mediummultiple choiceObjective-mapped

An application runs on EC2 instances in private subnets behind an Application Load Balancer (ALB). Security groups allow inbound HTTPS (443) from the ALB’s security group to the instance security group, and outbound from instances is set to allow ephemeral ports.

Despite this, clients see connection timeouts. After reviewing network ACLs, you find the NACL associated with the instance subnet has an inbound allow for destination port 443, but it does not have a corresponding outbound allow for ephemeral ports.

What is the most likely reason the traffic fails, and what should be updated?

Question 1mediummultiple choice
Full question →

An application runs on EC2 instances in private subnets behind an Application Load Balancer (ALB). Security groups allow inbound HTTPS (443) from the ALB’s security group to the instance security group, and outbound from instances is set to allow ephemeral ports.

Despite this, clients see connection timeouts. After reviewing network ACLs, you find the NACL associated with the instance subnet has an inbound allow for destination port 443, but it does not have a corresponding outbound allow for ephemeral ports.

What is the most likely reason the traffic fails, and what should be updated?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

NACLs are stateless, so you must update the NACL to allow the return (outbound) ephemeral port range; security groups alone cannot override a blocked NACL.

Stateless NACLs require both inbound and outbound rules. Missing outbound for ephemeral ports will block return traffic even if SG rules are correct.

B

Distractor review

NACLs are stateful and automatically track connections; the fix is to add a new inbound rule to the security group for client source ports.

NACLs are stateless; connection tracking occurs at the security group level only. Adding SG inbound rules won’t unblock outbound traffic blocked by the NACL.

C

Distractor review

The issue is caused by ALB health checks; configure a new target group health check on port 80 so traffic can be routed.

Health checks may affect routing, but the symptom points to NACL blocking return packets. Changing health check ports won’t address NACL stateless behavior.

D

Distractor review

Because instances are in private subnets, add a NAT gateway so return traffic can reach the internet over dynamic routing.

NAT affects internet egress, not east-west return paths inside the VPC subnet. The observed NACL rule gap is within the subnet path.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related SAA-C03 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SAA-C03 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: NACLs are stateless, so you must update the NACL to allow the return (outbound) ephemeral port range; security groups alone cannot override a blocked NACL. — Security groups are stateful, but network ACLs are stateless. That means a permitted inbound rule on a NACL does not automatically allow the corresponding outbound return traffic. If the NACL allows inbound to destination port 443 but blocks or omits outbound rules for the ephemeral source ports used by clients/ALB, the TCP handshake or response will fail, causing timeouts. Updating the NACL to include the appropriate outbound ephemeral port range (and often matching inbound/outbound rules) resolves the connectivity issue without weakening security group scoping. Why others are wrong: Option B is incorrect because it states NACLs are stateful; NACLs do not track connections. Option C misattributes the failure to health checks; while health checks matter, they don’t bypass NACL stateless filtering. Option D is irrelevant because NAT is about reaching the internet; the failure is caused by missing NACL outbound permissions within the VPC path for return traffic.

What should I do if I get this SAA-C03 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.