exam questions

Exam ANS-C00 All Questions

View all questions & answers for the ANS-C00 exam

Exam ANS-C00 topic 1 question 58 discussion

Exam question from Amazon's ANS-C00
Question #: 58
Topic #: 1
[All ANS-C00 Questions]

You have multiple Amazon Elastic Compute Cloud (EC2) instances running a web server in a VPC configured with security groups and NACL. You need to ensure layer 7 protocol level logging of all network traffic (ACCEPT/REJECT) on the instances. What should be enabled to complete this task?

  • A. CloudWatch Logs at the VPC level
  • B. Packet sniffing at the instance level
  • C. VPC flow logs at the subnet level
  • D. Packet sniffing at the VPC level
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
2cool2touch
Highly Voted 3 years, 2 months ago
Flow logs are L4 only. The question clearly says L7 logging. The decision is between B&D. There is no way/option to take packet captures at a VPC level, you have to do it at interface level so its B.
upvoted 26 times
JohnnyBG
2 years, 12 months ago
Packet sniffing is not a log, I would go with A.
upvoted 1 times
JohnnyBG
2 years, 11 months ago
From Cloudwatch docs: Monitor logs from Amazon EC2 instances – You can use CloudWatch Logs to monitor applications and systems using log data. For example, CloudWatch Logs can track the number of errors that occur in your application logs and send you a notification whenever the rate of errors exceeds a threshold you specify. CloudWatch Logs uses your log data for monitoring; so, no code changes are required. For example, you can monitor application logs for specific literal terms (such as "NullReferenceException") or count the number of occurrences of a literal term at a particular position in log data (such as "404" status codes in an Apache access log). When the term you are searching for is found, CloudWatch Logs reports the data to a CloudWatch metric that you specify. Log data is encrypted while in transit and while it is at rest. To get started, see Getting started with CloudWatch Logs.
upvoted 1 times
...
...
...
asdf99
Highly Voted 3 years, 1 month ago
Out of all the options ACCEPT/REJECT will be shown by VPC logs. Packet Sniffing will not show if a packet was discarded or will be discarded (depending on where you sniff). The Cloudwatch - seems more like a monitoring tool that can collect among other things, also the VPC logs but not enable them. So I would go with C as the closest answer
upvoted 10 times
...
PorkChop1999
Most Recent 8 months, 3 weeks ago
Selected Answer: B
Flow Logs doesn't contain l7 information. Only L4. Packet sniffing is not possible on the vpc level. Cloud Watch will not show REJECTED traffic. That give us only B as an option.
upvoted 1 times
...
kapara
2 years, 3 months ago
A - cloudwatch is going to receive the data from an agent installed on the instances, so it's only going to log what's reaches the instance, so it won't see REJECT traffic. B - on instance level, won't see REJECT traffic C - will get REJECT, but it's specifically stated in documentation that Flow Logs are L4 only. D - if this means packet mirroring, it can be defined for several instances, and will log REJECT traffic, so this looks like the correct answer
upvoted 2 times
...
gondohwe
2 years, 10 months ago
the only way to troubleshoot ACCEPT/REJECT is to use VPC Flow logs where you use metric filters
upvoted 2 times
...
borisgor
2 years, 12 months ago
Since flow logs are with 5 tuples(src/dst ip , src/dst port and protocol) which says only L4 info. L2-L7 info can be taken by capturing only. I would go with B
upvoted 2 times
...
keitahigaki
3 years, 1 month ago
The answer is C. The VPC flow log can diagnose allowed and denied traffic based on security groups and NACL rules, so it can log layer 7 protocols for all network traffic (ACCEPT / REJECT) on the instance. I can do it.
upvoted 2 times
...
aws4myself
3 years, 1 month ago
B => Traffic Mirroring works at interface level, also in the question it asks "application layer logs" which means some filter need to be there. Traffice mirroring -has the filtering capability.
upvoted 1 times
...
StelSen
3 years, 1 month ago
If packet sniffing = Traffic Mirroring, then Correct Answer is D. This ismanaged at VPC level. So easy to maintain. https://aws.amazon.com/blogs/aws/new-vpc-traffic-mirroring/
upvoted 2 times
...
Huy
3 years, 1 month ago
There should be Traffic Mirroring option or B is the ans
upvoted 2 times
...
NSF2
3 years, 1 month ago
The question clearly says multiple EC2 instances, so instance level sniffing might not work. With VPC traffic mirroring feature, you can sniff traffic at VPC level, please see the link below. Therefore I am going with answer D https://aws.amazon.com/blogs/aws/new-vpc-traffic-mirroring/
upvoted 2 times
...
ericl
3 years, 1 month ago
Not C https://www.guardicore.com/2018/02/improving-workload-security-in-aws/
upvoted 1 times
JamesTR
3 years, 1 month ago
You meant C and not "Not C", right ? Your link suggests C
upvoted 1 times
shammous
3 years ago
Not C. The article says "you should be aware that this feature (VPC flow Logs) only works on Layer 4 of TCP/IP stack and that it is restricted to network-level monitoring". Answer A should be correct (CloudWatch Logs)
upvoted 1 times
...
...
...
Samcert
3 years, 1 month ago
The question is asking to log accept/reject traffic in layer 7. Flow Logs collects the protocol, accept/reject among other stuff, so it does the work. C should be the right one.
upvoted 5 times
...
Johnny_Green
3 years, 1 month ago
Here is a paragraph taken from: https://www.guardicore.com/2018/02/improving-workload-security-in-aws/?from=singlemessage&isappinstalled=0 "While we highly recommend using VPC Flow Logs, you should be aware that this feature only works on Layer 4 of TCP/IP stack and that it is restricted to network-level monitoring. More sophisticated attacks are carried out on Layer 7, so it’s important that your organization invests in the right combination of tools; doing so will give you the complete security picture of your environment that is running in AWS." On the other hand, another article argues that "Because a significant portion of today’s network traffic is encrypted and application data is unavailable for analysts, the lack of Layer 7 information in flow records is of little concern. Flow analysis techniques work exactly the same for both encrypted and unencrypted communications. This makes flow analysis a great method for threat hunting without the need for SSL/TLS interception and full-packet capture." Taking all of these into account, I will go with C because it will generate a ACCEPT/REJECT for layer 7 protocol (http, https, ssh etc).
upvoted 4 times
Huy
3 years, 1 month ago
It asks for the logging not the thread hunting
upvoted 1 times
...
...
aduda
3 years, 1 month ago
C cannot be the answer since VPC Flow Logs doesn't support Layer 7 information. I would go with D here since B doesn't can't tell us if a packet got rejected by the instance.
upvoted 2 times
...
awscertguy
3 years, 1 month ago
C is the answer. Straight out of AWS documentation: VPC Flow logs include ACCEPT/REJECT field https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs-records-examples.html#flow-log-example-accepted-rejected 2 123456789010 eni-1235b8ca123456789 172.31.16.139 172.31.16.21 20641 22 6 20 4249 1418530010 1418530070 ACCEPT OK 2 123456789010 eni-1235b8ca123456789 172.31.9.69 172.31.9.12 49761 3389 6 20 4249 1418530010 1418530070 REJECT OK
upvoted 5 times
...
Bijukurup
3 years, 1 month ago
My answer is C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago