A company has three VPCs in the same AWS region: VPC A (production), VPC B (development), and VPC C (shared services). The VPCs have overlapping CIDR blocks (e.g., VPC A: 10.0.0.0/16, VPC B: 10.0.0.0/16, VPC C: 10.1.0.0/16). The SysOps administrator needs to enable private IP communication between VPC A and VPC C, and between VPC B and VPC C, but not between VPC A and VPC B. The solution must also support a growing number of VPCs in the future. Which AWS service should be used?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
Use AWS Transit Gateway with attachment route tables that isolate traffic between VPCs, ensuring that VPC A and VPC B routes are separate.
Transit Gateway can segregate traffic using separate route tables, but overlapping CIDR blocks (VPC A and VPC B both have 10.0.0.0/16) cause routing ambiguity. While the route tables can prevent direct communication, traffic destined to VPC C (unique CIDR) works, but the overlapping issue complicates routing and may lead to unpredictable behavior. Transit Gateway is not recommended for overlapping CIDRs.
Best answer
Use AWS PrivateLink by creating a Network Load Balancer in VPC C and configuring VPC endpoints in VPC A and VPC B to access the services.
AWS PrivateLink allows you to expose services in VPC C via a Network Load Balancer, and VPC A and VPC B can create interface VPC endpoints to connect to those services privately. This works even with overlapping CIDRs because the endpoints are assigned specific private IP addresses from the VPC's subnet and traffic is directed using endpoint-specific routing. It also scales well with additional VPCs.
Distractor review
Create two VPC peering connections: one between VPC A and VPC C, and one between VPC B and VPC C.
VPC peering does not support overlapping CIDR blocks. If VPC A and VPC B both have CIDR 10.0.0.0/16, they cannot peer with VPC C if VPC C's CIDR also overlaps? VPC C is 10.1.0.0/16, no overlap. The peering between VPC A and VPC C would work, but VPC A's route table would need a route to VPC C (10.1.0.0/16) via the peering connection. However, if VPC A has a subnet 10.0.0.0/24, and VPC B has a subnet 10.0.1.0/24, traffic from VPC A to 10.0.1.0/24 would be sent to the peering connection if a route exists, but that's only for VPC C? This is messy. VPC peering requires non-overlapping CIDRs to function correctly because if VPC A has 10.0.0.0/16 and tries to reach 10.0.1.0/24 (which is in VPC B, but they are not peered), it will route locally. But with VPC C, peering is fine. However, VPC peering does not scale well for many VPCs as it requires full mesh or hub-and-spoke. This option is valid but less scalable and may have issues if future VPCs have overlapping CIDRs.
Distractor review
Set up two AWS Site-to-Site VPN connections from VPC C to VPC A and VPC B using virtual private gateways.
Site-to-Site VPN is designed for connecting on-premises networks to AWS, not for VPC-to-VPC connectivity. While it could technically work, it is not optimal for within-region VPC connectivity due to higher latency, cost, and complexity. Also, overlapping CIDRs still cause routing issues.
Common exam trap
Common exam trap: usable hosts are not the same as total addresses
Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.
Technical deep dive
How to think about this question
Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.
KKey Concepts to Remember
- CIDR notation defines the prefix length.
- Block size helps identify subnet boundaries.
- Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
- The required host count determines the smallest suitable subnet.
TExam Day Tips
- Write the block size before choosing the subnet.
- Check whether the question asks for hosts, subnets or a specific address range.
- Do not confuse /24, /25, /26 and /27 host counts.
Related practice questions
Related SOA-C02 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A company uses Amazon CloudFront to deliver content to a global audience. The origin is an Application Load Balancer in us-east-1. The SysOps administrator wants to reduce costs by minimizing the number of requests that reach the origin server. Which action should the administrator take?
Question 2
A company runs a batch processing application on Amazon EC2 that runs for 2 hours every night. The workload can tolerate interruptions. Which EC2 purchasing option provides the lowest cost for this use case?
Question 3
A SysOps administrator needs to monitor the CPU utilization of an Amazon RDS DB instance and receive an alarm when CPU utilization exceeds 80% for 5 consecutive minutes. Which AWS service should be used to create this alarm?
Question 4
A company runs a critical web application on Amazon EC2 instances in an Auto Scaling group behind an Application Load Balancer (ALB). The application uses session stickiness (sticky sessions) to maintain user sessions. The SysOps administrator notices that when instances are replaced during a scale-in or failure event, users lose their session data. The administrator needs to preserve session data across instance failures without losing stickiness benefits. What should the administrator do?
Question 5
A company runs a production web application on a single Amazon EC2 instance. The application experiences a predictable and steady workload 24/7. The SysOps administrator wants to minimize compute costs for this instance while ensuring it remains available during the expected workload. Which EC2 purchasing option should the administrator use?
Question 6
A company has a VPC with public and private subnets. The private subnets host application servers that need to make outbound HTTPS connections to the internet. The SysOps administrator must implement a solution that provides outbound internet connectivity while preventing inbound connections from the internet. Additionally, the solution must allow the company to control which domains the application servers can access. Which solution should the administrator implement?
FAQ
Questions learners often ask
What does this SOA-C02 question test?
CIDR notation defines the prefix length.
What is the correct answer to this question?
The correct answer is: Use AWS PrivateLink by creating a Network Load Balancer in VPC C and configuring VPC endpoints in VPC A and VPC B to access the services. — VPC peering does not support overlapping CIDR blocks. AWS Transit Gateway supports multiple VPC attachments and can route traffic based on route tables, but it still cannot resolve overlapping IP addresses; you cannot have two VPCs with identical CIDR blocks communicating directly because the Transit Gateway would not know which VPC to forward traffic to for a given IP. However, the question says VPC A and VPC B both have 10.0.0.0/16, and they do not need to communicate directly. VPC C has 10.1.0.0/16, so VPC C is unique. VPC A and VPC B can each connect to VPC C as long as they use different route tables. But the overlapping CIDR issue still exists: if VPC A sends traffic to an IP in 10.0.0.0/16, Transit Gateway would route based on the most specific route; but since both VPC A and VPC B use the same CIDR, the Transit Gateway cannot distinguish. However, for traffic from VPC A to VPC C (which is 10.1.0.0/16) there is no conflict. Similarly from VPC B to VPC C. The problem arises if VPC A wants to reach an IP in 10.0.0.0/16 that might be in VPC B, but that is not required. Transit Gateway can handle this by using different route tables for VPC A and VPC B: each route table will have a route for 10.1.0.0/16 pointing to the VPC C attachment, and a route for the local VPC's CIDR pointing to the local attachment (or blackhole). But VPC A's route table might have a route for 10.0.0.0/16 pointing to local, but if VPC A tries to reach an IP in 10.0.0.x, it will be routed locally within VPC A. So Transit Gateway can work. However, AWS recommends that for overlapping CIDRs, you use solutions like NAT or PrivateLink, but Transit Gateway has limitations. The better answer for today's AWS architecture is to use AWS PrivateLink to allow VPC A and VPC B to access services in VPC C via Network Load Balancer endpoints. This avoids routing issues due to overlapping CIDRs and is scalable. Transit Gateway with Network Manager could work, but overlapping CIDRs are not recommended and require careful route table design and may cause asymmetric routing. The question says 'supports growing number of VPCs' - Transit Gateway is designed for that. But given the overlapping CIDR issue, PrivateLink or VPN might be more appropriate. However, PrivateLink requires services in VPC C to be exposed via NLB and endpoints in VPC A and B. This is a valid solution and avoids CIDR overlap. AWS PrivateLink supports inter-VPC communication without peering or transit gateway, and it works with overlapping CIDRs because it uses private IP addresses in the endpoint's subnet. So this is likely the correct answer. Option: Use AWS PrivateLink with Network Load Balancers in VPC C and VPC endpoints in VPC A and VPC B. That meets all requirements.
What should I do if I get this SOA-C02 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.