0
0
AWScloud~10 mins

Stateless behavior of NACLs in AWS - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to specify that NACLs are {{BLANK_1}}.

AWS
Network ACLs in AWS are [1], meaning they evaluate traffic in both directions independently.
Drag options to blanks, or click blank then click option'
Apersistent
Bstateless
Cencrypted
Dstateful
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing NACLs with security groups which are stateful.
Thinking NACLs keep track of connection states.
2fill in blank
medium

Complete the code to explain how NACLs handle return traffic: NACLs require explicit {{BLANK_1}} rules for outbound traffic.

AWS
Because NACLs are stateless, they require explicit [1] rules to allow return traffic back out.
Drag options to blanks, or click blank then click option'
Ainbound
Bencrypted
Coutbound
Dlogged
Attempts:
3 left
💡 Hint
Common Mistakes
Assuming inbound rules control return traffic.
Thinking NACLs automatically allow return traffic.
3fill in blank
hard

Fix the error in the statement about NACLs: 'NACLs automatically allow return traffic because they are {{BLANK_1}}.'

AWS
NACLs automatically allow return traffic because they are [1].
Drag options to blanks, or click blank then click option'
Astateful
Bencrypted
Cstateless
Dpersistent
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing NACLs with security groups.
Believing NACLs remember connection states.
4fill in blank
hard

Fill both blanks to complete the NACL rule example: 'To allow HTTP traffic, add an inbound rule with protocol {{BLANK_1}} and port {{BLANK_2}}.'

AWS
To allow HTTP traffic, add an inbound rule with protocol [1] and port [2].
Drag options to blanks, or click blank then click option'
A6
B80
C17
D443
Attempts:
3 left
💡 Hint
Common Mistakes
Using UDP protocol (17) instead of TCP (6).
Using port 443 which is for HTTPS, not HTTP.
5fill in blank
hard

Fill all three blanks to complete the NACL outbound rule: 'Allow outbound DNS queries with protocol {{BLANK_1}}, port {{BLANK_2}}, and rule action {{BLANK_3}}.'

AWS
Allow outbound DNS queries with protocol [1], port [2], and rule action [3].
Drag options to blanks, or click blank then click option'
A6
B53
Callow
Ddeny
Attempts:
3 left
💡 Hint
Common Mistakes
Using deny action instead of allow.
Using wrong port number.
Confusing protocol numbers.