exam questions

Exam AWS-SysOps All Questions

View all questions & answers for the AWS-SysOps exam

Exam AWS-SysOps topic 1 question 318 discussion

Exam question from Amazon's AWS-SysOps
Question #: 318
Topic #: 1
[All AWS-SysOps Questions]

You have a business-to-business web application running in a VPC consisting of an Elastic Load Balancer (ELB), web servers, application servers and a database. Your web application should only accept traffic from pre-defined customer IP addresses.
Which two options meet this security requirement? (Choose two.)

  • A. Configure web server VPC security groups to allow traffic from your customers' IPs
  • B. Configure your web servers to filter traffic based on the ELB's "X-forwarded-for" header
  • C. Configure ELB security groups to allow traffic from your customers' IPs and deny all outbound traffic
  • D. Configure a VPC NACL to allow web traffic from your customers' IPs and deny all outbound traffic
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
gretch
Highly Voted 1 year, 1 month ago
B & C https://jayendrapatil.com/aws-virtual-private-cloud-vpc/ not A - web server is behind the ELB and customer IPs will never reach web servers) B - configure your web servers to filter traffic based on the ELB’s “X-forwarded-for” header (get the customer IPs and create a custom filter to restrict access. Refer link) C - configure ELB security groups to allow traffic from your customers’ IPs and deny all outbound traffic (ELB will see the customer IPs so can restrict access, deny all is basically have no rules in outbound traffic, implicit, and its stateful so would work) not D - configure a VPC NACL to allow web traffic from your customers’ IPs and deny all outbound traffic (NACL is stateless, deny all will not work)
upvoted 5 times
narayanan010
1 year ago
Security Groups do not allow any Deny rules, so doesn't that automatically negate option C?
upvoted 2 times
...
...
juraj666
Most Recent 9 months, 1 week ago
Selected Answer: AB
i'd go with A&B C&D mention deny all outbound traffic so results from web server would not be going out to client IP
upvoted 2 times
...
xxxdolorxxx
11 months, 3 weeks ago
Why would outgoing traffic matter? C doesn't seem right to me.
upvoted 1 times
...
TroyMcLure
12 months ago
Correct Answers: B & C
upvoted 1 times
...
NNHAN
1 year ago
Only B is correct
upvoted 2 times
...
JGD
1 year ago
Answer A&B is correct. The ELB Xforwarded option will expose an IP addr of the customer to the VM, so that will be restricted to the trusted network on SG. Using this only allowed IPs can access the application.
upvoted 1 times
...
narayanan010
1 year, 1 month ago
https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/x-forwarded-headers.html#x-forwarded-for - "The X-Forwarded-For request header helps you identify the IP address of a client when you use an HTTP or HTTPS load balancer." I think this seals it, A and B are the right options.
upvoted 3 times
...
Gathix444
1 year, 1 month ago
A is not right. When did VPC have security group. Its BC
upvoted 1 times
narayanan010
1 year ago
It says Web server VPC security groups, purely down to interpretation.
upvoted 1 times
...
...
dennismp
1 year, 1 month ago
B and D are the correct ans. There is ELB in front of the EC2 so security group of EC2 doesnt help.
upvoted 4 times
Bad_Mat
1 year, 1 month ago
But answer D says "...and disable all outbound traffic" Will it work? I think the default answer is correct
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago