AWS Certified Advanced Networking - Specialty Exam: Opening Protocols for tracepath Command in Linux EC2 Instances

Which Protocols Need to be Opened in Security Groups for tracepath Command in Linux EC2 Instances?

Prev Question Next Question

Question

You have linuxEC2 Instances hosted in AWS.

You want to create scripts that can use the tracepath command.

Which of the following protocols need to be opened up in the Security groups.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

Answer - B.

Tracepath works on the UDP protocol.

For more information on the command , please refer to the below URL:

https://linux.die.net/man/8/tracepath

The tracepath command is used to trace the path of packets from a local Linux machine to a remote destination. It works by sending ICMP Echo Request (ping) packets with increasing Time-to-Live (TTL) values and recording the response time and source of the ICMP Time Exceeded (ICMP Type 11) messages received in response. Therefore, in order to use the tracepath command, the ICMP protocol needs to be enabled in the security group of the EC2 instances.

The correct answer is C. ICMP.

TCP and UDP are transport layer protocols used to transmit data between applications. SSL (Secure Sockets Layer) is a protocol used to encrypt data transmitted over the network. These protocols are not required for the tracepath command.

In summary, to use the tracepath command on Linux EC2 instances hosted in AWS, the ICMP protocol must be allowed in the security group of the instances.