More Test Questions - 5 Flashcards

1
Q

A Solutions Architect has deployed an API using Amazon API Gateway and created usage plans and API keys for several customers. Requests from one particular customer have been excessive and the solutions architect needs to limit the rate of requests. Other customers should not be affected. How should the solutions architect proceed?

1: Configure a server-side throttling limit
2: Configure the per-method throttling limits
3: Configure per-client throttling limits
4: Configure the account-level throttling limits

A

1: Configure a server-side throttling limit
2: Configure the per-method throttling limits

3: Configure per-client throttling limits

4: Configure the account-level throttling limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Solutions Architect is deploying a high performance computing (HPC) application on Amazon EC2 instances. The application requires extremely low inter-instance latency. How should the instances be deployed for BEST performance?

1: Use an instance with enhanced networking and deploy the instances in a partition placement group
2: Use an Elastic Fabric Adapter (EFA) and deploy instances in a cluster placement group
3: Add multiple Elastic Network Adapters (ENAs) to each instance and create a NIC team
4: Use an EBS-optimized instance with 10 Gigabit networking and deploy to a single subnet

A

1: Use an instance with enhanced networking and deploy the instances in a partition placement group

2: Use an Elastic Fabric Adapter (EFA) and deploy instances in a cluster placement group

3: Add multiple Elastic Network Adapters (ENAs) to each instance and create a NIC team
4: Use an EBS-optimized instance with 10 Gigabit networking and deploy to a single subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company has deployed an API using Amazon API Gateway. There are many repeat requests and a solutions architect has been asked to implement measures to reduce request latency and the number of calls to the Amazon EC2 endpoint. How can this be most easily achieved?

1: Create a cache for a stage and configure a TTL
2: Create a cache for a method and configure a TTL
3: Configure an edge-optimized endpoint with CloudFront
4: Configure a private endpoint place ElastiCache in front

A

1: Create a cache for a stage and configure a TTL

2: Create a cache for a method and configure a TTL
3: Configure an edge-optimized endpoint with CloudFront
4: Configure a private endpoint place ElastiCache in front

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Solutions Architect is designing a migration strategy for a company moving to the AWS Cloud. The company use a shared Microsoft filesystem that uses Distributed File System Namespaces (DFSN). What will be the MOST suitable migration strategy for the filesystem?

1: Use the AWS Server Migration Service to migrate to an Amazon S3 bucket
2: Use the AWS Server Migration Service to migrate to Amazon FSx for Lustre
3: Use AWS DataSync to migrate to an Amazon EFS filesystem
4: Use AWS DataSync to migrate to Amazon FSx for Windows File Server

A

1: Use the AWS Server Migration Service to migrate to an Amazon S3 bucket
2: Use the AWS Server Migration Service to migrate to Amazon FSx for Lustre
3: Use AWS DataSync to migrate to an Amazon EFS filesystem

4: Use AWS DataSync to migrate to Amazon FSx for Windows File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An Amazon ElastiCache for Redis cluster runs across multiple Availability Zones. A solutions architect is concerned about the security of sensitive data as it is replicated between nodes. How can the solutions architect protect the sensitive data?

1: Issue a Redis AUTH command
2: Enable in-transit encryption
3: Enable at-rest encryption
4: Set up MFA and API logging

A

1: Issue a Redis AUTH command

2: Enable in-transit encryption

3: Enable at-rest encryption
4: Set up MFA and API logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company runs an application on-premises that must consume a REST API running on Amazon API Gateway. The company has an AWS Direct Connect connection to their Amazon VPC. The solutions architect wants all API calls to use private addressing only and avoid the internet. How can this be achieved?

1: Use a transit virtual interface and an AWS VPN to create a secure tunnel to Amazon API Gateway
2: Use a private virtual interface and create a VPC Endpoint for Amazon API Gateway
3: Use a hosted virtual interface and create a VPC Endpoint for Amazon API Gateway
4: Use a public virtual interface and an AWS VPN to create a secure tunnel to Amazon API Gateway

A

1: Use a transit virtual interface and an AWS VPN to create a secure tunnel to Amazon API Gateway

2: Use a private virtual interface and create a VPC Endpoint for Amazon API Gateway

3: Use a hosted virtual interface and create a VPC Endpoint for Amazon API Gateway
4: Use a public virtual interface and an AWS VPN to create a secure tunnel to Amazon API Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company has an eCommerce application that runs from multiple AWS Regions. Each region has a separate database running on Amazon EC2 instances. The company plans to consolidate the data to a columnar database and run analytics queries. Which approach should the company take?

1: Run an AWS Batch job to copy and process the data into a columnar Amazon RDS database. Use Amazon Athena to analyze the data
2: Use the COPY command to load data into an Amazon RedShift data warehouse and run the analytics queries there
3: Launch Amazon Kinesis Data Streams producers to load data into a Kinesis Data stream. Use Kinesis Data Analytics to analyze the data
4: Create an AWS Lambda function that copies the data onto Amazon S3. Use Amazon S3 Select to query the data

A

1: Run an AWS Batch job to copy and process the data into a columnar Amazon RDS database. Use Amazon Athena to analyze the data

2: Use the COPY command to load data into an Amazon RedShift data warehouse and run the analytics queries there

3: Launch Amazon Kinesis Data Streams producers to load data into a Kinesis Data stream. Use Kinesis Data Analytics to analyze the data
4: Create an AWS Lambda function that copies the data onto Amazon S3. Use Amazon S3 Select to query the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There has been an increase in traffic to an application that writes data to an Amazon DynamoDB database. Thousands of random tables reads occur per second and low-latency is required. What can a Solutions Architect do to improve performance for the reads without negatively impacting the rest of the application?

1: Increase the number of Amazon DynamoDB write capacity units
2: Add an Amazon SQS queue to decouple the requests
3: Use Amazon DynamoDB Accelerator to cache the reads
4: Use an Amazon Kinesis Data Stream to decouple requests

A

1: Increase the number of Amazon DynamoDB write capacity units
2: Add an Amazon SQS queue to decouple the requests

3: Use Amazon DynamoDB Accelerator to cache the reads

4: Use an Amazon Kinesis Data Stream to decouple requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Solutions Architect must enable an application to download software updates from the internet. The application runs on a series of EC2 instances in an Auto Scaling group running in a private subnet. The solution must involve minimal ongoing systems management effort. How should the Solutions Architect proceed?

1: Implement a NAT gateway
2: Launch a NAT instance
3: Create a Virtual Private Gateway
4: Attach Elastic IP addresses

A

1: Implement a NAT gateway

2: Launch a NAT instance
3: Create a Virtual Private Gateway
4: Attach Elastic IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Solutions Architect manages multiple Amazon RDS MySQL databases. To improve security, the Solutions Architect wants to enable secure user access with short-lived credentials. How can these requirements be met?

1: Configure the MySQL databases to use the AWS Security Token Service (STS)
2: Configure the application to use the AUTH command to send a unique password
3: Create the MySQL user accounts to use the AWSAuthenticationPlugin with IAM
4: Configure the MySQL databases to use AWS KMS data encryption keys

A

1: Configure the MySQL databases to use the AWS Security Token Service (STS)
2: Configure the application to use the AUTH command to send a unique password

3: Create the MySQL user accounts to use the AWSAuthenticationPlugin with IAM

4: Configure the MySQL databases to use AWS KMS data encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An application running a private subnet of an Amazon VPC must have outbound internet access for downloading updates. The Solutions Architect does not want the application exposed to inbound connection attempts. Which steps should be taken?

1: Create a NAT gateway but do not create attach an internet gateway to the VPC
2: Attach an internet gateway to the private subnet and create a NAT gateway
3: Attach an internet gateway to the VPC but do not create a NAT gateway
4: Create a NAT gateway and attach an internet gateway to the VPC

A

1: Create a NAT gateway but do not create attach an internet gateway to the VPC
2: Attach an internet gateway to the private subnet and create a NAT gateway
3: Attach an internet gateway to the VPC but do not create a NAT gateway

4: Create a NAT gateway and attach an internet gateway to the VPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An application has been migrated from on-premises to an Amazon EC2 instance. The migration has failed to an unknown dependency that the application must communicate with an on-premises server using private IP addresses. Which action should a solutions architect take to quickly provision the necessary connectivity?

1: Setup an AWS Direct Connect connection
2: Configure a Virtual Private Gateway
3: Create an Amazon CloudFront distribution
4: Create an AWS Transit Gateway

A

1: Setup an AWS Direct Connect connection

2: Configure a Virtual Private Gateway

3: Create an Amazon CloudFront distribution
4: Create an AWS Transit Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company runs an API on a Linux server in their on-premises data center. The company are planning to migrate the API to the AWS cloud. The company require a highly available, scalable and cost-effective solution. What should a Solutions Architect recommend?

1: Migrate the API to Amazon API Gateway and migrate the backend to Amazon EC2
2: Migrate the API server to Amazon EC2 instances in an Auto Scaling group and attach an Application Load Balancer
3: Migrate the API to Amazon API Gateway and use AWS Lambda as the backend
4: Migrate the API to Amazon CloudFront and use AWS Lambda as the origin

A

1: Migrate the API to Amazon API Gateway and migrate the backend to Amazon EC2
2: Migrate the API server to Amazon EC2 instances in an Auto Scaling group and attach an Application Load Balancer

3: Migrate the API to Amazon API Gateway and use AWS Lambda as the backend

4: Migrate the API to Amazon CloudFront and use AWS Lambda as the origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An application that is being installed on an Amazon EC2 instance requires a persistent block storage volume. The data must be encrypted at rest and regular volume-level backups must be automated. Which solution options should be used?

1: Use an encrypted Amazon EBS volume and use Data Lifecycle Manager to automate snapshots
2: Use an encrypted Amazon EFS filesystem and use an Amazon CloudWatch Events rule to start a backup copy of data using AWS Lambda
3: Use server-side encryption on an Amazon S3 bucket and use Cross-Region-Replication to backup on a schedule
4: Use an encrypted Amazon EC2 instance store and copy the data to another EC2 instance using a cron job and a batch script

A

1: Use an encrypted Amazon EBS volume and use Data Lifecycle Manager to automate snapshots

2: Use an encrypted Amazon EFS filesystem and use an Amazon CloudWatch Events rule to start a backup copy of data using AWS Lambda
3: Use server-side encryption on an Amazon S3 bucket and use Cross-Region-Replication to backup on a schedule
4: Use an encrypted Amazon EC2 instance store and copy the data to another EC2 instance using a cron job and a batch script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company has several AWS accounts each with multiple Amazon VPCs. The company must establish routing between all private subnets. The architecture should be simple and allow transitive routing to occur. How should the network connectivity be configured?

1: Create a transitive VPC peering connection between each Amazon VPC and configure route tables
2: Create an AWS Transit Gateway and share it with each account using AWS Resource Access Manager
3: Create an AWS Managed VPN between each Amazon VPC and configure route tables
4: Create a hub-and-spoke topology with AWS App Mesh and use AWS Resource Access Manager to share route tables

A

1: Create a transitive VPC peering connection between each Amazon VPC and configure route tables

2: Create an AWS Transit Gateway and share it with each account using AWS Resource Access Manager

3: Create an AWS Managed VPN between each Amazon VPC and configure route tables
4: Create a hub-and-spoke topology with AWS App Mesh and use AWS Resource Access Manager to share route tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An organization is planning their disaster recovery solution. They would like to keep their core business critical systems running in the cloud. Other services can be replicated but switched off. Which DR strategy should a Solutions Architect recommend?

1: Backup and restore
2: Pilot light
3: Warm standby
4: Multi-site

A

1: Backup and restore
2: Pilot light

3: Warm standby

4: Multi-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An application analyzes images of people that are uploaded to an Amazon S3 bucket. The application determines demographic data which is then saved to a .CSV file in another S3 bucket. The data must be encrypted at rest and then queried using SQL. The solution should be fully serverless. Which actions should a Solutions Architect take to encrypt and query the data?

1: Use Amazon S3 server-side encryption and use Amazon RedShift Spectrum to query the data
2: Use AWS KMS encryption keys for the S3 bucket and use Amazon Athena to query the data
3: Use AWS KMS encryption keys for the S3 bucket and use Amazon Kinesis Data Analytics to query the data
4: Use Amazon S3 server-side encryption and Amazon QuickSight to query the data

A

1: Use Amazon S3 server-side encryption and use Amazon RedShift Spectrum to query the data

2: Use AWS KMS encryption keys for the S3 bucket and use Amazon Athena to query the data

3: Use AWS KMS encryption keys for the S3 bucket and use Amazon Kinesis Data Analytics to query the data
4: Use Amazon S3 server-side encryption and Amazon QuickSight to query the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A large quantity of data is stored on a NAS device on-premises and accessed using the SMB protocol. The company require a managed service for hosting the filesystem and a tool to automate the migration. Which actions should a Solutions Architect take?

1: Migrate the data to Amazon EFS using the AWS Server Migration Service (SMS)
2: Migrate the data to Amazon FSx for Lustre using AWS DataSync
3: Migrate the data to Amazon FSx for Windows File Server using AWS DataSync
4: Migrate the data to Amazon S3 using and AWS Snowball Edge device

A

1: Migrate the data to Amazon EFS using the AWS Server Migration Service (SMS)
2: Migrate the data to Amazon FSx for Lustre using AWS DataSync

3: Migrate the data to Amazon FSx for Windows File Server using AWS DataSync

4: Migrate the data to Amazon S3 using and AWS Snowball Edge device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The database layer of an on-premises web application is being migrated to AWS. The database uses a multi-threaded, in-memory caching layer to improve performance for repeated queries. Which service would be the most suitable replacement for the database cache?

1: Amazon ElastiCache Redis
2: Amazon DynamoDB DAX
3: Amazon ElastiCache Memcached
4: Amazon RDS MySQL

A

1: Amazon ElastiCache Redis
2: Amazon DynamoDB DAX

3: Amazon ElastiCache Memcached

4: Amazon RDS MySQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Solutions Architect is designing an application for processing and extracting data from log files. The log files are generated by an application and the number and frequency of updates varies. The files are up to 1 GB in size and processing will take around 40 seconds for each file. Which solution is the most cost-effective?

1: Write the log files to an Amazon EC2 instance with an attached EBS volume. After processing, save the files to an Amazon S3 bucket
2: Write the log files to an Amazon SQS queue. Use AWS Lambda to process the files from the queue and save to an Amazon S3 bucket
3: Write the log files to an Amazon S3 bucket. Create an event notification to invoke an Amazon ECS task to process the files and save to an Amazon S3 bucket
4: Write the log files to an Amazon S3 bucket. Create an event notification to invoke an AWS Lambda function that will process the files

A

1: Write the log files to an Amazon EC2 instance with an attached EBS volume. After processing, save the files to an Amazon S3 bucket
2: Write the log files to an Amazon SQS queue. Use AWS Lambda to process the files from the queue and save to an Amazon S3 bucket
3: Write the log files to an Amazon S3 bucket. Create an event notification to invoke an Amazon ECS task to process the files and save to an Amazon S3 bucket

4: Write the log files to an Amazon S3 bucket. Create an event notification to invoke an AWS Lambda function that will process the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A large multinational retail company has a presence in AWS in multiple regions. The company has established a new office and needs to implement a high-bandwidth, low-latency connection to multiple VPCs in multiple regions within the same account. The VPCs each have unique CIDR ranges. What would be the optimum solution design using AWS technology? (Select TWO)

1: Configure AWS VPN CloudHub
2: Create a Direct Connect gateway, and create private VIFs to each region
3: Provision an MPLS network
4: Implement Direct Connect connections to each AWS region
5: Implement a Direct Connect connection to the closest AWS region

A

1: Configure AWS VPN CloudHub

2: Create a Direct Connect gateway, and create private VIFs to each region

3: Provision an MPLS network
4: Implement Direct Connect connections to each AWS region

5: Implement a Direct Connect connection to the closest AWS region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Solutions Architect is creating a design for a two-tier application with a MySQL RDS back-end. The performance requirements of the database tier are hard to quantify until the application is running and the Architect is concerned about right-sizing the database. What methods of scaling are possible after the MySQL RDS database is deployed? (Select TWO)

1: Vertical scaling for read and write by choosing a larger instance size
2: Horizontal scaling for write capacity by enabling Multi-AZ
3: Vertical scaling for read and write by using Transfer Acceleration
4: Horizontal scaling for read and write by enabling Multi-Master RDS DB
5: Horizontal scaling for read capacity by creating a read-replica

A

1: Vertical scaling for read and write by choosing a larger instance size

2: Horizontal scaling for write capacity by enabling Multi-AZ
3: Vertical scaling for read and write by using Transfer Acceleration
4: Horizontal scaling for read and write by enabling Multi-Master RDS DB

5: Horizontal scaling for read capacity by creating a read-replica

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An application is running on EC2 instances in a private subnet of an Amazon VPC. A Solutions Architect would like to connect the application to Amazon API Gateway. For security reasons, it is necessary to ensure that no traffic traverses the Internet and to ensure all traffic uses private IP addresses only. How can this be achieved?

1: Create a NAT gateway
2: Create a public VIF on a Direct Connect connection
3: Create a private API using an interface VPC endpoint
4: Add the API gateway to the subnet the EC2 instances are located in

A

1: Create a NAT gateway
2: Create a public VIF on a Direct Connect connection

3: Create a private API using an interface VPC endpoint

4: Add the API gateway to the subnet the EC2 instances are located in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An application stack is being created which needs a message bus to decouple the application components from each other. The application will generate up to 300 messages per second without using batching. A Solutions Architect needs to ensure that a message is delivered only once and duplicates are not introduced into the queue. It is not necessary to maintain the order of the messages. Which SQS queue type should be used?

1: Standard queues
2: Long polling queues
3: FIFO queues
4: Auto Scaling queues

A

1: Standard queues
2: Long polling queues

3: FIFO queues

4: Auto Scaling queues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A Solutions Architect is attempting to clean up unused EBS volumes and snapshots to save some space and cost. How many of the most recent snapshots of an EBS volume need to be maintained to guarantee that you can recreate the full EBS volume from the snapshot?

1: You must retain all snapshots as the process is incremental and therefore data is required from each snapshot
2: Two snapshots, the oldest and most recent snapshots
3: The oldest snapshot, as this references data in all other snapshots
4: Only the most recent snapshot. Snapshots are incremental, but the deletion process will ensure that no data is lost

A

1: You must retain all snapshots as the process is incremental and therefore data is required from each snapshot
2: Two snapshots, the oldest and most recent snapshots
3: The oldest snapshot, as this references data in all other snapshots

4: Only the most recent snapshot. Snapshots are incremental, but the deletion process will ensure that no data is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A Python application is currently running on Amazon ECS containers using the Fargate launch type. An ALB has been created with a Target Group that routes incoming connections to the ECS-based application. The application will be used by consumers who will authenticate using federated OIDC compliant Identity Providers such as Google and Facebook. The users must be securely authenticated on the front-end before they access the secured portions of the application. How can this be configured using an ALB?

1: The only option is to use SAML with Amazon Cognito on the ALB
2: This can be done on the ALB by creating an authentication action on a listener rule that configures an Amazon Cognito user pool with the social IdP
3: This cannot be done on an ALB; you’ll need to authenticate users on the back-end with AWS Single Sign-On (SSO) integration
4: This cannot be done on an ALB; you’ll need to use another layer in front of the ALB

A

1: The only option is to use SAML with Amazon Cognito on the ALB

2: This can be done on the ALB by creating an authentication action on a listener rule that configures an Amazon Cognito user pool with the social IdP

3: This cannot be done on an ALB; you’ll need to authenticate users on the back-end with AWS Single Sign-On (SSO) integration
4: This cannot be done on an ALB; you’ll need to use another layer in front of the ALB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A Solutions Architect is creating a solution for an application that must be deployed on Amazon EC2 hosts that are dedicated to the client. Instance placement must be automatic and billing should be per instance. Which type of EC2 deployment model should be used?

1: Reserved Instance
2: Dedicated Instance
3: Dedicated Host
4: Cluster Placement Group

A

1: Reserved Instance

2: Dedicated Instance

3: Dedicated Host
4: Cluster Placement Group

28
Q

There is new requirement for a database that will store a large number of records for an online store. You are evaluating the use of DynamoDB. Which of the following are AWS best practices for DynamoDB? (Select TWO)

1: Use separate local secondary indexes for each item
2: Store objects larger than 400KB in S3 and use pointers in DynamoDB
3: Store more frequently and less frequently accessed data in separate tables
4: Use for BLOB data use cases 5: Use large files

A

1: Use separate local secondary indexes for each item

2: Store objects larger than 400KB in S3 and use pointers in DynamoDB

3: Store more frequently and less frequently accessed data in separate tables

4: Use for BLOB data use cases 5: Use large files

29
Q

A Solutions Architect needs to migrate an Oracle database running on RDS onto Amazon RedShift to improve performance and reduce cost. What combination of tasks using AWS services should be followed to execute the migration? (Select TWO)

1: Migrate the database using the AWS Database Migration Service (DMS)
2: Convert the schema using the AWS Schema Conversion Tool
3: Take a snapshot of the Oracle database and restore the snapshot onto RedShift
4: Configure API Gateway to extract, transform and load the data into RedShift
5: Enable log shipping from the Oracle database to RedShift

A

1: Migrate the database using the AWS Database Migration Service (DMS)

2: Convert the schema using the AWS Schema Conversion Tool

3: Take a snapshot of the Oracle database and restore the snapshot onto RedShift
4: Configure API Gateway to extract, transform and load the data into RedShift
5: Enable log shipping from the Oracle database to RedShift

30
Q

A client has made some updates to their web application. The application uses an Auto Scaling Group to maintain a group of several EC2 instances. The application has been modified and a new AMI must be used for launching any new instances. What does a Solutions Architect need to do to add the new AMI?

1: Create a new target group that uses a new launch configuration with the new AMI
2: Modify the existing launch configuration to add the new AMI
3: Suspend Auto Scaling and replace the existing AMI
4: Create a new launch configuration that uses the AMI and update the ASG to use the new launch configuration

A

1: Create a new target group that uses a new launch configuration with the new AMI
2: Modify the existing launch configuration to add the new AMI
3: Suspend Auto Scaling and replace the existing AMI

4: Create a new launch configuration that uses the AMI and update the ASG to use the new launch configuration

31
Q

A Solutions Architect regularly deploys and manages infrastructure services for customers on AWS. The SysOps team are facing challenges in tracking changes that are made to the infrastructure services and rolling back when problems occur. How can a Solutions Architect BEST assist the SysOps team?

1: Use AWS Systems Manager to manage all updates to the infrastructure services
2: Use CodeDeploy to manage version control for the infrastructure services
3: Use CloudFormation templates to deploy and manage the infrastructure services
4: Use Trusted Advisor to record updates made to the infrastructure services

A

1: Use AWS Systems Manager to manage all updates to the infrastructure services
2: Use CodeDeploy to manage version control for the infrastructure services

3: Use CloudFormation templates to deploy and manage the infrastructure services

4: Use Trusted Advisor to record updates made to the infrastructure services

32
Q

A Solutions Architect is designing the compute layer of a serverless application. The compute layer will manage requests from external systems, orchestrate serverless workflows, and execute the business logic. The Architect needs to select the most appropriate AWS services for these functions. Which services should be used for the compute layer? (Select TWO)

1: Use Amazon ECS for executing the business logic
2: Use AWS CloudFormation for orchestrating serverless workflows
3: Use AWS Step Functions for orchestrating serverless workflows
4: Use AWS Elastic Beanstalk for executing the business logic
5: Use Amazon API Gateway with AWS Lambda for executing the business logic

A

1: Use Amazon ECS for executing the business logic
2: Use AWS CloudFormation for orchestrating serverless workflows

3: Use AWS Step Functions for orchestrating serverless workflows

4: Use AWS Elastic Beanstalk for executing the business logic

5: Use Amazon API Gateway with AWS Lambda for executing the business logic

33
Q

An application running in an on-premise data center writes data to a MySQL database. A Solutions Architect is re-architecting the application and plans to move the database layer into the AWS cloud on Amazon RDS. The application layer will run in the on-premise data center. What must be done to connect the application to the RDS database via the Internet? (Select TWO)

1: Configure a NAT Gateway and attach the RDS database
2: Choose to make the RDS instance publicly accessible and place it in a public subnet
3: Select a public IP within the DB subnet group to assign to the RDS instance
4: Create a security group allowing access from the on-premise public IP to the RDS instance and assign to the RDS instance
5: Create a DB subnet group that is publicly accessible

A

1: Configure a NAT Gateway and attach the RDS database

2: Choose to make the RDS instance publicly accessible and place it in a public subnet

3: Select a public IP within the DB subnet group to assign to the RDS instance

4: Create a security group allowing access from the on-premise public IP to the RDS instance and assign to the RDS instance

5: Create a DB subnet group that is publicly accessible

34
Q

A Solutions Architect is conducting an audit and needs to query several properties of EC2 instances in a VPC. Which two methods are available for accessing and querying the properties of an EC2 instance such as instance ID, public keys and network interfaces? (Select TWO)

1: Use the EC2 Config service
2: Run the command “curl http://169.254.169.254/latest/meta-data/”
3: Download and run the Instance Metadata Query Tool
4: Run the command “curl http://169.254.169.254/latest/dynamic/instance-identity/”
5: Use the Batch command

A

1: Use the EC2 Config service

2: Run the command “curl http://169.254.169.254/latest/meta-data/”

3: Download and run the Instance Metadata Query Tool

4: Run the command “curl http://169.254.169.254/latest/dynamic/instance-identity/”
5: Use the Batch command

35
Q

Encrypted Amazon Elastic Block Store (EBS) volumes are attached to some Amazon EC2 instances. Which statements are correct about using encryption with Amazon EBS volumes? (Select TWO)

1: Data is only encrypted at rest
2: Encryption is supported on all Amazon EBS volume types
3: Data in transit between an instance and an encrypted volume is also encrypted
4: Volumes created from encrypted snapshots are unencrypted
5: You cannot mix encrypted with unencrypted volumes on an instance

A

1: Data is only encrypted at rest

2: Encryption is supported on all Amazon EBS volume types

3: Data in transit between an instance and an encrypted volume is also encrypted

4: Volumes created from encrypted snapshots are unencrypted
5: You cannot mix encrypted with unencrypted volumes on an instance

36
Q

An operations team would like to be notified if an RDS database exceeds certain metric thresholds. How can a Solutions Architect automate this process for the operations team?

1: Create a CloudWatch alarm and associate an SQS queue with it that delivers a message to SES
2: Setup an RDS alarm and associate an SNS topic with it that sends an email
3: Create a CloudTrail alarm and configure a notification event to send an SMS
4: Create a CloudWatch alarm and associate an SNS topic with it that sends an email notification

A

1: Create a CloudWatch alarm and associate an SQS queue with it that delivers a message to SES
2: Setup an RDS alarm and associate an SNS topic with it that sends an email
3: Create a CloudTrail alarm and configure a notification event to send an SMS

4: Create a CloudWatch alarm and associate an SNS topic with it that sends an email notification

37
Q

An Amazon VPC contains a mixture of Amazon EC2 instances in production and non-production environments. A Solutions Architect needs to devise a way to segregate access permissions to different sets of users for instances in different environments. How can this be achieved? (Select TWO)

1: Attach an Identity Provider (IdP) and delegate access to the instances to the relevant groups
2: Create an IAM policy that grants access to any instances with the specific tag and attach to the users and groups
3: Create an IAM policy with a conditional statement that matches the environment variables
4: Add an environment variable to the instances using user data
5: Add a specific tag to the instances you want to grant the users or groups access to

A

1: Attach an Identity Provider (IdP) and delegate access to the instances to the relevant groups

2: Create an IAM policy that grants access to any instances with the specific tag and attach to the users and groups

3: Create an IAM policy with a conditional statement that matches the environment variables
4: Add an environment variable to the instances using user data

5: Add a specific tag to the instances you want to grant the users or groups access to

38
Q

A customer runs an application on-premise that stores large media files. The data is mounted to different servers using either the SMB or NFS protocols. The customer is having issues with scaling the storage infrastructure on-premise and is looking for a way to offload the data set into the cloud whilst retaining a local cache for frequently accessed content. Which of the following is the best solution?

1: Use the AWS Storage Gateway File Gateway
2: Use the AWS Storage Gateway Volume Gateway in cached volume mode
3: Create a script that migrates infrequently used data to S3 using multi-part upload
4: Establish a VPN and use the Elastic File System (EFS)

A

1: Use the AWS Storage Gateway File Gateway

2: Use the AWS Storage Gateway Volume Gateway in cached volume mode
3: Create a script that migrates infrequently used data to S3 using multi-part upload
4: Establish a VPN and use the Elastic File System (EFS)

39
Q

A client has requested a design for a fault tolerant database that can failover between AZs. You have decided to use RDS in a multi-AZ configuration. What type of replication will the primary database use to replicate to the standby instance?

1: Continuous replication
2: Asynchronous replication
3: Scheduled replication
4: Synchronous replication

A

1: Continuous replication
2: Asynchronous replication
3: Scheduled replication

4: Synchronous replication

40
Q

A Solutions Architect needs a storage solution for a fleet of Linux web application servers. The solution should provide a file system interface and be able to support millions of files. Which AWS service should the Architect choose?

1: Amazon ElastiCache
2: Amazon EBS
3: Amazon EFS
4: Amazon S3

A

1: Amazon ElastiCache
2: Amazon EBS

3: Amazon EFS

4: Amazon S3

41
Q

A Solutions Architect is creating an application design with several components that will be publicly addressable. The Architect would like to use Alias records. Using Route 53 Alias records what targets can you specify? (Select TWO)

1: CloudFront distribution
2: ElastiCache cluster
3: EFS filesystems
4: Elastic Beanstalk environment
5: On-premise web server

A

1: CloudFront distribution

2: ElastiCache cluster
3: EFS filesystems

4: Elastic Beanstalk environment

5: On-premise web server

42
Q

A new financial platform has been re-architected to use Docker containers in a micro-services architecture. The new architecture will be implemented on AWS and a Solutions Architect must recommend the solution configuration. For operational reasons, it will be necessary to access the operating system of the instances on which the containers run. Which solution delivery option should the Architect select?

1: ECS with the EC2 launch type
2: EKS with Kubernetes managed infrastructure
3: ECS with the Fargate launch type
4: ECS with a default cluster

A

1: ECS with the EC2 launch type

2: EKS with Kubernetes managed infrastructure
3: ECS with the Fargate launch type
4: ECS with a default cluster

43
Q

A new application runs on Amazon EC2 instances and uses API Gateway and AWS Lambda. The company is planning on running an advertising campaign that will likely result in significant hits to the application after each ad is run. A Solutions Architect is concerned about the impact this may have on the application and would like to put in place some controls to limit the number of requests per second that hit the application. What controls should the Solutions Architect implement?

1: Implement throttling rules on the API Gateway
2: Enable caching on the API Gateway and specify a size in gigabytes
3: Enable Lambda continuous scaling
4: API Gateway and Lambda scale automatically to handle any load so there’s no need to implement controls

A

1: Implement throttling rules on the API Gateway

2: Enable caching on the API Gateway and specify a size in gigabytes
3: Enable Lambda continuous scaling
4: API Gateway and Lambda scale automatically to handle any load so there’s no need to implement controls

44
Q

A Solutions Architect has deployed a number of AWS resources using CloudFormation. Some changes must be made to a couple of resources within the stack. Due to recent failed updates, the Solutions Architect is a little concerned about the effects that implementing updates to the resources might have on other resources in the stack. What is the easiest way to proceed cautiously?

1: Create and execute a change set
2: Use OpsWorks to manage the configuration changes
3: Use a direct update
4: Deploy a new stack to test the changes

A

1: Create and execute a change set

2: Use OpsWorks to manage the configuration changes
3: Use a direct update
4: Deploy a new stack to test the changes

45
Q

A company has over 2000 users and is planning to migrate data into the AWS Cloud. Some of the data is user’s home folders on an existing file share and the plan is to move this data to Amazon S3. Each user will have a folder in a shared bucket under the folder structure: bucket/home/%username%. What steps should a Solutions Architect take to ensure that each user can access their own home folder and no one else’s? (Select TWO)

1: Create a bucket policy that applies access permissions based on username
2: Create an IAM policy that applies folder-level permissions
3: Create an IAM policy that applies object-level S3 ACLs
4: Attach an S3 ACL sub-resource that grants access based on the %username% variable
5: Create an IAM group and attach the IAM policy, add IAM users to the group

A

1: Create a bucket policy that applies access permissions based on username

2: Create an IAM policy that applies folder-level permissions

3: Create an IAM policy that applies object-level S3 ACLs
4: Attach an S3 ACL sub-resource that grants access based on the %username% variable

5: Create an IAM group and attach the IAM policy, add IAM users to the group

46
Q

An event in CloudTrail is the record of an activity in an AWS account. What are the two types of events that can be logged in CloudTrail? (Select TWO)

1: Platform Events which are also known as hardware level operations
2: Data Events which are also known as data plane operations
3: System Events which are also known as instance level operations
4: Control Events which are also known as data plane operations
5: Management Events which are also known as control plane operations

A

1: Platform Events which are also known as hardware level operations

2: Data Events which are also known as data plane operations

3: System Events which are also known as instance level operations
4: Control Events which are also known as data plane operations

5: Management Events which are also known as control plane operations

47
Q

A Solutions Architect is writing some code that uses an AWS Lambda function and would like to enable the function to connect to an Amazon ElastiCache cluster within an Amazon VPC in the same AWS account. What VPC-specific information must be included in the function to enable this configuration? (Select TWO)

1: VPC Subnet IDs
2: VPC Logical IDs
3: VPC Peering IDs
4: VPC Security Group IDs
5: VPC Route Table IDs

A

1: VPC Subnet IDs

2: VPC Logical IDs
3: VPC Peering IDs

4: VPC Security Group IDs

5: VPC Route Table IDs

48
Q

A Solutions Architect created a new subnet in an Amazon VPC and launched an Amazon EC2 instance into it. The Solutions Architect needs to directly access the EC2 instance from the Internet and cannot connect. Which steps should be undertaken to troubleshoot the issue? (Select TWO)

1: Check that the instance has a public IP address
2: Check that there is a NAT Gateway configured for the subnet
3: Check that Security Group has a rule for outbound traffic
4: Check that the route table associated with the subnet has an entry for an Internet Gateway
5: Check that you can ping the instance from another subnet

A

1: Check that the instance has a public IP address

2: Check that there is a NAT Gateway configured for the subnet
3: Check that Security Group has a rule for outbound traffic

4: Check that the route table associated with the subnet has an entry for an Internet Gateway

5: Check that you can ping the instance from another subnet

49
Q

A Solutions Architect just completed the implementation of a 2-tier web application for a client. The application uses Amazon EC2 instances, Amazon ELB and Auto Scaling across two subnets. After deployment the Solutions Architect noticed that only one subnet has EC2 instances running in it. What might be the cause of this situation?

1: The ELB is configured as an internal-only load balancer
2: The Auto Scaling Group has not been configured with multiple subnets
3: Cross-zone load balancing is not enabled on the ELB
4: The AMI is missing from the ASG’s launch configuration

A

1: The ELB is configured as an internal-only load balancer

2: The Auto Scaling Group has not been configured with multiple subnets

3: Cross-zone load balancing is not enabled on the ELB
4: The AMI is missing from the ASG’s launch configuration

50
Q

A Solutions Architect is designing the messaging and streaming layers of a serverless application. The messaging layer will manage communications between components and the streaming layer will manage real-time analysis and processing of streaming data. The Architect needs to select the most appropriate AWS services for these functions. Which services should be used for the messaging and streaming layers? (Select TWO)

1: Use Amazon Kinesis for collecting, processing and analyzing real-time streaming data
2: Use Amazon SWF for providing a fully managed messaging service
3: Use Amazon SNS for providing a fully managed messaging service
4: Use Amazon EMR for collecting, processing and analyzing real-time streaming data
5: Use AWS CloudTrail for collecting, processing and analyzing real-time streaming data

A

1: Use Amazon Kinesis for collecting, processing and analyzing real-time streaming data

2: Use Amazon SWF for providing a fully managed messaging service

3: Use Amazon SNS for providing a fully managed messaging service

4: Use Amazon EMR for collecting, processing and analyzing real-time streaming data
5: Use AWS CloudTrail for collecting, processing and analyzing real-time streaming data

51
Q

An existing Auto Scaling group is running with eight Amazon EC2 instances. A Solutions Architect has attached an Elastic Load Balancer (ELB) to the Auto Scaling group by connecting a Target Group. The ELB is in the same region and already has ten EC2 instances running in the Target Group. When attempting to attach the ELB the request immediately fails, what is the MOST likely cause?

1: Adding the 10 EC2 instances to the ASG would exceed the maximum capacity configured
2: One or more of the instances are unhealthy
3: ASGs cannot be edited once defined, you would need to recreate it
4: You cannot attach running EC2 instances to an ASG

A

1: Adding the 10 EC2 instances to the ASG would exceed the maximum capacity configured

2: One or more of the instances are unhealthy
3: ASGs cannot be edited once defined, you would need to recreate it
4: You cannot attach running EC2 instances to an ASG

52
Q

The AWS Acceptable Use Policy describes permitted and prohibited behavior on AWS and includes descriptions of prohibited security violations and network abuse. According to the policy, what is AWS’s position on penetration testing?

1: AWS do not allow any form of penetration testing
2: AWS allow penetration testing by customers on their own VPC resources
3: AWS allow penetration for some resources without prior authorization
4: AWS allow penetration testing for all resources

A

1: AWS do not allow any form of penetration testing
2: AWS allow penetration testing by customers on their own VPC resources

3: AWS allow penetration for some resources without prior authorization

4: AWS allow penetration testing for all resources

53
Q

An application regularly uploads files from an Amazon EC2 instance to an Amazon S3 bucket. The files can be a couple of gigabytes in size and sometimes the uploads are slower than desired. What method can be used to increase throughput and reduce upload times?

1: Turn off versioning on the destination bucket
2: Randomize the object names when uploading
3: Use Amazon S3 multipart upload
4: Upload the files using the S3 Copy SDK or REST API

A

1: Turn off versioning on the destination bucket
2: Randomize the object names when uploading

3: Use Amazon S3 multipart upload

4: Upload the files using the S3 Copy SDK or REST API

54
Q

A three-tier web application that is deployed in an Amazon VPC has been experiencing heavy load on the database layer. The database layer uses an Amazon RDS MySQL instance in a multi-AZ configuration. Customers have been complaining about poor response times. During troubleshooting it has been noted that the database layer is experiencing high read contention during peak hours of the day. What are two possible options that could be used to offload some of the read traffic from the database to resolve the performance issues? (Select TWO)

1: Add RDS read replicas in each AZ
2: Use an ELB to distribute load between RDS instances
3: Migrate to DynamoDB
4: Use a larger RDS instance size
5: Deploy ElastiCache in each AZ

A

1: Add RDS read replicas in each AZ

2: Use an ELB to distribute load between RDS instances
3: Migrate to DynamoDB
4: Use a larger RDS instance size

5: Deploy ElastiCache in each AZ

55
Q

A Solutions Architect is creating a multi-tier application that includes loosely-coupled, distributed application components and needs to determine a method of sending notifications instantaneously. Using Amazon SNS which transport protocols are supported? (Select TWO)

1: Amazon SWF
2: FTP
3: HTTPS
4: AWS Lambda
5: Email-JSON

A

1: Amazon SWF
2: FTP

3: HTTPS

4: AWS Lambda

5: Email-JSON

56
Q

A manager is concerned that the default service limits my soon be reached for several AWS services. Which AWS tool can a Solutions Architect use to display current usage and limits?

1: AWS Systems Manager
2: AWS Trusted Advisor
3: AWS Dashboard
4: Amazon CloudWatch

A

1: AWS Systems Manager

2: AWS Trusted Advisor

3: AWS Dashboard
4: Amazon CloudWatch

57
Q

A company has multiple AWS accounts for several environments (Prod, Dev, Test etc.). A Solutions Architect would like to copy an Amazon EBS snapshot from DEV to PROD. The snapshot is from an EBS volume that was encrypted with a custom key. What steps must be performed to share the encrypted EBS snapshot with the Prod account? (Select TWO)

1: Share the custom key used to encrypt the volume
2: Make a copy of the EBS volume and unencrypt the data in the process
3: Create a snapshot of the unencrypted volume and share it with the Prod account
4: Modify the permissions on the encrypted snapshot to share it with the Prod account
5: Use CloudHSM to distribute the encryption keys use to encrypt the volume

A

1: Share the custom key used to encrypt the volume

2: Make a copy of the EBS volume and unencrypt the data in the process
3: Create a snapshot of the unencrypted volume and share it with the Prod account

4: Modify the permissions on the encrypted snapshot to share it with the Prod account

5: Use CloudHSM to distribute the encryption keys use to encrypt the volume

58
Q

An application you manage runs a number of components using a micro-services architecture. Several ECS container instances in your ECS cluster are displaying as disconnected. The ECS instances were created from the Amazon ECS-Optimized AMI. What steps might you take to troubleshoot the issue? (Select TWO)

1: Verify that the instances have the correct IAM group applied
2: Verify that the container instances have the container agent installed
3: Verify that the IAM instance profile has the necessary permissions
4: Verify that the container agent is running on the container instances
5: Verify that the container instances are using the Fargate launch type

A

1: Verify that the instances have the correct IAM group applied
2: Verify that the container instances have the container agent installed

3: Verify that the IAM instance profile has the necessary permissions

4: Verify that the container agent is running on the container instances

5: Verify that the container instances are using the Fargate launch type

59
Q

The application development team in a company have created a new application written in .NET. A Solutions Architect is looking for a way to easily deploy the application whilst maintaining full control of the underlying resources. Which PaaS service provided by AWS would BEST suit this requirement?

1: CloudFront
2: Elastic Beanstalk
3: EC2 Placement Groups
4: CloudFormation

A

1: CloudFront

2: Elastic Beanstalk

3: EC2 Placement Groups
4: CloudFormation

60
Q

A Solutions Architect is building a small web application running on Amazon EC2 that will be serving static content. The user base is spread out globally and speed is important. Which AWS service can deliver the best user experience cost-effectively and reduce the load on the web server?

1: Amazon RedShift
2: Amazon S3
3: Amazon CloudFront
4: Amazon EBS volume

A

1: Amazon RedShift
2: Amazon S3

3: Amazon CloudFront

4: Amazon EBS volume

61
Q

Amazon CloudWatch is being used to monitor the performance of AWS Lambda. Which metrics does Lambda track? (Select TWO)

1: Total number of requests
2: Latency per request
3: Number of users
4: Total number of connections
5: Total number of transactions

A

1: Total number of requests

2: Latency per request

3: Number of users
4: Total number of connections
5: Total number of transactions

62
Q

An Amazon EC2 instance running a video on demand web application has been experiencing high CPU utilization. A Solutions Architect needs to take steps to reduce the impact on the EC2 instance and improve performance for consumers. Which of the steps below would help?

1: Use ElastiCache as the web front-end and forward connections to EC2 for cache misses
2: Create a CloudFront distribution and configure a custom origin pointing at the EC2 instance
3: Create an ELB and place it in front of the EC2 instance
4: Create a CloudFront RTMP distribution and point it at the EC2 instance

A

1: Use ElastiCache as the web front-end and forward connections to EC2 for cache misses

2: Create a CloudFront distribution and configure a custom origin pointing at the EC2 instance

3: Create an ELB and place it in front of the EC2 instance
4: Create a CloudFront RTMP distribution and point it at the EC2 instance

63
Q

A Solutions Architect needs to create a file system that can be concurrently accessed by multiple Amazon EC2 instances across multiple availability zones. The file system needs to support high throughput and the ability to burst. As the data that will be stored on the file system will be sensitive, it must be encrypted at rest and in transit. Which storage solution should the Solutions Architect use for the shared file system?

1: Add EBS volumes to each EC2 instance and configure data replication
2: Use the Elastic Block Store (EBS) and mount the file system at the block level
3: Use the Elastic File System (EFS) and mount the file system using NFS
4: Add EBS volumes to each EC2 instance and use an ELB to distribute data evenly between the volumes

A

1: Add EBS volumes to each EC2 instance and configure data replication
2: Use the Elastic Block Store (EBS) and mount the file system at the block level

3: Use the Elastic File System (EFS) and mount the file system using NFS

4: Add EBS volumes to each EC2 instance and use an ELB to distribute data evenly between the volumes

64
Q

A new department will begin using AWS services an AWS account and a Solutions Architect needs to create an authentication and authorization strategy. Select the correct statements regarding IAM groups? (Select TWO)

1: IAM groups can be used to assign permissions to users
2: IAM groups can be nested up to 4 levels
3: IAM groups can be used to group EC2 instances
4: IAM groups can temporarily assume a role to take on permissions for a specific task
5: An IAM group is not an identity and cannot be identified as a principal in an IAM policy

A

1: IAM groups can be used to assign permissions to users

2: IAM groups can be nested up to 4 levels
3: IAM groups can be used to group EC2 instances
4: IAM groups can temporarily assume a role to take on permissions for a specific task

5: An IAM group is not an identity and cannot be identified as a principal in an IAM policy

65
Q

The development team in a media organization is moving their SDLC processes into the AWS Cloud. Which AWS service can a Solutions Architect recommend that is primarily used for software version control?

1: CloudHSM
2: CodeStar
3: CodeCommit
4: Step Functions

A

1: CloudHSM
2: CodeStar

3: CodeCommit

4: Step Functions