Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified Advanced Networking - Specialty ANS-C01 All Questions

View all questions & answers for the AWS Certified Advanced Networking - Specialty ANS-C01 exam

Exam AWS Certified Advanced Networking - Specialty ANS-C01 topic 1 question 75 discussion

A company has hundreds of VPCs on AWS. All the VPCs access the public endpoints of Amazon S3 and AWS Systems Manager through NAT gateways. All the traffic from the VPCs to Amazon S3 and Systems Manager travels through the NAT gateways. The company's network engineer must centralize access to these services and must eliminate the need to use public endpoints.

Which solution will meet these requirements with the LEAST operational overhead?

  • A. Create a central egress VPC that has private NAT gateways. Connect all the VPCs to the central egress VPC by using AWS Transit Gateway. Use the private NAT gateways to connect to Amazon S3 and Systems Manager by using private IP addresses.
  • B. Create a central shared services VPC. In the central shared services VPC, create interface VPC endpoints for Amazon S3 and Systems Manager to access. Ensure that private DNS is turned off. Connect all the VPCs to the central shared services VPC by using AWS Transit Gateway. Create an Amazon Route 53 forwarding rule for each interface VPC endpoint. Associate the forwarding rules with all the VPCs. Forward DNS queries to the interface VPC endpoints in the shared services VPC.
  • C. Create a central shared services VPIn the central shared services VPC, create interface VPC endpoints for Amazon S3 and Systems Manager to access. Ensure that private DNS is turned off. Connect all the VPCs to the central shared services VPC by using AWS Transit Gateway. Create an Amazon Route 53 private hosted zone with a full service endpoint name for Amazon S3 and Systems Manager. Associate the private hosted zones with all the VPCs. Create an alias record in each private hosted zone with the full AWS service endpoint pointing to the interface VPC endpoint in the shared services VPC.
  • D. Create a central shared services VPC. In the central shared services VPC, create interface VPC endpoints for Amazon S3 and Systems Manager to access. Connect all the VPCs to the central shared services VPC by using AWS Transit Gateway. Ensure that private DNS is turned on for the interface VPC endpoints and that the transit gateway is created with DNS support turned on.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
grc1979
Highly Voted 1 year, 6 months ago
Selected Answer: C
https://aws.amazon.com/es/blogs/networking-and-content-delivery/centralized-dns-management-of-hybrid-cloud-with-amazon-route-53-and-aws-transit-gateway/ see Sharing PrivateLink endpoints between VPCs point
upvoted 5 times
...
VerRi
Most Recent 1 month, 2 weeks ago
Selected Answer: D
C and D should work, and D has the least operational overhead. There is no reason to turn off private DNS unless the question requires more control.
upvoted 1 times
...
Raphaello
7 months ago
Selected Answer: C
C is the correct answer. Shared, central VPC + interface endpoint for the required services Disable private DNS, create private hosted zone and associated it with all VPC's Connect all VPC through TGW.
upvoted 1 times
...
stream3652
7 months, 3 weeks ago
https://aws.amazon.com/jp/blogs/news/introducing-private-dns-support-for-amazon-s3-with-aws-privatelink/
upvoted 1 times
...
KobDragoon
7 months, 4 weeks ago
Selected Answer: D
I would also vote for C at first, but is there anything wrong with D as the answer with less operational overhead?
upvoted 1 times
...
Marfee400704
8 months, 3 weeks ago
I think that it's correct answer is C according to SPOTO products.
upvoted 1 times
...
vikasj1in
8 months, 3 weeks ago
Selected Answer: C
This option uses interface VPC endpoints to centralize access to Amazon S3 and Systems Manager in a shared services VPC, eliminating the need for public endpoints. Private DNS is turned off to ensure that the fully qualified domain names (FQDNs) of the services are resolved to their public IP addresses. The use of Amazon Route 53 private hosted zones provides a centralized and scalable DNS solution, and alias records are created to point to the interface VPC endpoints in the shared services VPC. AWS Transit Gateway is used to connect all the VPCs to the central shared services VPC, reducing the operational overhead of managing direct VPC-to-VPC connections. Options A, B, and D either have higher operational overhead or do not provide an optimal solution for centralizing access to Amazon S3 and Systems Manager.
upvoted 4 times
...
Vogd
10 months ago
Selected Answer: D
Check Amazon Feature interoperability for TGW DNS support On https://aws.amazon.com/transit-gateway/features/ Check https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html For DNS support, select this option if you need the VPC to resolve public IPv4 DNS host names to private IPv4 addresses when queried from instances in another VPC attached to the transit gateway. Check https://docs.aws.amazon.com/vpc/latest/userguide/vpc-dns.html#vpc-dns-support If you use custom DNS domain names defined in a private hosted zone in Amazon Route 53, or use private DNS with interface VPC endpoints (AWS PrivateLink), you must set both the enableDnsHostnames and enableDnsSupport attributes to true.
upvoted 2 times
...
Vinsmoke
1 year, 2 months ago
Selected Answer: C
Not D. "When you create a VPC endpoint to an AWS service or AWS PrivateLink SaaS, you can enable Private DNS. When enabled, the setting creates an AWS managed Route 53 private hosted zone (PHZ) for you. The managed PHZ works great for resolving the DNS name within a VPC however, it does not work outside of the VPC. This is where PHZ sharing and Route 53 Resolver come into play to help us get unified name resolution for shared VPC endpoints" https://aws.amazon.com/blogs/networking-and-content-delivery/integrating-aws-transit-gateway-with-aws-privatelink-and-amazon-route-53-resolver/
upvoted 2 times
...
evargasbrz
1 year, 2 months ago
Selected Answer: C
When you create a VPC endpoint to an AWS service, you can enable private DNS. When enabled, the setting creates an AWS managed Route 53 private hosted zone (PHZ) which enables the resolution of public AWS service endpoint to the private IP of the interface endpoint. The managed PHZ only works within the VPC with the interface endpoint. In our setup, when we want spoke VPCs to be able to resolve VPC endpoint DNS hosted in a centralized VPC, the managed PHZ won’t work. To overcome this, disable the option that automatically creates the private DNS when an interface endpoint is created. Next, manually create a Route 53 PHZ and add an Alias record with the full AWS service endpoint name pointing to the interface endpoint, as shown in the following figure.
upvoted 4 times
...
Neo00
1 year, 3 months ago
Selected Answer: D
Enable private DNS option is ok. In this case, the DNS queries for S3 originating will be resolved to the private IPs of S3 interface endpoints I vote D
upvoted 2 times
...
johnconnor
1 year, 4 months ago
Why not B? What's the main difference for you to Choose C over B?
upvoted 3 times
[Removed]
1 year, 3 months ago
B involves creating an Amazon Route 53 forwarding rule for EACH interface VPC endpoint and associating the forwarding rules with all the VPCs. Forward DNS queries to the interface VPC endpoints in the shared services VPC. C is creating an Amazon Route 53 private hosted zone with a FULL service endpoint name for Amazon S3 and Systems Manager. B will be an operational overhead if you consider that the company has hundreds of VPCs. So C is correct.
upvoted 1 times
...
...
Josh1217
1 year, 4 months ago
Selected Answer: C
Private DNS needs to be turned off. Hence, D cannot be the answer.
upvoted 2 times
...
Wiss7
1 year, 4 months ago
Selected Answer: D
how is Option C LEAST operational overhead?!
upvoted 4 times
...
rhinozD
1 year, 6 months ago
Selected Answer: C
https://docs.aws.amazon.com/whitepapers/latest/building-scalable-secure-multi-vpc-network-infrastructure/centralized-access-to-vpc-private-endpoints.html
upvoted 4 times
Training
1 year, 4 months ago
There are hundreds of vpc's. Hosted zone association has limits
upvoted 2 times
[Removed]
1 year, 1 month ago
and the limit is 2000. your point is not valid
upvoted 1 times
...
...
...
study_aws1
1 year, 6 months ago
Private DNS turned on will only allow DNS resolution for interface endpoint within that VPC & not from other VPCs. Option C) is correct.
upvoted 4 times
...
dyota
1 year, 6 months ago
Selected Answer: D
Option C uses Amazon Route 53 private hosted zones to provide endpoint names for VPCs, but requires additional configuration and management overhead. Option D, on the other hand, enables Private DNS and DNS support for AWS Transit Gateway, offering a more efficient solution for endpoint name resolution.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...