0
0
AWScloud~20 mins

Stateless behavior of NACLs in AWS - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
NACL Mastery Badge
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Stateless Nature of NACLs

Network Access Control Lists (NACLs) in AWS are stateless. What does this mean for the traffic flow?

ANACLs automatically allow return traffic without explicit rules.
BNACLs block all traffic by default and cannot be modified.
CNACLs maintain session state to track connections.
DNACLs require explicit inbound and outbound rules for traffic to flow both ways.
Attempts:
2 left
💡 Hint

Think about how a stateless firewall treats incoming and outgoing packets separately.

service_behavior
intermediate
2:00remaining
Effect of Missing Outbound Rule in NACL

You have a NACL with an inbound rule allowing HTTP (port 80) traffic. There is no outbound rule allowing return traffic. What will happen when a client tries to access a web server behind this NACL?

AThe client will connect but will not receive any response.
BThe client will successfully connect and receive responses.
CThe client connection will be blocked at the inbound rule.
DThe NACL will automatically allow outbound return traffic.
Attempts:
2 left
💡 Hint

Remember that NACLs are stateless and require explicit outbound rules.

Configuration
advanced
2:00remaining
NACL Rules for Bidirectional SSH Access

You want to configure a NACL to allow SSH (port 22) access to an EC2 instance and allow the instance to respond back. Which set of rules correctly achieves this?

AInbound: Allow TCP port 22; Outbound: Allow TCP port 22
BInbound: Allow ephemeral ports (1024-65535); Outbound: Allow TCP port 22
CInbound: Allow TCP port 22; Outbound: Allow ephemeral ports (1024-65535)
DInbound: Allow all traffic; Outbound: Deny all traffic
Attempts:
2 left
💡 Hint

Think about how return traffic uses ephemeral ports.

security
advanced
2:00remaining
Security Implication of Stateless NACLs

What is a key security implication of NACLs being stateless compared to security groups which are stateful?

ANACLs require explicit rules for both directions, increasing rule complexity and risk of misconfiguration.
BNACLs automatically block all return traffic, increasing security.
CNACLs track connection state, reducing the need for outbound rules.
DNACLs cannot be used to block specific IP addresses.
Attempts:
2 left
💡 Hint

Consider how statelessness affects rule management.

Architecture
expert
2:00remaining
Designing a Highly Available NACL Setup

You need to design a highly available architecture using multiple subnets in different Availability Zones (AZs) with NACLs. Which statement about NACLs is true in this scenario?

AEach subnet must have a unique NACL; sharing NACLs across subnets is not allowed.
BA single NACL can be associated with multiple subnets across AZs to simplify management.
CNACLs are regional and automatically replicate rules across AZs.
DNACLs are stateful and automatically handle failover between AZs.
Attempts:
2 left
💡 Hint

Think about how NACLs associate with subnets and their scope.