exam questions

Exam AWS Certified SysOps Administrator - Associate All Questions

View all questions & answers for the AWS Certified SysOps Administrator - Associate exam

Exam AWS Certified SysOps Administrator - Associate topic 1 question 407 discussion

A SysOps administrator is re-architecting an application. The SysOps administrator has moved the database from a public subnet, where the database used a public endpoint, into a private subnet to restrict access from the public network. After this change, an AWS Lambda function that requires read access to the database cannot connect to the database. The SysOps administrator must resolve this issue without compromising security.

Which solution meets these requirements?

  • A. Create an AWS PrivateLink interface endpoint for the Lambda function. Connect to the database using its private endpoint.
  • B. Connect the Lambda function to the database VPC. Connect to the database using its private endpoint.
  • C. Attach an IAM role to the Lambda function with read permissions to the database.
  • D. Move the database to a public subnet. Use security groups for secure access.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Learning4life
Highly Voted 1 year, 2 months ago
Selected Answer: A
PrivateLink allows you to privately access services hosted on AWS in a scalable and secure manner. By creating an interface endpoint for the Lambda function, you can establish a private connection between the Lambda function and the RDS database without exposing it to the public internet.
upvoted 6 times
...
numark
Most Recent 4 months, 3 weeks ago
Selected Answer: B
The Lambda function needs to be configured to access resources within the VPC. By default, when you create a Lambda function, it is not connected to any VPC, which is why you would select B. AWS PrivateLink allows you to privately access services across VPCs and accounts. However, it is typically used to access AWS services or to create private connections to your own services. In this scenario, creating an interface endpoint (PrivateLink) would not be relevant if we're referring to a traditional database hosted on an EC2 instance or an RDS instance without its own PrivateLink-enabled endpoint.
upvoted 1 times
0c2d840
4 months, 1 week ago
Option B may cause side effects if Lambda is moved inside VPC. It may not be a good idea to break one component to get one working. So we should pick the solution that does not affect Lambda or any other component.
upvoted 2 times
...
...
VerRi
9 months, 1 week ago
Selected Answer: B
B is a classic solution of Lambda <-> Private RDS within the same VPC A works but is not necessary
upvoted 1 times
Aamee
6 months, 1 week ago
Completely wrong!... how would you connect the lambda directly to the DB publically from the internet w/o having any interface endpoint created?!.... Read option A one more time to have a clarification on it..
upvoted 1 times
...
...
nyalpellymkar07
11 months ago
Selected Answer: A
My explanation for A would be: Since the RDS is now in private Subnet, it will have an endpoint that will resolve to Private IP inside the VPC. When AWS Lambda tries to connect to RDS instance, it will use the RDS endpoint, but since DNS is in private subnet, Lambda cannot reach from Internet to this Private subnet. Hence, keeping the traffic inside VPC becomes viable using PrivateLink. Creating a Lambda Endpoint will allow the traffic of Lambda to stay inside of AWS within the VPC where it would be created and will allow seamless connectivity to other services inside the VPC.
upvoted 2 times
...
seetpt
1 year ago
Selected Answer: A
I think A
upvoted 1 times
...
klayytech
1 year, 1 month ago
Selected Answer: A
AWS PrivateLink interface endpoints are two-way connections. They allow resources within a VPC to securely connect to services offered by AWS services or other VPCs through PrivateLink. This means traffic can flow in both directions: Outbound: The Lambda function can initiate requests to the database's private endpoint. Inbound: The database can potentially respond back to the Lambda function (although this is less common).
upvoted 3 times
...
LudiVoss
1 year, 3 months ago
Selected Answer: B
It is B. You want to place the lambda in the DB VPC.
upvoted 3 times
klayytech
1 year, 1 month ago
AWS PrivateLink interface endpoints are bidirectional traffic connections. This means traffic can flow in both directions , I think A
upvoted 2 times
...
...
LemonGremlin
1 year, 3 months ago
I think A AWS Lambda now supports AWS PrivateLink which lets you create, manage, and invoke Lambda functions securely from inside your virtual private cloud (VPC) or on-premises data centers without exposing traffic to the public Internet. https://aws.amazon.com/blogs/aws/new-use-aws-privatelink-to-access-aws-lambda-over-private-aws-network/
upvoted 4 times
...
Kipalom
1 year, 3 months ago
Its answer C. As every lambda needs permissions to access resources inside a vpc: https://docs.aws.amazon.com/aws-managed-policy/latest/reference/AWSLambdaVPCAccessExecutionRole.html
upvoted 1 times
LemonGremlin
1 year, 3 months ago
While IAM roles are important for managing permissions, they are typically used for access control within AWS services. In this case, the Lambda function needs a secure way to connect to the database, and AWS PrivateLink provides a better solution.
upvoted 1 times
...
...
LemonGremlin
1 year, 3 months ago
Selected Answer: A
I think A.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago