exam questions

Exam AWS Certified SysOps Administrator - Associate All Questions

View all questions & answers for the AWS Certified SysOps Administrator - Associate exam

Exam AWS Certified SysOps Administrator - Associate topic 1 question 318 discussion

A SysOps administrator launches an Amazon EC2 instance in a private subnet of a VPC. When the SysOps administrator attempts a curl command from the command line of the EC2 instance, the SysOps administrator cannot connect to https:www.example.com.

What should the SysOps administrator do to resolve this issue?

  • A. Ensure that there is an outbound security group for port 443 to 0.0.0.0/0.
  • B. Ensure that there is an inbound security group for port 443 from 0.0.0.0/0.
  • C. Ensure that there is an outbound network ACL for ephemeral ports 1024-66535 to 0.0.0.0/0.
  • D. Ensure that there is an outbound network ACL for port 80 to 0.0.0.0/0.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DeaconStJohn
Highly Voted 1 year, 5 months ago
this is an utterly terrible question. that's it. that's my input.
upvoted 5 times
...
Albanki
Most Recent 5 months, 1 week ago
bad kwazshin
upvoted 1 times
...
AgboolaKun
10 months, 2 weeks ago
This is a very confusing question. Option A could be an answer if the SG default Outbound rule that allows all protocols and all ports has been tempered with. This was not mentioned, therefore it is difficult to make this assumption. Option C could also be an answer if a rule was configured for the network ACL. Since network ACL is stateless, an Outbound rule could be necessary. This was not clarified either. Another solution to the problem described in this question is a NAT Gateway in public subnet that the instances in the private subnet could point to in the route table. Here, I'm assuming we already have an Internet Gateway for instances in the public subnet. Unfortunately, this could be the best answer to this question but none of the answers choices mentions a NAT Gateway.
upvoted 1 times
...
r2c3po
1 year, 4 months ago
Selected Answer: C
C. Ensure that there is an outbound network ACL for ephemeral ports 1024-66535 to 0.0.0.0/0. Explanation: When an EC2 instance in a private subnet needs to access resources on the internet, such as https://www.example.com, it uses outbound connections. Outbound connections are controlled by the Network Access Control List (network ACL) associated with the subnet. Option C suggests ensuring that there is an outbound network ACL rule allowing traffic on ephemeral ports (1024-66535) to 0.0.0.0/0. Ephemeral ports are used as source ports for outbound connections, and allowing traffic from these ports is necessary for the EC2 instance to communicate with external resources. Options A and B involve security groups, but security groups are stateful and are applied to inbound and outbound traffic. In this case, the issue is likely related to the network ACL controlling outbound traffic from the subnet. Option D is not relevant to the issue. It mentions an outbound network ACL for port 80, but the issue is related to connecting to https://www.example.com, which uses port 443 for HTTPS.
upvoted 3 times
null0xAF
1 year, 2 months ago
WRONG, You are EC2 instance inside a private subnet, trying to go out to destination port 443. Option C only works IF someones connecting to your EC2 from outside and your NACL needs to allow access back to that user on ephemeral port. YOU DO NOT CHECK GO OUTBOUND ON EPHEMERAL PORT AS DESTINATION UNLESS you are the server. SG is the ONLY thing in this answer section that could be wrong. Answer is A
upvoted 3 times
NSA_Poker
8 months, 2 weeks ago
I know you are wrong. An ephemeral port is a temporary network communication endpoint used to establish a connection with a server application over the internet or a local network. This cannot be done atm bc NACL was configured without the correct outbound rule. A NAT gateway uses ports 1024-65535.
upvoted 1 times
...
nakuaadam
1 year, 2 months ago
I thing you are wrong https://repost.aws/knowledge-center/resolve-connection-sg-acl-inbound Short description Security groups are stateful, so allowing inbound traffic to the necessary ports activates the connection. Network ACLs are stateless, so you must allow both inbound and outbound traffic. Resolution To turn on the connection to a service running on an instance, the associated network ACL must allow the following: Inbound traffic on the port that the service is listening on Outbound traffic to ephemeral ports When a client connects to a server, a random port from the ephemeral port range (1024-65535) becomes the client's source port.
upvoted 2 times
...
...
...
Kipalom
1 year, 4 months ago
Selected Answer: C
A. It can't be, because when you try connect to https://www.example.com from inside of the EC2 instance, you don't use port 443 (HTTPS) on your machine, you use a random one and try to connect to 443 at the destination server. B. As security groups are stateful, you don't need special inbound rules C. This is the right answer, because the HTTPS-Connection uses a random port at your instance to try to connect to 443 on the destination server. D The connection has nothing to do with port 80 (HTTP).
upvoted 1 times
null0xAF
1 year, 2 months ago
Answer is A, you do use port 443 to Connect to webserver HTTPS://www.example.com . . . therefore you are going out on port 443, need SG to confirm you have access to go outbound on that port. . . RANDOM one is used as the source, so your ec2 instance will open SRC Port ephemeral. . . then from there the web server will respond to you on that ephemeral port.
upvoted 1 times
...
...
Debugs_Bunny
1 year, 4 months ago
who wrote this question?
upvoted 1 times
...
Hatem08
1 year, 4 months ago
Selected Answer: A
Inbound security group rules control incoming traffic to the EC2 instance, and outbound security group rules control outgoing traffic. For the EC2 instance to access external resources on the internet, including https://www.example.com, you need to ensure that there is an outbound security group rule allowing traffic on port 443 to the destination IP or CIDR range (0.0.0.0/0 in this case).
upvoted 2 times
...
teo2157
1 year, 5 months ago
Selected Answer: C
Going for C based on this: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
upvoted 2 times
...
Benly
1 year, 5 months ago
Selected Answer: C
Default sg allows for outbound.
upvoted 4 times
...
ahmed308
1 year, 6 months ago
Selected Answer: A
A seems right option
upvoted 2 times
...
ahmed308
1 year, 6 months ago
Selected Answer: B
In security group rules are allowed in inbound.
upvoted 1 times
...
xile1021
1 year, 6 months ago
Selected Answer: A
A. Can' t be C because ephemeral ports 1024-65535 are not relevant to HTTPS communication.
upvoted 4 times
...
breadops
1 year, 6 months ago
Selected Answer: C
https://repost.aws/knowledge-center/resolve-connection-sg-acl-inbound
upvoted 1 times
...
xSohox
1 year, 8 months ago
Selected Answer: A
It's important to remember that security groups are stateful. So if you have an outbound rule in your security group for HTTPS and you send a HTTPS request from your instance to a remote web server, the instance will be able to receive the response, even though port 443 is not allowed by your inbound rule in the security group. When a connection is made to or from an instance, a "state" is created that allows bidirectional communication - but only for that connection.
upvoted 3 times
...
nizammusasoac02
1 year, 8 months ago
Selected Answer: C
keyword ephemeral
upvoted 1 times
TwinSpark
1 year, 7 months ago
it need to ensure that, on network acl level, the ephemeral port are open inbound, but for outbound the port 443 will be use. No one of this answer is enough to stisfy the requirements, but the only check that deserve to be done is A
upvoted 2 times
...
...
VeeAWS
1 year, 9 months ago
I think question is not cleared. EC2 is private and where source to curl to EC2 that located in private subnet. No ALB and route 53 to manage traffic to EC2 in private subnet.
upvoted 2 times
[Removed]
1 year, 9 months ago
The answer will A. If NAT Gateway, is present.
upvoted 2 times
...
...
guau
1 year, 10 months ago
Selected Answer: A
Option B is not correct because it refers to an inbound security group rule. Inbound security group rules control the traffic that is allowed to reach the instance from other sources. In this case, the issue is with traffic leaving the instance and reaching the website, so an outbound security group rule is needed, not an inbound one.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago