exam questions

Exam AWS Certified Solutions Architect - Associate SAA-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Associate SAA-C02 exam

Exam AWS Certified Solutions Architect - Associate SAA-C02 topic 1 question 187 discussion

A solutions architect is performing a security review of a recently migrated workload. The workload is a web application that consists of Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer. The solutions architect must improve the security posture and minimize the impact of a DDoS attack on resources.
Which solution is MOST effective?

  • A. Configure an AWS WAF ACL with rate-based rules. Create an Amazon CloudFront distribution that points to the Application Load Balancer. Enable the WAF ACL on the CloudFront distribution.
  • B. Create a custom AWS Lambda function that adds identified attacks into a common vulnerability pool to capture a potential DDoS attack. Use the identified information to modify a network ACL to block access.
  • C. Enable VPC Flow Logs and store then in Amazon S3. Create a custom AWS Lambda functions that parses the logs looking for a DDoS attack. Modify a network ACL to block identified source IP addresses.
  • D. Enable Amazon GuardDuty and configure findings written to Amazon CloudWatch. Create an event with CloudWatch Events for DDoS alerts that triggers Amazon Simple Notification Service (Amazon SNS). Have Amazon SNS invoke a custom AWS Lambda function that parses the logs, looking for a DDoS attack. Modify a network ACL to block identified source IP addresses.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AWSaspire
Highly Voted 3 years, 7 months ago
Answer is A. AWS WAF is a web application firewall that helps detect and mitigate web application layer DDoS attacks by inspecting traffic inline. Application layer DDoS attacks use well-formed but malicious requests to evade mitigation and consume application resources. You can define custom security rules (also called web ACLs) that contain a set of conditions, rules, and actions to block attacking traffic. After you define web ACLs, you can apply them to CloudFront distributions, and web ACLs are evaluated in the priority order you specified when you configured them. Real-time metrics and sampled web requests are provided for each web ACL. https://aws.amazon.com/blogs/security/how-to-protect-dynamic-web-applications-against-ddos-attacks-by-using-amazon-cloudfront-and-amazon-route-53/
upvoted 134 times
...
srthsrth
Highly Voted 3 years, 7 months ago
Shouldn’t it be A?
upvoted 25 times
...
mfaktas
Most Recent 1 year, 5 months ago
Selected Answer: A
B is a joke !
upvoted 1 times
...
rac_sp
2 years, 7 months ago
Selected Answer: A
A due to the WAF
upvoted 1 times
...
etheng1970
2 years, 9 months ago
Selected Answer: A
The best soluntion is AWS Shield, so the next soln would be A. - You can use AWS WAF web access control lists (web ACLs) to help minimize the effects of a Distributed Denial of Service (DDoS) attack. For additional protection against DDoS attacks, "
upvoted 3 times
...
naveenagurjara
2 years, 9 months ago
Selected Answer: A
Guard Duty is Reactive
upvoted 3 times
...
examJack
3 years ago
Selected Answer: A
To find the most EFFECTIVE solution A.(O) Rate-based rule statement https://docs.aws.amazon.com/waf/latest/developerguide/waf-rule-statement-type-rate-based.html B.(X) custom Lambda function is not best-practice, not effective C.(X) custom Lambda function is not best-practice, not effective D.(X) It maybe possible to detect DDos vis GuardDuty, but it seems like to require efforts a lot. Amazon GuardDuty is a continuous security monitoring service that analyzes and processes the following Data sources: VPC Flow Logs, AWS CloudTrail management event logs, CloudTrail S3 data event logs, EKS audit logs, and DNS logs. It uses threat intelligence feeds, such as lists of malicious IP addresses and domains, and machine learning to identify unexpected and potentially unauthorized and malicious activity within your AWS environment. This can include issues like escalations of privileges, uses of exposed credentials, or communication with malicious IP addresses, or domains. For example, GuardDuty can detect compromised EC2 instances serving malware or mining bitcoin. https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html
upvoted 3 times
naveenagurjara
2 years, 9 months ago
Guard Duty is Reactive
upvoted 1 times
...
...
awsnoobster
3 years, 2 months ago
Why isn't the answer D? GuardDuty from DDos attacks?
upvoted 1 times
...
RUSHI2021
3 years, 3 months ago
whgich one
upvoted 1 times
...
naval_atram
3 years, 3 months ago
A is wrong it can provide only preventive action it can not provide mitigation hence AWS came up with Shield. Correct Answer is D. https://aws.amazon.com/blogs/security/how-to-use-amazon-guardduty-and-aws-web-application-firewall-to-automatically-block-suspicious-hosts/
upvoted 1 times
...
tototo
3 years, 3 months ago
Selected Answer: A
A is correct.
upvoted 1 times
...
Nitish34
3 years, 4 months ago
Answer D Ref: https://aws.amazon.com/blogs/security/how-to-use-amazon-guardduty-and-aws-web-application-firewall-to-automatically-block-suspicious-hosts/ https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2018/07/31/GuardDuty-WAF-01.png
upvoted 2 times
examJack
3 years ago
your ref maybe general use-case to block suspicious hosts. it seems like not for DDos effectively.
upvoted 1 times
...
...
Cabrera
3 years, 5 months ago
Answer is A since WAF is included in AWS Shield Advanced and is recommend for DDos attacks. https://docs.aws.amazon.com/pt_br/waf/latest/developerguide/ddos-overview.html
upvoted 2 times
...
Cabrera
3 years, 5 months ago
A is correct. "AWS WAF is a web application firewall that helps detect and mitigate web application layer DDoS attacks by inspecting traffic inline. Application layer DDoS attacks use well-formed but malicious requests to evade mitigation and consume application resources"
upvoted 2 times
...
banjojoe
3 years, 5 months ago
a rubbish question imo. (a) is probably the right answer as a waf can kind of do this with rate-based rules, but if the ddos was from thousands of different ip addresses then it might not go over the threshold to trigger it. i would expect to see aws shield as an answer here, but it's not.
upvoted 1 times
...
bukkanni
3 years, 5 months ago
Correct answer is A, bhenchod.
upvoted 2 times
...
SSMBLR
3 years, 5 months ago
more and more wrong answers....
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago