AWS - Security Groups and Network ACLsWhy must NACL rules explicitly allow both inbound and outbound traffic for a protocol to work correctly?ABecause NACLs only filter outbound traffic, inbound is always allowed.BBecause NACLs automatically allow return traffic, so only inbound rules are needed.CBecause NACLs are stateless and do not track connection states, requiring explicit rules for both directions.DBecause NACLs use security groups to manage return traffic.Check Answer
Step-by-Step SolutionSolution:Step 1: Understand stateless filteringNACLs treat each packet independently without remembering connection state.Step 2: Explain rule necessityBoth inbound and outbound rules must explicitly allow traffic for communication to succeed.Final Answer:Because NACLs are stateless and do not track connection states, requiring explicit rules for both directions. -> Option CQuick Check:Stateless means explicit inbound and outbound rules needed [OK]Quick Trick: Stateless means explicit rules both ways [OK]Common Mistakes:MISTAKESAssuming automatic return traffic allowanceConfusing NACLs with stateful firewallsBelieving inbound rules alone suffice
Master "Security Groups and Network ACLs" in AWS9 interactive learning modes - each teaches the same concept differentlyLearnWhyDeepVisualTryChallengeProjectRecallTime
More AWS Quizzes AWS Account and Billing - Setting up billing alerts - Quiz 11easy AWS Account and Billing - Free tier usage monitoring - Quiz 11easy AWS CLI - Why CLI matters for automation - Quiz 5medium AWS CLI - Installing AWS CLI - Quiz 9hard Cloud Computing Fundamentals - Edge locations and CloudFront overview - Quiz 15hard Cloud Computing Fundamentals - Cloud service models (IaaS, PaaS, SaaS) - Quiz 15hard EC2 Fundamentals - Launching an EC2 instance - Quiz 12easy EC2 Fundamentals - Instance states (running, stopped, terminated) - Quiz 2easy Identity and Access Management - IAM best practices - Quiz 7medium Identity and Access Management - IAM policies (JSON structure) - Quiz 13medium