exam questions

Exam AWS Certified Solutions Architect - Associate SAA-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Associate SAA-C02 exam

Exam AWS Certified Solutions Architect - Associate SAA-C02 topic 1 question 358 discussion

A company that recently started using AWS establishes a Site-to-Site VPN between its on-premises datacenter and AWS. The company's security mandate states that traffic originating from on premises should stay within the company's private IP space when communicating with an Amazon Elastic Container Service
(Amazon ECS) cluster that is hosting a sample web application.
Which solution meets this requirement?

  • A. Configure a gateway endpoint for Amazon ECS. Modify the route table to include an entry pointing to the ECS cluster.
  • B. Create a Network Load Balancer and AWS PrivateLink endpoint for Amazon ECS in the same VPC that is hosting the ECS cluster.
  • C. Create a Network Load Balancer in one VPC and an AWS PrivateLink endpoint for Amazon ECS in another VPC. Connect the two VPCs by using VPC peering.
  • D. Configure an Amazon Route 53 record with Amazon ECS as the target. Apply a server certificate to Route 53 from AWS Certificate Manager (ACM) for SSL offloading.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dmscountera
Highly Voted 3 years, 11 months ago
B. Create a Network Load Balancer and AWS PrivateLink endpoint for Amazon ECS in the same VPC that is hosting the ECS cluster.
upvoted 39 times
noahsark
3 years, 10 months ago
Architecture found from thread below: https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/images/pattern-img/a316bf46-24db-4514-957d-abc60f8f6962/images/573951ed-74bb-4023-9d9c-43e77e4f8eda.png
upvoted 6 times
...
Twinkie
3 years, 9 months ago
Confirmed to be B. Ultimate AWS Certified Solutions Architect Associate 2021 on Udeny clearly describes this scenario and has a diagram reflecting this very answer.
upvoted 15 times
...
...
occupatissimo
Highly Voted 3 years, 10 months ago
A is out because gateway endpoint is used with Dynamo or S3 only. D is out because 53 works on internet only B&C remains and they use Privatelink wher PrivateLink establishes private connectivity between VPC so we need more than one VPC. Using privatelink, to expose own services (not aws), the NLB is used as front-end so it must reside in the same ECS vpc and the ingress endpoint instead must reside in another VPC. This rules out B and C remains as correct.
upvoted 15 times
...
Deepankan
Most Recent 1 year, 8 months ago
B Sorry, I changed my answer to B as there is only one VPC and an one on-premises server.
upvoted 1 times
...
Deepankan
1 year, 9 months ago
Answer is C. Don't know why there is so much wrong answers. The correct solution is to use AWS PrivateLink in a service provider model. In this configuration a network load balancer will be implemented in the service provider VPC (the one with the ECS cluster in this example), and a PrivateLink endpoint will be created in the consumer VPC (the one with the company’s application).
upvoted 1 times
...
slackbot
2 years, 1 month ago
but service endpoints translate the ip addresses to the one of the NLB. how will the client ip be preserved at the ecs level?
upvoted 1 times
slackbot
2 years, 1 month ago
https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-target-groups.html Client IP preservation has no effect on inbound traffic from AWS PrivateLink. The source IP of the AWS PrivateLink traffic is always the private IP address of the Network Load Balancer. Client IP preservation is not supported when a target group contains AWS PrivateLink ENIs, or the ENI of another Network Load Balancer. This will cause loss of communication to those targets.
upvoted 1 times
...
...
sofiella
2 years, 6 months ago
B. Create a Network Load Balancer and AWS PrivateLink endpoint for Amazon ECS in the same VPC that is hosting the ECS cluster. AWS PrivateLink allows you to access services over an Amazon VPC (Virtual Private Cloud) endpoint, rather than over the Internet. By creating a Network Load Balancer and a PrivateLink endpoint in the same VPC as the ECS cluster, you can ensure that traffic originating from on-premises stays within the company's private IP space when communicating with the ECS cluster. This solution meets the security mandate that traffic originating from on-premises should stay within the company's private IP space when communicating with Amazon ECS.
upvoted 1 times
...
Iliyan_Azure
3 years ago
https://aws.amazon.com/about-aws/whats-new/2019/03/aws-privatelink-now-supports-access-over-vpc-peering/ C ?
upvoted 1 times
...
naveenagurjara
3 years, 1 month ago
Selected Answer: B
I 'feeeeellll' ans is B coz, C does not make sense to have VPC peering and VPC EP service...
upvoted 2 times
...
xav1er
3 years, 2 months ago
Selected Answer: B
ITS B as per UDEMY course slide.
upvoted 2 times
...
Charun
3 years, 3 months ago
Selected Answer: B
It's B since it does not make sense to use VPC peering and PrivateLink in the same solution as for described in option C: PrivateLink is already a kind of "private VPC peering" used to expose services from one VPC to many VPC in the form of Producer (one) and Consumer (many).
upvoted 2 times
...
hubbabubba
3 years, 4 months ago
Selected Answer: C
The answer is in fact C This diagram shows the 2 VPCs: https://docs.aws.amazon.com/prescriptive-guidance/latest/patterns/access-container-applications-privately-on-amazon-ecs-by-using-aws-privatelink-and-a-network-load-balancer.html And AWS PrivateLink enables you to configure applications or services in VPCs as endpoints that your VPC peering connections can connect to. https://docs.aws.amazon.com/vpc/latest/userguide/vpc-peering.html
upvoted 2 times
ahaz
3 years ago
C says "Create a Network Load Balancer in one VPC and an AWS PrivateLink endpoint for Amazon ECS in another VPC". In the provided link, the network load balancer and the private link are in the same vpc. The other vpc is holding the vpc endpoint and users. So, B is correct
upvoted 1 times
...
...
FF11
3 years, 7 months ago
Selected Answer: B
B is correct.
upvoted 2 times
...
muhsin
3 years, 8 months ago
Ans: C We need to create NLB and PrivateLink Endpoint in two VPC. this is the privateLink. And then we need to peer VPC which has NLB and VPC on-premises (not the VPC for ECS)
upvoted 3 times
...
nutouch
3 years, 8 months ago
Selected Answer: B
That's the step of creating VPC endpoint services.
upvoted 2 times
...
samuel1999
3 years, 8 months ago
why so many anss
upvoted 1 times
...
cannottellname
3 years, 8 months ago
For enabling NLB with PrivateLink we do not need new VPC/Account, we can do it the same way. From the diagram if 1 AZ/VPC had gone, we can still use the same one. Only 1 thing is, Web-Server is hosted and we are using NLB :/
upvoted 1 times
...
MarianoD
3 years, 9 months ago
it's C A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IPv4 addresses or IPv6 addresses. Instances in either VPC can communicate with each other as if they are within the same network. You can create a VPC peering connection between your own VPCs, or with a VPC in another AWS account. The VPCs can be in different regions (also known as an inter-region VPC peering connection). refered to https://docs.aws.amazon.com/vpc/latest/peering/what-is-vpc-peering.html
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...