Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Free IT Exam Dumps

ANS-C00 Dump Free

Table of Contents

Toggle
  • ANS-C00 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.
  • Access Full ANS-C00 Dump Free

ANS-C00 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.

Looking for a reliable way to prepare for your ANS-C00 certification? Our ANS-C00 Dump Free includes 50 exam-style practice questions designed to reflect real test scenarios—helping you study smarter and pass with confidence.

Using an ANS-C00 dump free set of questions can give you an edge in your exam prep by helping you:

  • Understand the format and types of questions you’ll face
  • Pinpoint weak areas and focus your study efforts
  • Boost your confidence with realistic question practice

Below, you will find 50 free questions from our ANS-C00 Dump Free collection. These cover key topics and are structured to simulate the difficulty level of the real exam, making them a valuable tool for review or final prep.

Question 1

A company is deploying a non-web application on an Elastic Load Balancing. All targets are servers located on-premises that can be accessed by using AWS
Direct Connect. The company wants to ensure that the source IP addresses of clients connecting to the application are passed all the way to the end server.
How can this requirement be achieved?

A. Use a Network Load Balancer to automatically preserve the source IP address.

B. Use a Network Load Balancer and enable the X-Forwarded-For attribute.

C. Use a Network Load Balancer and enable the ProxyProtocol attribute.

D. Use an Application Load Balancer to automatically preserve the source IP address in the X-Forwarded-For header.

 


Suggested Answer: D

Community Answer: C

 

Question 2

An application runs on a fleet of Amazon EC2 instances in a VPC. All instances can reach one another using private IP addresses. The application owner has a new requirement that the domain name received via DHCP should be different for a particular set of instances that are currently in one particular subnet.
What changes should be made to meet this requirement while continuing to support the existing application requirements?

A. Modify the existing DHCP option set and specify the different domain name for the specified subnet.

B. Create a new DHCP option set with the different domain name, associate it with the specified subnet, and re-launch the Amazon EC2 instances.

C. Create a new subnet, configure the DHCP option set with the different domain name, and re-launch the required instances there.

D. Create a new peered VPC, configure the DHCP option set with the different domain name, and re-launch the required instances there.

 


Suggested Answer: B

Community Answer: D

 

Question 3

What are three services that help mitigate a DDoS? (Choose two.)

A. AWS Shield

B. DynamoDB

C. Elastic Beanstalk

D. CloudFront

 


Suggested Answer: AD

 

AWS Shield and CloudFront can help mitigate the effects of a DDoS

 

Question 4

You have a hybrid infrastructure, and you need AWS resources to be able to resolve your on-premises DNS names. You have configured a DNS server on an
EC2 instance in your 10.1.3.0/24 subnet. This subnet resides on the VPC 10.1.0.0/16. What step should you take to accomplish this?

A. Configure your DNS server to forward queries for the private hosted zone to 10.1.3.2.

B. Configure the DHCP option set in the VPC to point to the EC2 DNS server.

C. Configure your DNS server to forward queries for the private hosted zone to 10.1.0.2.

D. Disable the source/destination check flag for the DNS instance.

 


Suggested Answer: B

 

Your DNS server will forward queries to your on-premises DNS. You must configure the DHCP option set so the instances will forward queries to your on- premises DNS instead of the VPC DNS.

 

Question 5

To connect to public AWS products such as Amazon EC2 and Amazon S3 through the AWS Direct Link, which step is NOT required?

A. Provide public IP address (/31) for each Border Gateway Protocol (BGP) session.

B. Allocate a Private IP address to your network in 172.x.x.x range.

C. Provide the public routes that you will advertise over Border Gateway Protocol (BGP).

D. Provide a public Autonomous System Number (ASN) that you own or a private one to identify your network on the Internet.

 


Suggested Answer: B

 

To connect to public AWS products such as Amazon EC2 and Amazon S3 through the AWS Direct Connect, you need to provide the following:
A public Autonomous System Number (ASN) that you own (preferred) or a private ASN. Public IP addresses (/30) (that is, one for each end of the BGP session) for each BGP session. The public routes that you will advertise over BGP.
Reference:
http://docs.aws.amazon.com/directconnect/latest/UserGuide/Welcome.html

 

Question 6

Which service is used by default to store the CloudTrail log files?

A. Elastic Block Store (EBS)

B. Redshift

C. Simple Storage Service (S3)

D. Glacier

 


Suggested Answer: C

 

S3 is used by default to store the CloudTrail log files and a dedicated S3 bucket is required during the creation of a new Trail
Reference:
http://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-working-with-log-files.html

 

Question 7

Considering the rules of IPv4 subnetting, how many subnets and hosts per subnet are possible given the following network 192.168.130.130/28? (in this question ignore the fact that AWS reserves 5 IP addresses)

A. 8 subnets and 30 hosts per subnet

B. 16 subnets and 14 hosts per subnet

C. 32 subnets and 30 hosts per subnet

D. 8 subnets and 14 hosts per subnet

 


Suggested Answer: B

 

16 subnets and 14 hosts per subnet are possible in the CIDR.
Reference:
https://en.wikipedia.org/wiki/IPv4_subnetting_reference

 

Question 8

You have configured a dynamic VPN between your datacenter and your VPC. Your router says the tunnel is up and BGP is active, but for some reason, you are not seeing your routes propagate.
What is most likely the issue?

A. You need to configure the firewall for BGP.

B. Your router does not support BFD.

C. You need to obtain a new BGP MD5 key.

D. You forgot to set route propagation to “yes” in the route table.

 


Suggested Answer: D

 

You forgot to set route propagation to “yes” in the route table. If the route table says BGP is active and the tunnel is up, then you do not have a firewall issue. BFD has nothing to do with route propagation. You do not need a BGP MD5 key for VPN.

 

Question 9

Which two statements about placement groups are correct? (Choose two.)

A. A placement group can span multiple VPCs.

B. A placement group can span multiple Availability Zones.

C. You cannot merge placement groups.

D. It is best to use the same instance types in a placement group.

 


Suggested Answer: AC

Community Answer: CD

A placement group can span multiple VPCs but may not experience the full performance benefit. The only way to add instances from one placement group to another is to create AMIs out of the instances and spin them all up into one placement group.

 

Question 10

You want to send a broadcast message to your 10.0.0.0/24 subnet, which one of these addresses should you use?

A. 10.0.0.255

B. 10.0.0.1

C. 10.0.0.2

D. You cannot send a broadcast in an AWS VPC.

 


Suggested Answer: D

 

You cannot send a broadcast in an AWS VPC, but the address is still reserved.

 

Question 11

You have deployed a website that utilizes CloudFront, Elastic Loadbalancer, and S3 to serve content. When users access your site, they receive a "mixed content" security warning.
What is most likely the problem?

A. There is no rule in your bucket policy allowing public access.

B. You have applied your SSL to your Elastic Loadbalancer but not your CDN.

C. Your S3 Bucket permissions are incorrect.

D. You are using an SSL from an external CA.

 


Suggested Answer: B

Community Answer: B

You must apply the SSL to your Elastic Loadblanacer and your CDN to encrypt all aspects of your site.

 

Question 12

A company is delivering web content from an Amazon EC2 instance in a public subnet with address 2001:db8:1:100::1. Users report they are unable to access the web content. The VPC Flow Logs for the subnet contain the following entries:
2 012345678912 eni-0596e500123456789 2001:db8:2:200::2 2001:db8:1:100::1 0 0 58 234 24336 1551299195 1551299434 ACCEPT
OK -
2 012345678912 eni-0596e500123456789 2001:db8:1:100::1 2001:db8:2:200::2 0 0 58 234 24336 1551299195 1551299434 REJECT
OK -
Which action will restore network reachability to the EC2 instance?

A. Update the security group associated with eni-0596e500123456789 to permit inbound traffic.

B. Update the security group associated with eni-0596e500123456789 to permit outbound traffic.

C. Update the network ACL associated with the subnet to permit inbound traffic.

D. Update the network ACL associated with the subnet to permit outbound traffic.

 


Suggested Answer: C

Community Answer: D

 

Question 13

In AWS, which service provides a reliable and inexpensive way to backup and archive CloudTrail log files?

A. Amazon Archiver

B. Amazon Glacier

C. AWS Storage Gateway

D. Amazon Elastic Block Store

 


Suggested Answer: B

Community Answer: B

You control the retention policies for your CloudTrail log files. By default, log files are stored indefinitely, but for cost efficiency, you may want to delete old log files or archive them to Amazon Glacier, a storage service optimized for data archiving and backup of infrequently used data.
Reference:
https://aws.amazon.com/cloudtrail/faqs/

 

Question 14

Which AWS service is used within an AWS Config Rule to perform the logic evaluation of that rule?

A. Inspector

B. WAF

C. Lambda

D. SWF

 


Suggested Answer: C

 

AWS Config Rules are a great way to help you enforce specific compliance controls and checks across your resources and allows for you to adopt an `ideal’ deployment specification for each of your resource types. Each Rule is simply a Lambda function that when called upon evaluates the resource and carries out some simply logic to determine the compliance result with the rule.
Reference:
http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_develop-rules_nodejs-sample.html

 

Question 15

In the context of Amazon CloudFront, when you configure the media player, the path you specify to the media file must contain the characters _____________.

A. flv/std just before the domain name

B. flv/std immediately after the domain name

C. cfx/st just before the domain name

D. cfx/st immediately after the domain name

 


Suggested Answer: D

Community Answer: D

In Amazon CloudFront, when you configure the media player, the path you specify to the media file must contain the characters cfx/st immediately after the domain name. For example: rtmp://s5c39gqb8ow64r.cloudfront.net/cfx/st/mediafile.flv
Reference:
http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/Streaming_URLs.html

 

Question 16

Over which of the following Ethernet standards does AWS Direct Connect link your internal network to an AWS Direct Connect location?

A. Copper backplane cable

B. Twisted pair cable

C. Single mode fiber-optic cable

D. Shielded balanced copper cable

 


Suggested Answer: C

 

AWS Direct Connect links your internal network to an AWS Direct Connect location over a standard 1 gigabit or 10 gigabit Ethernet single mode fiber-optic cable.
Reference:
http://docs.aws.amazon.com/directconnect/latest/UserGuide/Welcome.html

 

Question 17

AWS Config flags a resource as ____ if a resource violates any conditions of an AWS Config rule that it evaluates on the resource in question.

A. corrupted

B. noncompliant

C. invalid

D. misconfigured

 


Suggested Answer: B

 

Use AWS Config to evaluate the configuration settings of your AWS resources. You do this by creating AWS Config rules, which represent your ideal configuration settings. AWS Config provides customizable, predefined rules called managed rules to help you get started. You can also create your own custom rules. While
AWS Config continuously tracks the configuration changes that occur among your resources, it checks whether these changes violate any of the conditions in your rules. If a resource violates a rule, AWS Config flags the resource and the rule as noncompliant.
Reference:
http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config.html

 

Question 18

For _______ distributions, CloudFront does not cache cookies in edge caches.

A. AMI

B. Web

C. RTMP

D. Web and RTMP

 


Suggested Answer: C

 

For RTMP distributions, when Amazon CloudFront requests an object from the origin server, it removes any cookies before forwarding the request to your origin. If your origin returns any cookies along with the object, CloudFront removes them before returning the object to the viewer.
For RTMP distributions, CloudFront does not cache cookies in edge caches.
Reference:
http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/Cookies.html

 

Question 19

An organization with a growing ecommerce presence uses the AWS CloudHSM to offload the SSL/TLS processing of its web server fleet. The company leverages
Amazon EC2 Auto Scaling for web servers to handle the growth. What architectural approach is optimal to scale the encryption operation?

A. Use multiple CloudHSM instances, and load balance them using a Network Load Balancer.

B. Use multiple CloudHSM instances to the cluster; request to it will automatically load balance.

C. Enable Auto Scaling on the CloudHSM instance, with similar configuration to the web tier Auto Scaling group.

D. Use multiple CloudHSM instances, and load balance them using an Application Load Balancer.

 


Suggested Answer: A

Community Answer: B

 

Question 20

In AWS Direct Connect, to provide for failover, AWS recommends that you request and configure two dedicated connections to AWS. These connections can terminate on one or two routers in your network. You can do this while __________________ with AWS Direct Connect step.

A. creating a Virtual Interface

B. configuring redundant connections

C. completing the cross-connect

D. verifying your Virtual Interface

 


Suggested Answer: B

 

In AWS Direct Connect, to provide for failover, AWS recommends that you request and configure two dedicated connections to AWS.
These connections can terminate on one or two routers in your network. You can do this in Configure Redundant Connections with AWS Direct Connect step.
Reference:
http://docs.aws.amazon.com/directconnect/latest/UserGuide/getstarted.html#RedundantConnections

 

Question 21

In the context of CloudFront RTMP Distribution, the Adobe Flash Media Server _________ file specifies which domains can access media files in a particular domain.

A. accessdomain.JSON

B. crossdomain.xml

C. accessdomain.xml

D. crossdomain.JSON

 


Suggested Answer: B

 

In the context of CloudFront RTMP Distribution, the Adobe Flash Media Server crossdomain.xml file specifies which domains can access media files in a particular domain.
Reference:
http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/Streaming_CrossDomain.html

 

Question 22

A legacy, on-premises web application cannot be load balanced effectively. There are both planned and unplanned events that cause usage spikes to millions of concurrent users. The existing infrastructure cannot handle the usage spikes. The CIO has mandated that the application be moved to the cloud to avoid further disruptions, with the additional requirement that source IP addresses be unaltered to support network traffic-monitoring needs. Which of the following designs will meet these requirements?

A. Use an Auto Scaling group of Amazon EC2 instances behind a Classic Load Balancer.

B. Use an Auto Scaling group of EC2 instances in a target group behind an Application Load Balancer.

C. Use an Auto Scaling group of EC2 instances in a target group behind a Classic Load Balancer.

D. Use an Auto Scaling group of EC2 instances in a target group behind a Network Load Balancer.

 


Suggested Answer: D

 

 

Question 23

An organization is using a VPC endpoint for Amazon S3. When the security group rules for a set of instances were initially configured, access was restricted to allow traffic only to the IP addresses of the Amazon S3 API endpoints in the region from the published JSON file. The application was working properly, but now is logging a growing number of timeouts when connecting with Amazon S3. No internet gateway is configured for the VPC.
Which solution will fix the connectivity failures with the LEAST amount of effort?

A. Create a Lambda function to update the security group based on AmazonIPSpaceChanged notifications.

B. Update the VPC routing to direct Amazon S3 prefix-list traffic to the VPC endpoint using the route table APIs.

C. Update the application server’s outbound security group to use the prefix-list for Amazon S3 in the same region.

D. Create an additional VPC endpoint for Amazon S3 in the same route table to scale the concurrent connections to Amazon S3.

 


Suggested Answer: C

Community Answer: C

 

Question 24

Which of these modes is not a configuration mode for a WAF?

A. Block

B. Allow

C. Sleep

D. Monitor

 


Suggested Answer: C

Community Answer: C

There is no sleep mode for a WAF. WAFs are hard workers.

 

Question 25

You deploy an Amazon EC2 instance that runs a web server into a subnet in a VPC. An Internet gateway is attached, and the main route table has a default route
(0.0.0.0/0) configured with a target of the Internet gateway.
The instance has a security group configured to allow as follows:
✑ Protocol: TCP
✑ Port: 80 inbound and nothing outbound
The Network ACL for the subnet is configured to allow as follows:
✑ Protocol: TCP
✑ Port: 80 inbound and nothing outbound
When you try to browse to the web server, you receive no response.
Which additional step should you take to receive a successful response?

A. Add an entry to the security group outbound rules for Protocol: TCP, Port Range: 80

B. Add an entry to the security group outbound rules for Protocol: TCP, Port Range: 1024-65535

C. Add an entry to the Network ACL outbound rules for Protocol: TCP, Port Range: 80

D. Add an entry to the Network ACL outbound rules for Protocol: TCP, Port Range: 1024-65535

 


Suggested Answer: C

Community Answer: D

 

Question 26

A company's IT Security team needs to ensure that all servers within an Amazon VPC can communicate with a list of five approved external IPs only. The team also wants to receive a notification every time any server tries to open a connection with a non-approved endpoint.
What is the MOST cost-effective solution that meets these requirements?

A. Add allowed IPs to the network ACL for the application server subnets. Enable VPC Flow Logs with a filter set to ALL. Create an Amazon CloudWatch Logs filter on the VPC Flow Logs log group filtered by REJECT. Create an alarm for this metric to notify the security team.

B. Enable Amazon GuardDuty on the account and the specific Region. Upload a list of allowed IPs to Amazon S3 and link the S3 object to the GuardDuty trusted IP list. Configure an Amazon CloudWatch Events rule on all GuardDuty findings to trigger an Amazon SNS notification to the security team.

C. Add allowed IPs to the network ACL for the application server subnets. Enable VPC Flow Logs with a filter set to REJECT. Set an Amazon CloudWatch Logs filter for the log group on every event. Create an alarm for this metric to notify the security team.

D. Enable Amazon GuardDuty on the account and specific Region. Upload a list of allowed IPs to Amazon S3 and link the S3 object to the GuardDuty threat IP list. Integrate GuardDuty with a compatible SIEM to report on every alarm from GuardDuty.

 


Suggested Answer: A

Community Answer: C

 

Question 27

Non-compliant resources identified through the use of AWS Config Rules are automatically removed from operational service.

A. It depends on the Rule configuration

B. Only if it remains non-compliant for more than 6 hours

C. True

D. False

 


Suggested Answer: D

Community Answer: A

Each time a change is made to one of your supported resources, AWS config will check its compliance against any Config Rules that you have in place. If there is a violation against these rules then AWS Config will send a message to the Configuration Stream via SNS and the resource will be marked as `noncompliant’.
It’s important to note that this does not mean the resource will be taken out of service or it will stop working. It will continue to operate exactly as it is with its new configuration. AWS Config simply alerts you that there is a violation and it’s up to you to take the appropriate action.
Reference:
http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_view-compliance.html

 

Question 28

A Network Engineer is provisioning a subnet for a load balancer that will sit in front of a fleet of application servers in a private subnet. There is limited IP space left in the VPC CIDR. The application has few users now but is expected to grow quickly to millions of users.
What design will use the LEAST amount of IP space, while allowing for this growth?

A. Use two /29 subnets for an Application Load Balancer in different Availability Zones.

B. Use one /29 subnet for the Network Load Balancer. Add another VPC CIDR to the VPC to allow for future growth.

C. Use two /28 subnets for a Network Load Balancer in different Availability Zones.

D. Use one /28 subnet for an Application Load Balancer. Add another VPC CIDR to the VPC to allow for future growth.

 


Suggested Answer: D

Community Answer: C

 

Question 29

You have 3 VPCs that need to be able to pass traffic. In what two ways can you achieve this? (Choose two.)

A. Peer each VPC to every other VPC to create a full mesh peering.

B. Peer them, VPC peering allows transitive peering as of December 2017.

C. Call AWS to enable transitive peering.

D. Create VPNs between them and adjust the routing tables accordingly.

 


Suggested Answer: AD

 

VPN instances can be used to create transitive peering. Full mesh peering is the only way to use peering to allow all VPCs to communicate with all other VPCs.
Transitive peering is not possible.

 

Question 30

An organization has multiple applications running in VPCs across multiple AWS accounts. The network engineer has deployed a central VPC with a pair of software VPN instances that run IPSec tunnels with dynamic routing to VGWs of all application VPCs. This central VPC is connected to on-premises resources via a Direct Connect connection using a private VIF.
What additional configuration is required to enable the applications in VPCs to communicate with each other and access on-premises resources?

A. Configure each application VPC with a static route entry pointing the on-premises CIDR block to the software VPN instances.

B. Configure the central VPC with a static route entry pointing the on-premises CIDR block to local VGWs.

C. Advertise all application VPC CIDR blocks to on-premises resources via the VGW in the central VPC.

D. Configure IPSec tunnels from the on-premises router into the software VPN instances with dynamic routing.

 


Suggested Answer: B

Community Answer: D

 

Question 31

Your company runs an application for the US market in the us-east-1 AWS region. This application uses proprietary TCP and UDP protocols on Amazon Elastic
Compute Cloud (EC2) instances. End users run a real-time, front-end application on their local PCs. This front-end application knows the DNS hostname of the service.
You must prepare the system for global expansion. The end users must access the application with lowest latency.
How should you use AWS services to meet these requirements?

A. Register the IP addresses of the service hosts as ג€Aג€ records with latency-based routing policy in Amazon Route 53, and set a Route 53 health check for these hosts.

B. Set the Elastic Load Balancing (ELB) load balancer in front of the hosts of the service, and register the ELB name of the main service host as an ALIAS record with a latency-based routing policy in Route 53.

C. Set Amazon CloudFront in front of the host of the service, and register the CloudFront name of the main service as an ALIAS record in Route 53.

D. Set the Amazon API gateway in front of the service, and register the API gateway name of the main service as an ALIAS record in Route 53.

 


Suggested Answer: B

Community Answer: A

 

Question 32

What must be added to your web server configuration to view the true requesting IP address?

A. X-Actual-IP

B. X-Forwarded-Proto

C. X-Amzn-Trace-ID

D. X-Forwarded-For

 


Suggested Answer: D

 

X-Forwarded-For. X-Forwarded-Proto is to see the protocol, X-Actual-IP doesn’t exist and X-Amzn-Trace-ID is for Amazon’s unique identifier.

 

Question 33

An organization has three AWS accounts with each containing VPCs in Virginia, Canada and the Sydney regions. The organization wants to determine whether all available Elastic IP addresses (EIPs) in these accounts are attached to Amazon EC2 instances or in use elastic network interfaces (ENIs) in all of the specified regions for compliance and cost-optimization purposes.
Which of the following meets the requirements with the LEAST management overhead?

A. Use an Amazon CloudWatch Events rule to schedule an AWS Lambda function in each account in all three regions to find the unattached and unused EIPs.

B. Use a CloudWatch event bus to schedule Lambda functions in each account in all three regions to find the unattached and unused EIPs.

C. Add an AWS managed, EIP-attached AWS Config rule in each region in all three accounts to find unattached and unused EIPs.

D. Use AWS CloudFormation StackSets to deploy an AWS Config EIP-attached rule in all accounts and regions to find the unattached and unused EIPs.

 


Suggested Answer: C

Community Answer: D

 

Question 34

A company is running services in a VPC with a CIDR block of 10.5.0.0/22. End users report that they no longer can provision new resources because some of the subnets in the VPC have run out of IP addresses.
How should a network engineer resolve this issue?

A. Add 10.5.2.0/23 as a second CIDR block to the VPC. Create a new subnet with a new CIDR block, and provision new resources in the new subnet.

B. Add 10.5.4.0/21 as a second CIDR block to the VPC. Assign a second network from this CIDR block to the existing subnets that have run out of IP addresses.

C. Add 10.5.4.0/22 as a second CIDR block to the VPC. Assign a second network from this CIDR block to the existing subnets that have run out of IP addresses.

D. Add 10.5.4.0/22 as a second CIDR block to the VPC. Create a new subnet with a new CIDR block, and provision new resources in the new subnet.

 


Suggested Answer: D

 

 

Question 35

A company has an AWS Direct Connect connection between its on-premises data center and Amazon VPC. An application running on an Amazon EC2 instance in the VPC needs to access confidential data stored in the on-premises data center with consistent performance. For compliance purposes, data encryption is required.
What should the network engineer do to meet these requirements?

A. Configure a public virtual interface on the Direct Connect connection. Set up an AWS Site-to-Site VPN between the customer gateway and the virtual private gateway in the VPC.

B. Configure a private virtual interface on the Direct Connect connection. Set up an AWS Site-to-Site VPN between the customer gateway and the virtual private gateway in the VPC.

C. Configure an internet gateway in the VPC. Set up a software VPN between the customer gateway and an EC2 instance in the VPC.

D. Configure an internet gateway in the VPC. Set up an AWS Site-to-Site VPN between the customer gateway and the virtual private gateway in the VPC.

 


Suggested Answer: A

Community Answer: A

 

Question 36

An AWS Config rule can be set to be evaluated if a certain set of resources undergoes a configuration change. The set of resources to which the rule applies can be restricted by the rule's ____, which can include a combination of a resource type and a resource ID, for example.

A. trigger

B. domain

C. manifest

D. scope

 


Suggested Answer: D

 

When you add an AWS Config rule to your account, you can specify when you want AWS Config to run the rule; this is called a trigger. AWS Config evaluates your resource configurations against the rule when the trigger occurs. You choose which resources trigger the evaluation by defining the rule’s scope. The scope can include the following:
One or more resource types –
A combination of a resource type and a resource ID A combination of a tag key and value.
When any recorded resource is created, updated, or deleted AWS Config runs the evaluation when it detects a change to a resource that matches the rule’s scope. You can use the scope to constrain which resources trigger evaluations. Otherwise, evaluations are triggered when any recorded resource changes.
Reference:
http://docs.aws.amazon.com/config/latest/developerguide/evaluate-config-rules.html

 

Question 37

Which of these is not a requirement to set up a DX connection?

A. Support for 802.1q VLANs

B. BGP MD5 Authentication

C. Autonegotiation enabled

D. Single mode fiber capability

 


Suggested Answer: C

 

Autonegotiation must be disabled.

 

Question 38

Which service would you use to see the DSCP value in a packet header?

A. CloudTrail

B. Config

C. Flow Logs

D. None of the above

 


Suggested Answer: D

 

To perform deep packet inspection, you would need a specialized tool such as Wireshark.

 

Question 39

A customer has set up multiple VPCs for Dev, Test, Prod, and Management. You need to set up AWS Direct Connect to enable data flow from on-premises to each VPC. The customer has monitoring software running in the Management VPC that collects metrics from the instances in all the other VPCs. Due to budget requirements, data transfer charges should be kept at minimum.
Which design should be recommended?

A. Create a total of four private VIFs, one for each VPC owned by the customer, and route traffic between VPCs using the Direct Connect link.

B. Create a private VIF to the Management VPC, and peer this VPC to all other VPCs.

C. Create a private VIF to the Management VPC, and peer this VPC to all other VPCs; enable source/destination NAT in the Management VPC.

D. Create a total of four private VIFs, and enable VPC peering between all VPCs.

 


Suggested Answer: A

Community Answer: D

 

Question 40

Which of the following statements is true of AWS Elastic Beanstalk?

A. AWS Elastic Beanstalk uses CloudWatch for monitoring and alarms, meaning CloudWatch costs are applied to your AWS account for any alarms that you use.

B. AWS Elastic Beanstalk uses CloudWatch for monitoring and alarms, and both are free of charge.

C. AWS Elastic Beanstalk doesn’t use CloudWatch for monitoring and alarms, but you pay extra for any AWS Elastic Beanstalk Alarm you set in the monitoring tool.

D. AWS Elastic Beanstalk has its own free-of-charge monitoring tool, and you are not charged for the alarm you set.

 


Suggested Answer: A

 

AWS Elastic Beanstalk uses CloudWatch for monitoring and alarms, meaning CloudWatch costs are applied to your AWS account for any alarms that you use.
Reference:
http://docs.aws.amazon.com/elasticbeanstalk/latest/dg/using-features.alarms.html

 

Question 41

The Web Application Development team is worried about malicious activity from 200 random IP addresses. Which action will ensure security and scalability from this type of threat?

A. Use inbound security group rules to block the IP addresses.

B. Use inbound network ACL rules to block the IP addresses.

C. Use AWS WAF to block the IP addresses.

D. Write iptables rules on the instance to block the IP addresses.

 


Suggested Answer: B

Community Answer: C

 

Question 42

You are the AWS cloud architect and have been tasked with designing an appropriate subnetting design for your production VPC. Your production VPC requires secure communications back to the corporate private network. Quality of Service (QoS) is very important 24 ֳ— 7 for this particular connection, as real-time data is passed continually backwards and forwards between your on-prem bioinformatics enterprise application, and the number crunching servers deployed in the cloud.
Any potential latency incurred on this connection will have a direct impact on the company's ability to attract investors and expansion into new markets.
Select the correct network configuration that best facilitates your company's continued growth plans.

A. Provision a Direct Connect connection – between your service provider’s data center and the AWS region that your cloud compute resources exist in. Configure just a Private Virtual Interface. As this is a Direct Connection, a Virtual Private Gateway is not required

B. Configure a site-to-site layer 2 software router using OpenVPN within your VPC and ensure that QoS enabled – this is a secure and cheap option

C. Configure a site-to-site layer 3 software router using OpenVPN within your VPC and ensure that QoS enabled – this is a secure and cheap option

D. Provision a Direct Connect connection ג€” between your existing service provider’s data center and the AWS region that your cloud compute resources exist in. Configure a Virtual Private Gateway and Private Virtual Interface

 


Suggested Answer: D

Community Answer: D

Answers A, B, and C all rely on an Internet connection. An Internet connection cannot guarantee QoS and will be subject to performance fluctuations – therefore they are all incorrect options. The only difference between these options is whether a Virtual Private Gateway is required ג€” the answer is yes and therefore the correct answer is D.
Reference:
https://aws.amazon.com/directconnect/faqs/

 

Question 43

A company's web application is deployed on Amazon EC2 instances behind a public Application Load Balancer. The application flags malicious requests and uses an AWS Lambda function to add the offending IP addresses to the network ACL to block any further requests for 24 hours. Recently, the application has been receiving more malicious requests, which causes the network ACL to reach its limit of allowed entries.
Which action should be taken to block more IP addresses, without compromising the existing security requirements?

A. Update the AWS Lambda function to remove blocked entries from the network ACL after 2 hours.

B. Update the AWS Lambda function to block malicious IPs in security groups rather than the network ACL.

C. Update the AWS Lambda function to block malicious IPs in AWS WAF attached to the Application Load Balancer.

D. Update the AWS Lambda function to add an additional network ACL to the subnets once the limit for the previous ones has been reached.

 


Suggested Answer: D

Community Answer: C

 

Question 44

To directly manage your CloudTrail security layer, you can use ____ for your CloudTrail log files

A. SSE-S3

B. SCE-KMS

C. SCE-S3

D. SSE-KMS

 


Suggested Answer: D

Community Answer: D

By default, the log files delivered by CloudTrail to your bucket are encrypted by Amazon server-side encryption with Amazon S3-managed encryption keys (SSE-
S3). To provide a security layer that is directly manageable, you can instead use server-side encryption with AWS KMS-managed keys (SSE-KMS) for your
CloudTrail log files.
Reference:
http://docs.aws.amazon.com/awscloudtrail/latest/userguide/encrypting-cloudtrail-log-files-with-aws-kms.html

 

Question 45

An architecture is being designed to support an Amazon WorkSpaces deployment of 1,000 desktops.
Which architecture will support this deployment while allowing for future expansion?

A. A VPC with a /16 CIDR and one /21 subnet

B. A VPC with a /20 CIDR and two /21 subnets

C. A VPC with a /16 CIDR and one /22 subnet

D. A VPC with a /20 CIDR and two /23 subnets

 


Suggested Answer: C

Community Answer: B

 

Question 46

In Amazon CloudFront, while creating a web distribution, which of the following can be used as origin servers?

A. Any combination AWS Glacier archives and Oracle server

B. Any combination of Amazon DB intances and XML servers

C. Any combination of Amazon S3 buckets and HTTP servers

D. Any combination of Amazon Data Insights and PHP servers

 


Suggested Answer: C

 

In Amazon CloudFront, while creating a web distribution, you can create one or more Amazon S3 buckets or configure HTTP servers as your origin servers. An origin is the location where you store the original version of your web content. When CloudFront gets a request for your files, it goes to the origin to get the files that it distributes at edge locations. You can use any combination of Amazon S3 buckets and HTTP servers as your origin servers.
Reference:
http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-creating.html

 

Question 47

What are two ways to influence the direction of Dynamic VPN traffic over multiple links? (Choose two.)

A. AS_PATH Prepending

B. BFD

C. MED

D. Shouting at it

 


Suggested Answer: AC

 

BFD detects failed links but does not create them. Shouting at it just isn’t nice.

 

Question 48

You are architecting an HPC solution in AWS. The system consists of a cluster of EC2 instances that require low-latency communications between them.
Which method should you use to set up a cluster to meet these requirements?

A. Create a VPC with one subnet in a single Availability Zone. Keep the size of the subnet equal to the number of instances required in the cluster. Launch instances for the cluster in this small subnet to guarantee low-latency network performance.

B. Create a placement group. Choose an EC2 instance type compatible with placement groups for the cluster. Launch instances for the cluster in the placement group.

C. Launch Amazon EC2 instances with the largest available number of cores and RAM. Attach all instances to an Amazon EBS PIOPS volume. Implement a shared memory system across all instances in the cluster, using this shared EBS volume to minimize latency of communication.

D. Choose an EC2 instance type that offers enhanced networking. Attach a 10-Gbps non-blocking elastic network interface to the instances. Configure the elastic network interface to optimize network performance to reduce latency.

 


Suggested Answer: B

 

Placement groups are recommended for applications that benefit from low network latency, high network throughput, or both. A is incorrect because the size of a subnet has no impact on network performance. C is incorrect because an EBS volume cannot be shared between EC2 instances. D is only half the solution because the enhanced networking affects the network behavior of an EC2 instance but not the network infrastructure between instances.

 

Question 49

Within the TCP/IP model what is the name of the Packet Data Unit (PDU) used between Transport Layers for communication between sender and receiver

A. Frames

B. Packets

C. Data

D. Segments

 


Suggested Answer: D

 

Segments is the PDU used between transport layers.
Reference:
https://en.wikipedia.org/wiki/Transmission_Control_Protocol

 

Question 50

What is NOT a benefit of CloudFront?

A. Helps ease the strain on your web servers

B. Distributes traffic evenly to EC2 instances

C. Speeds up distribution of RTMP content

D. Speeds up distribution of static and dynamic web content

 


Suggested Answer: B

Community Answer: B

Elastic Load balancers distribute traffic to EC2 instances.

 

Access Full ANS-C00 Dump Free

Looking for even more practice questions? Click here to access the complete ANS-C00 Dump Free collection, offering hundreds of questions across all exam objectives.

We regularly update our content to ensure accuracy and relevance—so be sure to check back for new material.

Begin your certification journey today with our ANS-C00 dump free questions — and get one step closer to exam success!

Share18Tweet11
Previous Post

AI-900 Dump Free

Next Post

ANS-C01 Dump Free

Next Post

ANS-C01 Dump Free

AXS-C01 Dump Free

AZ-103 Dump Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.