Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified Solutions Architect - Associate SAA-C03 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Associate SAA-C03 exam

Exam AWS Certified Solutions Architect - Associate SAA-C03 topic 1 question 614 discussion

A company is designing a new multi-tier web application that consists of the following components:

• Web and application servers that run on Amazon EC2 instances as part of Auto Scaling groups
• An Amazon RDS DB instance for data storage

A solutions architect needs to limit access to the application servers so that only the web servers can access them.

Which solution will meet these requirements?

  • A. Deploy AWS PrivateLink in front of the application servers. Configure the network ACL to allow only the web servers to access the application servers.
  • B. Deploy a VPC endpoint in front of the application servers. Configure the security group to allow only the web servers to access the application servers.
  • C. Deploy a Network Load Balancer with a target group that contains the application servers' Auto Scaling group. Configure the network ACL to allow only the web servers to access the application servers.
  • D. Deploy an Application Load Balancer with a target group that contains the application servers' Auto Scaling group. Configure the security group to allow only the web servers to access the application servers.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Guru4Cloud
Highly Voted 1 year ago
Selected Answer: D
The key reasons are: An Application Load Balancer (ALB) allows directing traffic to the application servers and provides access control via security groups. Security groups act as a firewall at the instance level and can control access to the application servers from the web servers. Network ACLs work at the subnet level and are less flexible for security groups for instance-level access control. VPC endpoints are used to provide private access to AWS services, not for access between EC2 instances. AWS PrivateLink provides private connectivity between VPCs, which is not required in this single VPC scenario.
upvoted 17 times
...
Ravan
Most Recent 7 months, 2 weeks ago
Selected Answer: B
A VPC endpoint is a managed endpoint in your VPC that is connected to a public AWS service. It provides a private connection between your VPC and the service, and it does not require an internet gateway or a NAT device. The other options do not meet all of the requirements: Option A: AWS PrivateLink is a service that allows you to connect your VPC to private services that are owned by AWS or by other AWS customers. It is not designed to be used to limit access to resources within the same VPC. Option C: A Network Load Balancer can be used to distribute traffic across multiple application servers, but it does not provide a way to limit access to the application servers. Option D: An Application Load Balancer can be used to distribute traffic across multiple application servers, but it does not provide a way to limit access to the application servers.
upvoted 2 times
...
awsgeek75
8 months, 4 weeks ago
Selected Answer: D
"limit access to the application servers so that only the web servers can access them" Can be done via NACL or SG A: Irrelevant as everything is inside the same VPC B: VPC endpoint are attached to VPC and if you deploy a VPC endpoint like this it will be in front of both app and web server. Language is weird here C: Potentially a good solution but NACL is allowing on web to app traffic and no response will reach to web servers as NACL have to be configured in both directions D: ALB in front of ASG will give an internal endpoint which can be secured by SG as recommended. ASG itself is not an endpoint that can be used with SG which is why we need ALB here. Hence D is correct
upvoted 1 times
...
TariqKipkemei
10 months, 3 weeks ago
Selected Answer: D
Deploy an Application Load Balancer with a target group that contains the application servers' Auto Scaling group. Configure the security group to allow only the web servers to access the application servers
upvoted 3 times
...
Tekk97
11 months ago
Selected Answer: D
I think B also working. but A company has Auto Scaling groups. D has strategy for Auto Scaling. D is correct
upvoted 2 times
pentium75
9 months, 2 weeks ago
How do you want to "deploy a VPC endpoint" for a group of EC2 instances that are inside your VPC?
upvoted 1 times
...
...
potomac
11 months, 2 weeks ago
Selected Answer: D
D is correct
upvoted 1 times
...
iwannabeawsgod
12 months ago
Selected Answer: D
Scaling group to Scaling group.
upvoted 2 times
...
Devsin2000
1 year ago
C - ALB is for Web applications only. NLB can be internal / not public
upvoted 1 times
pentium75
9 months, 2 weeks ago
Both ALB and NLB can be internal or public. NLB works on layer 3 while ALB works on layer 7. Both ALB and NLB could help here, but C uses a network ACL that's missing the outbound traffic.
upvoted 2 times
...
...
taustin2
1 year ago
Selected Answer: D
ALB with Security Group is simplest solution.
upvoted 3 times
...
nnecode
1 year ago
Selected Answer: B
A VPC endpoint is a managed endpoint in your VPC that is connected to a public AWS service. It provides a private connection between your VPC and the service, and it does not require an internet gateway or a NAT device. The other options do not meet all of the requirements: Option A: AWS PrivateLink is a service that allows you to connect your VPC to private services that are owned by AWS or by other AWS customers. It is not designed to be used to limit access to resources within the same VPC. Option C: A Network Load Balancer can be used to distribute traffic across multiple application servers, but it does not provide a way to limit access to the application servers. Option D: An Application Load Balancer can be used to distribute traffic across multiple application servers, but it does not provide a way to limit access to the application servers.
upvoted 4 times
pentium75
9 months, 2 weeks ago
We don't want to connect "to a public AWS service" but to EC2 instances. "An Application Load Balancer can be used to distribute traffic across multiple application servers, but it does not provide a way to limit access to the application servers" but the Security Group of the web servers does.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...