This section aligns with core exam objectives related to DNS architecture and resolution strategies across different deployment models.
Domain 1: Network Design
Task Statement 1.2: Design DNS solutions that satisfy public, private, and hybrid cloud requirements.
DNS translates human-readable domain names into IP addresses and related resources. DNS records store this mapping information, while TTL (Time-to-Live) values control how long responses are cached—shorter TTLs allow faster updates, whereas longer TTLs improve performance by reducing lookup frequency. DNSSEC strengthens DNS by adding cryptographic validation to protect against spoofing and cache poisoning attacks. DNS delegation enables administrative control of subdomains by assigning them to separate authoritative name servers.
Forward DNS resolves domain names to IP addresses, while reverse DNS performs the opposite function using PTR records. In DNS resolution flows, authoritative DNS servers host the actual records, whereas recursive resolvers query authoritative servers on behalf of clients and cache the results.
A and AAAA records map domain names to IPv4 and IPv6 addresses respectively. CNAME records alias one domain to another, while MX records define mail servers. TXT records store metadata such as SPF and DKIM for email security. PTR records support reverse lookups, and NS records delegate subdomains to external or internal DNS providers.
Exam Tips
AWS provides multiple services to observe and troubleshoot DNS behavior. Route 53 Query Logging captures DNS queries and sends them to CloudWatch Logs or Amazon S3 for analysis. AWS CloudTrail records API activity related to Route 53, enabling auditing of configuration changes. VPC Flow Logs help analyze DNS-related network traffic within a VPC, while AWS Security Hub aggregates security findings and highlights potential exposure risks in DNS configurations.
Exam Tips
Route 53 supports Public Hosted Zones for internet-facing name resolution and Private Hosted Zones for internal DNS resolution within VPCs.
Route 53 routing policies determine how DNS responses are returned. Simple routing supports single endpoints, while weighted routing enables traffic distribution for scenarios such as blue/green deployments. Latency-based routing directs users to the lowest-latency region, geolocation routing routes based on user location, and geoproximity routing allows fine-grained distance-based traffic control. Failover routing improves availability by redirecting traffic during outages, and multivalue answer routing returns multiple healthy endpoints without requiring a load balancer.
Alias records integrate tightly with AWS services such as Application Load Balancers, Amazon S3, and CloudFront, support root domains, and avoid additional DNS lookups. CNAME records, while widely supported, cannot be used at the zone apex and introduce an extra resolution step.
Exam Tips
Route 53 commonly integrates with VPC private hosted zones for internal service discovery, with Elastic Load Balancing via Alias records for global traffic distribution, and with API Gateway to support custom API domains. Integration with AWS Global Accelerator further enhances performance by combining DNS-based routing with network-level traffic optimization.
Exam Tips
Route 53 Resolver enables seamless DNS resolution between on-premises networks and AWS. Inbound endpoints allow on-premises systems to resolve AWS private DNS names, while outbound endpoints enable AWS resources to resolve on-premises domains. DNS forwarding rules direct queries to appropriate resolvers in hybrid or multi-cloud environments.
Route 53 supports multi-region failover using health checks and failover routing policies. For multi-account private DNS, Route 53 Resolver combined with AWS Resource Access Manager (RAM) allows shared DNS resolution across accounts.
Exam Tips
Route 53 also acts as a domain registrar for public domains, offering features such as domain locking to prevent unauthorized transfers and WHOIS privacy protection. Domains can be configured for auto-renewal, transferred between registrars, and delegated at the subdomain level using NS records.
Exam Tips
When reviewing scenario-based questions, first identify whether the requirement is for public, private, or hybrid DNS resolution. Look for keywords indicating on-premises integration, cross-region availability, or global traffic routing. Then select the appropriate Route 53 feature or integration.
Choosing the Right DNS Approach