Cloud Networking Essentials: VPCs and Peering Connections Quiz Quiz

Evaluate your understanding of cloud networking fundamentals with this quiz focusing on Virtual Private Clouds (VPCs) and peering connections. Identify key features, best practices, and security considerations for VPC architecture and seamless network integration in cloud environments.

  1. VPC Definition

    Which statement best describes a Virtual Private Cloud (VPC) in cloud networking?

    1. A private, logically isolated section of the cloud where you can define custom networking configurations.
    2. A physical switch connecting different cloud regions.
    3. An encrypted tunnel between data centers.
    4. A virtual machine running network monitoring tools.

    Explanation: A VPC is a logically isolated section within a cloud environment that enables users to customize network settings such as IP ranges and subnets. It is not a physical switch, hence the second option is incorrect. The third option describes a VPN, not a VPC. The fourth option confuses a VPC with a network appliance.

  2. VPC Peering Scenario

    If two VPCs in the same cloud region need to communicate privately without using the internet, which solution should be used?

    1. VPC peering connection
    2. Public subnet routing
    3. Direct internet access
    4. DNS forwarding

    Explanation: A VPC peering connection allows private traffic between VPCs without traversing the internet. Public subnet routing exposes resources to the internet, which is less secure. DNS forwarding handles name resolution, not private communication. Direct internet access increases exposure and is not private.

  3. Peering Limitations

    Which limitation applies to a VPC peering connection?

    1. Data must always pass through the public internet.
    2. You can share security groups directly between VPCs.
    3. VPC peering automatically merges route tables.
    4. Transitive routing is not supported between VPCs.

    Explanation: VPC peering is non-transitive, so a VPC cannot route traffic to another VPC via a peer. Sharing security groups directly is not a default capability; this is a distractor. Peering does not require public internet routing. Route tables must be manually configured, not automatically merged by peering.

  4. Subnet Choices

    When creating a VPC, what is the primary function of defining subnets within it?

    1. Assigning static public IP addresses
    2. Partitioning IP address space for resource organization
    3. Enabling DDoS mitigation by default
    4. Securing network borders with firewalls

    Explanation: Subnets are used to divide the VPC’s IP address range into logical sections for resource placement and management. While subnets help with security, actual border control is handled by firewalls or security lists, not subnets alone. Public IP assignment and DDoS mitigation are separate processes.

  5. CIDR Block Importance

    When configuring a VPC, why is careful selection of the CIDR block important?

    1. Because it controls bandwidth allocation
    2. To ensure route table propagation is automatic
    3. Because it encrypts data in transit by default
    4. To avoid IP address overlap with other networks

    Explanation: Choosing a unique CIDR block avoids IP conflicts, especially when connecting with other networks or peering. CIDR itself does not encrypt data. Route table propagation is not controlled by the CIDR, and bandwidth is managed separately, not by the CIDR block range.

  6. Route Table Updates

    After setting up a VPC peering connection, what must you update to enable network communication between peered VPCs?

    1. Server operating systems
    2. Virtual machine types
    3. DNS records only
    4. Route tables

    Explanation: Route tables need to be updated to direct traffic between peered VPCs. Changing server operating systems or virtual machine types does not affect peering connectivity. DNS records alone do not establish network routing for traffic flow.

  7. Security Best Practices

    Which practice enhances security when using VPC peering?

    1. Using the same CIDR block across peered VPCs
    2. Using network access control lists to restrict traffic between VPCs
    3. Assigning all resources to public subnets
    4. Enabling unrestricted inbound rules for all security groups

    Explanation: Applying network access control lists (ACLs) allows granular control of what traffic can pass between VPCs, strengthening security. Placing all resources in public subnets or allowing unrestricted rules weakens security. Overlapping CIDR blocks prevents proper routing and is a poor practice.

  8. Peering Connection Types

    A company needs to securely connect two VPCs across different cloud network regions. Which peering type is required?

    1. Inter-region VPC peering
    2. Intra-subnet peering
    3. Local peering gateway
    4. External VPN connection

    Explanation: Inter-region peering is designed for VPCs in separate regions, supporting secure connectivity across geographic locations. Local peering only works within the same region. Intra-subnet peering is not a valid term. An external VPN connects external sites, not VPCs within the same provider.

  9. Resource Accessibility

    After establishing a VPC peering connection, what determines which resources are accessible across VPCs?

    1. Automatic discovery settings enabled by default
    2. Whether resources are tagged for public access
    3. The route tables and network access policies defined in each VPC
    4. The amount of disk storage each resource has

    Explanation: Resource accessibility depends on correctly configured route tables and access policies in both VPCs. Disk storage size is unrelated to network access. Resource tags and automatic discovery do not grant network connectivity by default.

  10. VPC Peering Traffic Flow

    Which statement is true about traffic between two VPCs using a peering connection?

    1. Traffic stays within the cloud provider's private network and does not traverse the public internet.
    2. All traffic is inspected by external antivirus services by default.
    3. Traffic is always encrypted end-to-end by default.
    4. Traffic must use a load balancer to cross VPCs.

    Explanation: VPC peering ensures that traffic remains within the provider's private infrastructure and is not exposed to the internet. Encryption must be configured separately; it is not always default. Load balancers are not a requirement for peering. External antivirus inspection is not automatically included.