exam questions

Exam AWS Certified Security - Specialty All Questions

View all questions & answers for the AWS Certified Security - Specialty exam

Exam AWS Certified Security - Specialty topic 1 question 341 discussion

Exam question from Amazon's AWS Certified Security - Specialty
Question #: 341
Topic #: 1
[All AWS Certified Security - Specialty Questions]

A company requires deep packet inspection on encrypted traffic to its web servers in its VPC.

Which solution will meet this requirement?

  • A. Decrypt traffic by using an Application Load Balancer (ALB) that is configured for TLS termination. Configure the ALB to send the traffic to an AWS Network Firewall endpoint for the deep packet inspection.
  • B. Decrypt traffic by using a Network Load Balancer (NLB) that is configured for TLS termination. Configure the NLB to send the traffic to an AWS Network Firewall endpoint for the deep packet inspection.
  • C. Decrypt traffic by using an Application Load Balancer (ALB) that is configured for TLS termination. Configure the ALB to send the traffic to an AWS WAF endpoint for the deep packet inspection.
  • D. Decrypt traffic by using a Network Load Balancer (NLB) that is configured for TLS termination. Configure the NLB to send the traffic to an AWS WAF endpoint for the deep packet inspection.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
D2
Highly Voted 2 years, 7 months ago
Ans B https://aws.amazon.com/network-firewall/faqs/ Can AWS Network Firewall inspect encrypted traffic? AWS Network Firewall does not currently support deep packet inspection for encrypted traffic. To work around this limitation, you can decrypt traffic using a Network Load Balancer (NLB) before sending it to an AWS Network Firewall endpoint. Also, for HTTPS traffic, AWS Network Firewall can inspect the domain name provided by the Server Name Indicator (SNI) during the TLS handshake.
upvoted 12 times
Tofu13
2 years ago
Answer of above FAQ has changed to: AWS Network Firewall does support deep packet inspection for encrypted traffic. So this question is not likely to come up with this wording.
upvoted 4 times
...
...
Arad
Most Recent 1 year ago
Selected Answer: B
B is the right answer.
upvoted 1 times
...
yorkicurke
1 year, 6 months ago
Selected Answer: A
i will still go for A even though now NLB supports TLS and all, here is why; key difference between them when it comes to handling decrypted traffic: ALBs operate at the request level (layer 7), which allows them to inspect the content of the traffic and make routing decisions based on that. This makes them suitable for use cases like the one in Option A, where the decrypted traffic needs to be sent to AWS Network Firewall for deep packet inspection. NLBs operate at the connection level (layer 4), which means they can’t inspect the content of the traffic. They make routing decisions based on IP protocol data, such as source IP, source port, destination IP, and destination port. This makes them less suitable for use cases like the one in Option B, where the decrypted traffic needs to be inspected.
upvoted 1 times
nznzwell
1 year, 3 months ago
Your reasoning does not make sense. ALB and NLB are mainly to forward traffic - they don't "inspect" traffic as you claimed. Once the TLS traffic is decrypted, the traffic self is not altered by the LB so the AWS Network Firewall can do DPI anyways.
upvoted 1 times
...
...
dante_2k5
2 years ago
Selected Answer: B
Option A, which suggests using an ALB for TLS termination, is incorrect because ALB only supports TLS termination on port 443 and may not meet the requirement if the traffic is not using port 443, which in this case is not being explicit. Option C and Option D are not valid due AWS WAF is not suitable for deep packet inspection.
upvoted 2 times
...
vherman
2 years ago
Selected Answer: A
A look best
upvoted 1 times
...
Toptip
2 years ago
Selected Answer: B
NLB + Network Firewall
upvoted 1 times
...
ITGURU51
2 years, 1 month ago
A is the best answer because the ALB is designed to load balance http and https requests. Furthermore terminating TLS traffic using an (ALB) is a common practice for enterprise networks. AWS Network Firewall provides deep packet inspection to analyze malicious traffic flowing in and out of the VPC. A
upvoted 1 times
...
Cyp
2 years, 2 months ago
Selected Answer: B
The Answer is B. With ALB you can only create TLS listener for port 443 but with NLB you can create TLS listener of your choice.... Remember, the traffic that Network firewall is going to inspect dosent necessarily to be https...
upvoted 1 times
...
examaws
2 years, 3 months ago
Selected Answer: A
NLB cannot perform TLS termination. So even if NLB can decrypt traffic, you need another appliance behind that NLB, before sending the traffic to Network Firewall. ALB can handle all of the required, decrypt and TLS termination, before send to Network Firewall.
upvoted 3 times
nairj
2 years, 2 months ago
https://docs.aws.amazon.com/elasticloadbalancing/latest/network/create-tls-listener.html NLB Can perform TLS termination.
upvoted 3 times
...
...
rijub2022
2 years, 3 months ago
Selected Answer: A
https://aws.amazon.com/blogs/networking-and-content-delivery/deployment-models-for-aws-network-firewall-with-vpc-routing-enhancements/ “ In the figure 3 example, an Application Load Balancer (ALB) enables you to offload TLS. Decrypted HTTP traffic is sent to backend application targets which could be in a different AZ enabling HTTP header and payload inspection. Following our principle, traffic from ALB to backend target is inspected in the same AZ as the client (ALB). The application in turn requires connectivity to the relational (main/active node) database. This traffic once again is processed closer to the client (application EC2 instance) and traffic is returned symmetrically.”
upvoted 1 times
...
sakibmas
2 years, 5 months ago
Selected Answer: A
ALB — Layer 7 (HTTP/HTTPS traffic), Flexible. NLB — Layer 4 (TLS/TCP/UDP traffic), Static IPs.
upvoted 1 times
...
Ciph
2 years, 5 months ago
A, please refer part-2 in below link. https://aws.amazon.com/blogs/networking-and-content-delivery/deployment-models-for-aws-network-firewall/
upvoted 1 times
...
secdaddy
2 years, 5 months ago
In support of B TLS Termination for Network Load Balancers https://aws.amazon.com/blogs/aws/new-tls-termination-for-network-load-balancers/
upvoted 1 times
...
Teknoklutz
2 years, 6 months ago
Selected Answer: B
Network Firewall IPS feature
upvoted 2 times
...
Fyssy
2 years, 6 months ago
Selected Answer: A
Unlike a Classic Load Balancer or an Application Load Balancer, a Network Load Balancer can't have application layer (layer 7) HTTP or HTTPS listeners. It only supports transport layer (layer 4) TCP listeners. HTTP and HTTPS traffic can be routed to your environment over TCP.
upvoted 1 times
...
ryogoku
2 years, 6 months ago
Selected Answer: A
It’s traffic to web servers. Why ALB is not correct? Is there aws doc stating ALB does not support sending traffic to network firewall?
upvoted 2 times
TerrenceC
2 years, 5 months ago
As of today, all the endpoint services could only be associated with either NLB or GWLB. That is the primary reason why ALB is out.
upvoted 2 times
...
...
Balki
2 years, 6 months ago
Selected Answer: B
AWS Network Firewall’s intrusion prevention system (IPS) provides active traffic flow inspection so you can identify and block vulnerability exploits using signature-based detection
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...