SAP-C01 Exam QuestionsBrowse all questions from this exam

SAP-C01 Exam - Question 942


A company has VPC flow logs enabled for its NAT gateway. The company is seeing Action = ACCEPT for inbound traffic that comes from public IP address

198.51.100.2 destined for a private Amazon EC2 instance.

A solutions architect must determine whether the traffic represents unsolicited inbound connections from the internet. The first two octets of the VPC CIDR block are 203.0.

Which set of steps should the solutions architect take to meet these requirements?

Show Answer
Correct Answer: D

To determine whether the traffic is unsolicited inbound traffic from the internet, you need to identify if there was any initial outbound communication from the private Amazon EC2 instance that would have solicited the inbound traffic. This involves checking the logs for outbound traffic from the private EC2 instance to see if it initiated communication with the public IP address 198.51.100.2. Therefore, you need to query the logs with the destination address set as 198.51.100.2 and the source address set as 203.0, which corresponds to the private instance within the VPC CIDR block, to see if such communication exists. This makes option D the correct choice.

Discussion

17 comments
Sign in to comment
sb333
Sep 29, 2022

D The question already states that there was an Action=Accept from Internet inbound to Private IP. The goal is to determine if this was solicited or unsolicited traffic. If solicited, traffic would have been initiated from the Private IP address initially and then received the return traffic. If unsolicited, there would be no initial traffic outbound from Private IP address. So Answer D is what is needed to determine this.

Jesuisleon
May 30, 2023

Good explication

CloudxieOption: B
Sep 13, 2022

https://aws.amazon.com/premiumsupport/knowledge-center/vpc-analyze-inbound-traffic-nat-gateway/

3a632a3
Jan 10, 2024

Thank you for the link. This explains it perfectly. The answer is actually D because it is assumed that reason #1 is already complete as the questions states that incoming traffic has been confirmed. Now the question is focusing on reason #2 to see if it was solicited meaning that the private ec2 instance initiated the traffic.

3a632a3
Jan 10, 2024

Apologies you were correct I mixed up the letters. I down vote my mistake.

JonfernzOption: D
Nov 6, 2022

As a networking guy, D is the obvious answer. You are inspecting the CW log group for the outbound traffic.

dcdcdc3Option: D
Oct 10, 2022

Agree with sb333 we need to observe egress to determine if it was solicited https://aws.amazon.com/premiumsupport/knowledge-center/vpc-analyze-inbound-traffic-nat-gateway/ by Cloudxie says "select appropriate log"

superuser784Option: B
Nov 5, 2022

B: Cloudxie added the link https://aws.amazon.com/premiumsupport/knowledge-center/vpc-analyze-inbound-traffic-nat-gateway/ D is the case when we want to know if Traffic to the public IP was initiated from a private instance filter (dstAddr like 'public IP' and srcAddr like 'xxx.xxx')

JohnPiOption: D
Oct 13, 2022

traffic to the public IP was initiated from a private instance filter (dstAddr like 'public IP' and srcAddr like 'xxx.xxx') | stats sum(bytes) as bytesTransferred by srcAddr, dstAddr | limit 10

tjzsm1Option: D
Nov 4, 2022

D is correct. sb333 explained it very well.

janvandermerwerOption: D
Nov 10, 2022

Cloudtrail isn't used to view VPC flow logs, so that rules out A and C. Traffic is already allowed inbound, so need to see if there is suspicious traffic from the source/internal/private range = 203.0 Source = 203.x Dest = 198.51

AnnTOption: D
Oct 24, 2022

D. - to determine that it 's unsolicited or not.

tjzsm1Option: D
Oct 25, 2022

Answer is D

moonjOption: B
Jan 3, 2023

should be B Cloudxie posted this link here you can see https://aws.amazon.com/premiumsupport/knowledge-center/vpc-analyze-inbound-traffic-nat-gateway/ filter (dstAddr like 'xxx.xxx' and srcAddr like 'public IP') | stats sum(bytes) as bytesTransferred by srcAddr, dstAddr | limit 10 Query results show traffic on the NAT gateway private IP from the public IP, but not traffic on other private IPs in the VPC. These results confirm that the incoming traffic was unsolicited. However, if you do see traffic on the private instance's IP, then follow the steps under Reason

sjpd10
Oct 29, 2022

The question already states "Action=Accept from Internet inbound to Private IP" Option 'D' fulfils that condition.

ggrodskiy
Jan 13, 2023

Correct B.

ggrodskiy
Aug 1, 2023

Changed D. You need to open the Amazon CloudWatch console, select the log group that contains the NAT gateway's elastic network interface and the private instance's elastic network interface, run a query to filter with the destination address set as "like 198.51.100.2" and the source address set as "like 203.0", and run the stats command to filter the sum of bytes transferred by the source address and the destination address.

Vash2303Option: B
Jan 28, 2023

https://aws.amazon.com/premiumsupport/knowledge-center/vpc-analyze-inbound-traffic-nat-gateway/

Markzz
May 5, 2023

Flow log data can be published to the following locations: Amazon CloudWatch Logs, Amazon S3, or Amazon Kinesis Data Firehose. - A is out.

SkyZeroZxOption: B
Jun 26, 2023

same question in version 2 https://www.examtopics.com/discussions/amazon/view/95384-exam-aws-certified-solutions-architect-professional-sap-c02/ B is correct

WhyIronManOption: B
Jul 18, 2024

B https://repost.aws/knowledge-center/vpc-analyze-inbound-traffic-nat-gateway from aws documentation: filter (dstAddr like 'xxx.xxx' and srcAddr like 'public IP') | stats sum(bytes) as bytesTransferred by srcAddr, dstAddr | limit 10 if the query results show traffic ONLY ON the NAT gateway private IP from the public IP, BUT NOT traffic on other private IPs in the VPC, these results confirm that the incoming traffic was unsolicited.