mediummultiple choiceObjective-mapped

A microservice runs in private subnets with no NAT gateway. It must retrieve a secret from AWS Secrets Manager. Security requires that traffic to Secrets Manager stays within AWS’s private network (no public internet egress). The IAM role already grants secretsmanager:GetSecretValue for the needed secret. What is the best network setup to meet the requirement?

Question 1mediummultiple choice
Full question →

A microservice runs in private subnets with no NAT gateway. It must retrieve a secret from AWS Secrets Manager. Security requires that traffic to Secrets Manager stays within AWS’s private network (no public internet egress). The IAM role already grants secretsmanager:GetSecretValue for the needed secret. What is the best network setup to meet the requirement?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Create an Interface VPC Endpoint for Secrets Manager (com.amazonaws.<region>.secretsmanager) and allow it via the endpoint security group; optionally enable private DNS.

Interface VPC Endpoints provide private IP connectivity from the VPC to the Secrets Manager service without routing through a NAT gateway or an Internet Gateway. The calls remain within AWS networking and still use standard TLS to the service endpoint.

B

Distractor review

Create an S3 Gateway VPC endpoint and use it for Secrets Manager requests because both services use HTTPS.

Gateway VPC endpoints are service-specific (for S3 and a limited set of related services) and do not provide connectivity for Secrets Manager API calls. HTTPS does not make an S3 endpoint usable for other services.

C

Distractor review

Assign a public IP address to the tasks so they can call Secrets Manager over the internet without NAT.

Using public IPs introduces public internet egress, which violates the requirement to keep Secrets Manager traffic within AWS private networking.

D

Distractor review

Change the route table to send all 0.0.0.0/0 traffic directly to an Internet Gateway.

Routing general traffic to an Internet Gateway creates public internet egress, directly conflicting with the requirement to avoid public internet paths.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related SAA-C03 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SAA-C03 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Create an Interface VPC Endpoint for Secrets Manager (com.amazonaws.<region>.secretsmanager) and allow it via the endpoint security group; optionally enable private DNS. — To access Secrets Manager from private subnets without NAT or public internet egress, create an Interface VPC Endpoint for Secrets Manager. This provides private connectivity from the VPC to the Secrets Manager endpoint, so secretsmanager:GetSecretValue calls do not require public routing. IAM permissions are already in place; the missing requirement is private network reachability to the service, which the Interface Endpoint (and optionally private DNS) provides. A Gateway VPC endpoint for S3 cannot authorize or route Secrets Manager API traffic. Public IPs and default routes through an Internet Gateway both create public internet egress, violating the constraint. The correct mechanism for private connectivity to Secrets Manager is an Interface VPC Endpoint.

What should I do if I get this SAA-C03 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.