exam questions

Exam AWS Certified Solutions Architect - Professional SAP-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Professional SAP-C02 exam

Exam AWS Certified Solutions Architect - Professional SAP-C02 topic 1 question 77 discussion

Example Corp. has an on-premises data center and a VPC named VPC A in the Example Corp. AWS account. The on-premises network connects to VPC A through an AWS Site-To-Site VPN. The on-premises servers can properly access VPC A. Example Corp. just acquired AnyCompany, which has a VPC named VPC B. There is no IP address overlap among these networks. Example Corp. has peered VPC A and VPC B.

Example Corp. wants to connect from its on-premise servers to VPC B. Example Corp. has properly set up the network ACL and security groups.

Which solution will meet this requirement with the LEAST operational effort?

  • A. Create a transit gateway. Attach the Site-to-Site VPN, VPC A, and VPC B to the transit gateway. Update the transit gateway route tables for all networks to add IP range routes for all other networks.
  • B. Create a transit gateway. Create a Site-to-Site VPN connection between the on-premises network and VPC B, and connect the VPN connection to the transit gateway. Add a route to direct traffic to the peered VPCs, and add an authorization rule to give clients access to the VPCs A and B.
  • C. Update the route tables for the Site-to-Site VPN and both VPCs for all three networks. Configure BGP propagation for all three networks. Wait for up to 5 minutes for BGP propagation to finish.
  • D. Modify the Site-to-Site VPN’s virtual private gateway definition to include VPC A and VPC B. Split the two routers of the virtual private getaway between the two VPCs.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
rbm2023
Highly Voted 2 years ago
Selected Answer: A
https://docs.aws.amazon.com/pt_br/whitepapers/latest/aws-vpc-connectivity-options/aws-transit-gateway-vpn.html Transit gateway is an AWS managed high availability and scalability regional network transit hub used to interconnect VPCs and customer networks. AWS Transit Gateway + VPN, using the Transit Gateway VPN Attachment, provides the option of creating an IPsec VPN connection between your remote network and the Transit Gateway over the internet, as shown in the following picture. https://docs.aws.amazon.com/images/whitepapers/latest/aws-vpc-connectivity-options/images/image4.png Option A is the correct answer since the transit gateway will allow both VPCs to connect to the on premises network. Option B suggests the same feature but is using the Transit Gateway in a incorrect way. The soul purpose of the gateway is to have point for interconnectivity.
upvoted 10 times
...
Tunstim
Highly Voted 2 years ago
For those that have written SAP-C02, how relevant are these questions to the real exam questions? After adequate preparation, I wanted to truly test my knowledge before dabbling into the exam and would really appreciate anyone's candid opinion. Thanks.
upvoted 5 times
chikorita
1 year, 8 months ago
please reply to him
upvoted 2 times
...
...
amministrazione
Most Recent 8 months, 4 weeks ago
A. Create a transit gateway. Attach the Site-to-Site VPN, VPC A, and VPC B to the transit gateway. Update the transit gateway route tables for all networks to add IP range routes for all other networks.
upvoted 1 times
...
jceleste1
9 months ago
After all, what is the right answer A or D ?
upvoted 1 times
...
gofavad926
1 year, 2 months ago
Selected Answer: A
A, Transit Gateway
upvoted 1 times
...
8608f25
1 year, 3 months ago
Selected Answer: A
Option A is the most straightforward and effective solution. A transit gateway acts as a cloud router that simplifies network topology and connectivity between on-premises networks, VPCs, and other AWS services. By attaching both VPCs (A and B) and the Site-to-Site VPN to a single transit gateway and updating the route tables accordingly, Example Corp. can enable seamless communication between its on-premises network and both VPCs. This approach minimizes operational effort by centralizing network management and eliminating the need for complex routing configurations or multiple VPN connections. Option D proposes modifying the Site-to-Site VPN’s virtual private gateway to include both VPC A and VPC B. However, a virtual private gateway cannot be directly shared or split between VPCs in the manner described. This option misunderstands the architecture of AWS networking components and their capabilities.
upvoted 1 times
...
ninomfr64
1 year, 4 months ago
Selected Answer: A
A = correct B = if you setup a second VPN you do not need a TGW C = peering does not allow edge-to-edge routing (aka VPC B cannot access on-premise via VPC A and vice versa) D = Virtual Private Gateway is specific to a single VPC
upvoted 1 times
...
Russs99
1 year, 9 months ago
Selected Answer: A
reluctantly selecting option A. these answers do not take into consideration that the On-promises already has a peered connection to VPC A through the existing site to site
upvoted 2 times
...
CuteRunRun
1 year, 9 months ago
Selected Answer: A
I think A is right, I do not know why other guys select D
upvoted 1 times
...
NikkyDicky
1 year, 10 months ago
Selected Answer: A
surely A
upvoted 1 times
...
Parsons
2 years ago
Selected Answer: A
A is the best option. Creating a transit gateway and attaching Site-to-Site VPN, VPC A, and VPC B to the transit gateway would enable the on-premise servers to access VPC B with minimal operational effort. The transit gateway route tables would need to be updated with IP range routes for all the other networks to enable communication between the VPCs and the on-premises servers.
upvoted 2 times
...
Arnaud92
2 years, 2 months ago
Selected Answer: A
Solution A is the only one possible solution
upvoted 1 times
Arnaud92
2 years, 2 months ago
B is impossible : When you create a S2S VPN connection, it's between 2 entites (here, the onprem and VPC B). It says that they connect the onprem to VPCB with S2SVPN AND THEN to a TGW, it's not possible to connect a S2S VPN from onprem to VPC to a TGW (it"s a 3 entities). You can however connect a S2S VPN to a TGW (onprem to TGW) (which is solution A). C : Does not work, there is no transitivity on AWS. S2S VPN cannot reach VPC B through VPC A D is impossible : There is no magic, you cannot "split" router (that does not exist). VGW is attach to a single VPC. A S2S VPN cannot multiplex VPC
upvoted 4 times
...
Arnaud92
2 years, 2 months ago
A : the best (and the only one possible) answer : When you have 2 VPC, you have multiple solution to connect to onprem : - Create 2 S2S VPN (1 for each VPC) - or Create a TGW, attach both VPC to it and attach S2S VPN to it too - or Create a third VPC (VPC routing), and peer VPC A with VPC routing, VPC B to VPC routing, attach a S2S VPN to VPC routing and use a NVA on VPC routing to route trafic. NVA can do transitivity. Here, solution A is one of the possible answer
upvoted 4 times
...
...
mfsec
2 years, 2 months ago
Selected Answer: A
A. Create a transit gateway. Attach the Site-to-Site VPN
upvoted 1 times
...
dev112233xx
2 years, 2 months ago
Selected Answer: A
A makes sense to me
upvoted 1 times
...
taer
2 years, 2 months ago
Selected Answer: A
A for me
upvoted 1 times
...
God_Is_Love
2 years, 2 months ago
Selected Answer: B
A has this wierd wording - attaching S-S VPN ? transit gateway attaches to VPCs only not S-S vpn. A is wrong. Since VPC A and VPC B are already peered, the easiest solution to connect from the on-premises servers to VPC B would be to create another Site-to-Site VPN connection between the on-premises data center and VPC B. This would require minimal operational effort, as the existing VPN connection with VPC A can remain unchanged.
upvoted 1 times
God_Is_Love
2 years, 2 months ago
oops this is wrong..VPN can be attached...
upvoted 1 times
God_Is_Love
2 years, 2 months ago
Moderator, please delete this comment..
upvoted 1 times
...
...
God_Is_Love
2 years, 2 months ago
https://docs.aws.amazon.com/vpn/latest/s2svpn/how_it_works.html When you create a virtual private gateway, you can specify the private Autonomous System Number (ASN) for the Amazon side of the gateway. If you don't specify an ASN, the virtual private gateway is created with the default ASN (64512). You cannot change the ASN after you've created the virtual private gateway. Due to this reason, So A is not possible (with least effort). Answer should be B.
upvoted 1 times
Arnaud92
2 years, 2 months ago
THe VGW for VPCA is no more needed on A because you attach the VPCA to the TGW. The ASN will be on the TGW attachment with the S2S VPN. This is the best solution. In the meantime, B is impossible. When you create a S2S VPN connection, it's between 2 entites (here, the onprem and VPC B). It says that they connect the onprem to VPCB with S2SVPN AND THEN to a TGW, it's not possible to connect a S2S VPN from onprem to VPC to a TGW. You can however connect a S2S VPN to a TGW (onprem to TGW).
upvoted 1 times
...
...
...
spd
2 years, 3 months ago
Selected Answer: A
TGW is the solutions
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...