Which of the following are characteristics of Amazon VPC subnets?

Which of the following are characteristics of Amazon VPC subnets?
Choose 2 answers

Which of the following are characteristics of Amazon VPC subnets?
Choose 2 answers

A.
Each subnet maps to a single Availability Zone

B.
A CIDR block mask of /25 is the smallest range supported

C.
Instances in a private subnet can communicate with the internet only if they have an Elastic IP.

D.
By default, all subnets can route between each other, whether they are private or public

E.
V Each subnet spans at least 2 Availability zones to provide a high-availability environment



Leave a Reply 0

Your email address will not be published. Required fields are marked *


ryanking

ryanking

answer is A and D

Aayush

Aayush

C is also correct

Aayush

Aayush

As if u create a new subnet it has route to the IG, if u only attach a EIP it can route traffic to internet.
3 correct ans for this question
A C D

Frank

Frank

Hi, correct answers are A & D

– B is wrong: /28 is the smallest
– C is wrong: private subnet should go via NAT (EIP only in public subnet)
– E is wrong: subnet can only map to ONE AZ (not span multiple)

Regards,
Frank

Nagarjuna D N

Nagarjuna D N

Perfect

Aayush

Aayush

No C is correct ,
U urself make a subnet public or private by attaching route to IG , bu default the route is added for IG , hence u only require an EIP.
and then u can connect.
A C D are correct

Bryan Erwin

Bryan Erwin

The correct answer is A & D.
http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Subnets.html

You can create a VPC that spans multiple Availability Zones. For more information, see Creating a VPC. After creating a VPC, you can add one or more subnets in each Availability Zone. Each subnet must reside entirely within one Availability Zone and cannot span zones. Availability Zones are distinct locations that are engineered to be isolated from failures in other Availability Zones. By launching instances in separate Availability Zones, you can protect your applications from the failure of a single location. AWS assigns a unique ID to each subnet.

Seth

Seth

C, and D are wrong. A private subnet cannot reach the internet because it doesn’t have access an Internet Gateway through a NAT. An elastic IP will make no difference without those. Also subnets can never span multiple availability zones. VPC’s however, can. Only possible answers are A and D. D is correct only if proper security groups are in place.

Aayush

Aayush

No C is correct ,
U urself make a subnet public or private by attaching route to IG , bu default the route is added for IG , hence u only require an EIP.
and then u can connect.
A C D are correct

RSS60

RSS60

C is wrong because it refers to an instance in a private subnet. From the link provided by Bryan:

“If you want your instance in a public subnet to communicate with the Internet, it must have a public IP address or an Elastic IP address.”

DD

DD

A&D have my vote. A subnet is always a single AZ. Create a VPC and all subnets are implicitly associated with a route table by default.

Andrzej Lassak

Andrzej Lassak

Can someone update this do A & D?

Teague Xiao

Teague Xiao

I think AD is correct

Rajdeep

Rajdeep

Correct Answer is A & D

Sam T

Sam T

A and D – easiest to pick

charm

charm

A.
Each subnet maps to a single Availability Zone

D.
By default, all subnets can route between each other, whether they are private or public