incorrect. C on the other hand says "edge router" and edge router is on the Colloc as well. It's tricky but if you read thru you'll understand more
upvoted 1 times
...
Josh1217
1 year, 2 months ago
Site-to-Site VPN will not satisfy 'Maintain current Bandwidth'. Hence B is incorrect.
upvoted 2 times
A_A_AB
1 year, 2 months ago
You mean C, right? B talks about VPC which doesn't satisfy the bandwidth requirement.
upvoted 2 times
...
...
...
...
Raphaello
Most Recent 5 months, 2 weeks ago
Selected Answer: C
C is the correct answer. MACSec is a L2 encryption, and best solution to maintain the current bandwidth.
upvoted 1 times
...
tromyunpak
5 months, 4 weeks ago
C is the correct answer due you need new DX connections to enable macsec. with macsec you will have throughput required A is wrong since you have cannot public vif with encryption D is wrong since it doesn't make sense to have macsec and ipsec also IPSEC throughput is 1.25Gb/s not 10Gb/s B is wrong due to the throughput is limited by the VPNs and with VPG ecmp is not supported unlike TGW
upvoted 1 times
...
vikasj1in
7 months, 1 week ago
Selected Answer: C
MACsec (Media Access Control Security) is a standard for securing Ethernet connections at the link layer. It provides encryption for data traffic between the AWS Direct Connect routers and the edge routers in the colocation facility. In this scenario, deploying a new pair of 10 GB Direct Connect connections with MACsec provides encryption for the traffic between AWS and the colocation without changing the existing bandwidth. Configuring MACsec on the edge routers ensures that the traffic is encrypted over the new Direct Connect connections. Option C is the most appropriate solution as it introduces MACsec on dedicated high-speed Direct Connect connections, ensuring security without the need for additional VPNs or significant operational overhead.
upvoted 2 times
vikasj1in
7 months ago
Assuming the edge router supports MACsec (which is not mentioned in the question clearly).
upvoted 1 times
...
...
Marfee400704
7 months, 1 week ago
I think that it's correct answer is C according to SPOTO products.
upvoted 1 times
...
marfee
7 months, 2 weeks ago
I think that it's correcty answer is B.
upvoted 1 times
...
habros
11 months, 1 week ago
Selected Answer: C
C. Two pairs of DX is solid enough, S2SVPN adds even more redundancy, at 1.25Gbps max per line (way lesser than 10Gbps needed)
upvoted 1 times
...
Mishranihal737
1 year, 1 month ago
C is correct, VPN connection will limit the BW to 1.25 GBps
upvoted 2 times
...
Cheam
1 year, 1 month ago
Selected Answer: C
Another tricky question. 1) You cannot create a VPN tunnel via Private VIFs 2) The company must maintain its current bandwidth. VPN tunnels max throughput is up to 1.25Gbps. Answer is C All the best.
upvoted 2 times
...
Certified101
1 year, 1 month ago
Selected Answer: C
C is correct
upvoted 1 times
...
sen460
1 year, 2 months ago
Correct Answer is C - Refer to extracted piece of text from the link shared - "You can use AWS Direct Connect connections that support MACsec to encrypt your data from your on-premises network or collocated device to your chosen AWS Direct Connect point of presence". Link for Reference - https://aws.amazon.com/directconnect/faqs/
upvoted 2 times
...
Untamables
1 year, 5 months ago
Selected Answer: C
C https://docs.aws.amazon.com/directconnect/latest/UserGuide/MACsec.html
upvoted 2 times
...
ITgeek
1 year, 5 months ago
Selected Answer: B
This option suggests creating a virtual private gateway and deploying new AWS Site-to-Site VPN connections from on premises to the virtual private gateway. Then, rerouting traffic from the Direct Connect private VIF to the new VPNs. This option requires less operational overhead than option A because it does not require creating a new VIF, but it does require BBB configuring a new VPN connection. This option would also meet the requirement of maintaining the current bandwidth. Please explain your answer of why C?
upvoted 3 times
zaazanuna
1 year, 5 months ago
Q: What throughput can I get with Private IP VPN? A: Just like regular Site-to-site VPN connections, each private IP VPN connection supports 1.25Gbps of bandwidth. You can use ECMP (Equal Cost Multi-path) across multiple private IP VPN connections to increase effective bandwidth. As an example, to send 10Gbps of DX traffic over a private IP VPN, you can use 4 private IP VPN connections (4 connections x 2 tunnels x 1.25Gbps bandwidth) with ECMP between a pair of Transit gateway and Customer gateway.
upvoted 3 times
albertkr
1 year, 4 months ago
B only says create "a" VPN tunnel, which means the max bw is only 1.25Gbps
upvoted 2 times
...
...
...
flowers00
1 year, 6 months ago
C - correct.
upvoted 3 times
ITgeek
1 year, 5 months ago
why do you think deploying new direct connection would be easier, given the time constrain ? the connection are already in place
upvoted 1 times
...
...
zaazanuna
1 year, 6 months ago
C - correct.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...