exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 61 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 61
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A distributed web application is installed across several EC2 instances in public subnets residing in two Availability Zones. Apache logs show several intermittent brute-force attacks from hundreds of IP addresses at the layer 7 level over the past six months.
What would be the BEST way to reduce the potential impact of these attacks in the future?

  • A. Use custom route tables to prevent malicious traffic from routing to the instances.
  • B. Update security groups to deny traffic from the originating source IP addresses.
  • C. Use network ACLs.
  • D. Install intrusion prevention software (IPS) on each instance.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
josellama2000
Highly Voted 3 years, 9 months ago
Correct answer is D. C is incorrect. The key for the answer is "in the future". If you include all the 100s of IP, the attack will come from other new IPs. The attack will not be stopped. Moreover, it is unmanageable. D is correct. Put a IPS on each instance. An IDS like OSSEC or Wazuh can be centralize managed. The IPS will dynamically add IPs to the blacklist
upvoted 37 times
...
rstm
Highly Voted 3 years, 9 months ago
How Network ACL can help with level 7 attacks? Install intrusion prevention software (IPS) on each instance. - No?
upvoted 16 times
Moon
3 years, 9 months ago
the attackers are from identified IP addresses. But the attack is against layer 7 resources. So, NACL could be correct!
upvoted 2 times
Nickel
3 years, 9 months ago
An NACL can only have between 20 (soft-limit) and 40 (hard-limit). The description mentions that the attack comes from hundreds of IP-addresses. It could be possible that those IP-addresses are from a common IP-range, but that's not for sure. The remaining answers are altogether not the best solution, but I would go for the IPS, as it solves the requirements of blocking that malicious requests.
upvoted 17 times
dpvnme
3 years, 9 months ago
You can't deny with security group, only allow. NACL is the best option here
upvoted 1 times
...
satbim
3 years, 8 months ago
200 NACLs per VPC * 40 rules per NACL gives us enough...
upvoted 1 times
EricZhang
1 year, 9 months ago
Each subnet can have only one NACL
upvoted 1 times
...
...
...
...
...
Raphaello
Most Recent 1 year, 4 months ago
Selected Answer: D
NACL to deny hundreds on IP's? Good luck with that! Best answer is D.
upvoted 1 times
...
Sadiya7
1 year, 9 months ago
To reduce the potential impact of layer 7 brute-force attacks on your distributed web application, the BEST approach is: **B. Update security groups to deny traffic from the originating source IP addresses.** Here's why: 1. **Security Groups:** Security groups operate at the instance level and provide fine-grained control over inbound and outbound traffic. By updating your security groups to deny traffic from the specific source IP addresses associated with the brute-force attacks, you can effectively block those attackers while allowing legitimate traffic to reach your instances.
upvoted 2 times
...
sandromechi
1 year, 11 months ago
Answer D: Once the attack is over layer 7, it means that bad guy is brute forcing directly da application port. It seems crazy use ACL to deny hundred of IPs, and the question has a key point: "Prevent against future attacks". We can supose that's attacks will come from new IPs. Because that, I bet D.
upvoted 1 times
...
Pankaj24hrs
1 year, 12 months ago
D While network ACLs and security groups play important roles in network security, in this scenario where there are numerous IP addresses involved, relying on intrusion prevention software (IPS) installed on each instance provides a more comprehensive and effective solution to reduce the potential impact of the brute-force attacks on your distributed web application.
upvoted 1 times
...
captainpike
2 years, 1 month ago
Selected Answer: C
https://aws.amazon.com/blogs/security/how-to-help-prepare-for-ddos-attacks-by-reducing-your-attack-surface/ first mentioned by praveenaws I don't think neither C nor D are good solutions, but since we have a article that explicitly say "if you have identified Internet IP addresses or ranges that are unwanted or potentially abusive, you can block them from reaching your application with a deny rule." the I'd say that's the the answer
upvoted 1 times
...
ITGURU51
2 years, 1 month ago
Since the attack is happening at layer 7, we can safely eliminate security groups and NACL's as a viable solution. Intrusion Detection Systems (IDS) can be used to detect layer 7 attacks. IDS monitors network traffic searching for suspicious activity and known threats, sending up alerts when it finds such items. The IPS sensor analyzes at Layer 2 to Layer 7 the payload of the packets for more sophisticated embedded attacks that might include malicious data.
upvoted 1 times
...
matrpro
2 years, 1 month ago
Selected Answer: D
D is the correct one although it is no sense to install an IPS in each instance, imagine that you have 200 instances...C is clearly wrong because NACLs inspect IP and Port. Ports aren't available in the Network Layer (Layer 3) - just IPs. However, they are available in the Transport Layer (Layer 4). So it's Layer 4 - the Transport Layer
upvoted 2 times
...
bk02
2 years, 4 months ago
The maximum rules in NACL is 40 and since it is already 100+ ips , the option is D
upvoted 2 times
...
Suhasj02
2 years, 5 months ago
Selected Answer: D
As there are 100 of IPs henceforth IPS is the best available option
upvoted 2 times
...
unnerv
2 years, 6 months ago
Selected Answer: D
NACL does not work on layer 7.
upvoted 3 times
...
janvandermerwer
2 years, 7 months ago
Selected Answer: D
D for sure. NACLs and the other services would run into management overhead issues quite rapidly. Especially if the attack base increased to say 500 ip addresses... What if 2000 ip addresses start connecting - That would bea lot of work to add the entries in, even if NACL limits could support it.
upvoted 2 times
...
arae
2 years, 8 months ago
It mentions layer 7 so in this scenario, it would be NACl
upvoted 1 times
...
sakibmas
2 years, 8 months ago
Selected Answer: C
- Brute force is not an intrusion. Brute force can be minimized by a DDoS firewall, not by IPS.
upvoted 2 times
Isaias
2 years, 6 months ago
DDos attack is from several Origins IPaddress, how can yo do it to protect on future using acl?
upvoted 1 times
...
...
praveenaws
2 years, 9 months ago
Selected Answer: C
https://aws.amazon.com/blogs/security/how-to-help-prepare-for-ddos-attacks-by-reducing-your-attack-surface/ Configuring security groups and network ACLs in Amazon VPC is an effective tool to help reduce the attack surface of your applications. The approaches may seem similar, but each has an important role in surface area reduction. This is especially important in a DDoS context because security groups allow you to define the traffic that will be allowed access to resources within your applications, and network ACLs allow you to define the port, protocol, and source of traffic that should be explicitly denied at the subnet leve
upvoted 4 times
...
sinycn
2 years, 10 months ago
answer is D hundreds of IP NACL can not support
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...