New Udemy Flashcards

1
Q

A global technology company has a cloud architecture that uses various VPCs across multiple regions. To monitor their entire system, you were instructed to aggregate the CPU Utilization of their Reserved EC2 instances running in all of their VPCs.

How can you implement this requirement in the easiest way possible with minimal additional costs? (Select TWO.)


Use the AWS Service Health Dashboard to check the aggregated CPU Utilization of all of your EC2 instances in all regions.


Enable basic monitoring for all EC2 instances.

Enable detailed monitoring for all EC2 instances.

Set up a CloudWatch dashboard. Add a widget and select Cross-Region under Graph Metric to aggregate the CPU Utilization of all Reserved EC2 instances in all regions.

Set up a CloudWatch dashboard. Add a widget and choose Math expression under Graph Metric to query and aggregate the CPU Utilization of all Reserved EC2 instances in all regions.

Set up a data dashboard in AWS QuickSight. Add a widget for each region that contains the aggregated CPU utilization for all EC2 instances that are running on a specific region.

A

Enable detailed monitoring for all EC2 instances.

Set up a CloudWatch dashboard. Add a widget and choose Math expression under Graph Metric to query and aggregate the CPU Utilization of all Reserved EC2 instances in all regions.

You can aggregate the metrics for AWS resources across multiple accounts and Regions. For example, you can aggregate statistics for your EC2 instances that have detailed monitoring enabled. Instances that use basic monitoring are not included. Therefore, you must enable detailed monitoring (at an additional charge), which provides data in 1-minute periods.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An accounting firm has created a set of CloudFormation stacks which are used to deploy various application environments in their VPC. Due to the tax filing season, one of the underlying EC2 Instances which was launched as part of the CloudFormation stack needs to be changed and upgraded to a higher Instance type.

Which of the following is the best way to implement this change?

Launch a new CloudFormation template and deploy it to their VPC.

Directly make the changes to the current CloudFormation stack settings.

Launch a new CloudFormation template to their VPC and delete the older stack.

Launch a new larger EC2 instance and add it to the existing stack.

A

Directly make the changes to the current CloudFormation stack settings.

When you need to make changes to a stack’s settings or change its resources, you update the stack instead of deleting it and creating a new stack. For example, if you have a stack with an EC2 instance, you can update the stack to change the instance’s AMI ID. When you update a stack, you submit changes, such as new input parameter values or an updated template. AWS CloudFormation compares the changes you submit with the current state of your stack and updates only the changed resources.

When you directly update a stack, you submit changes and AWS CloudFormation immediately deploys them. Use direct updates when you want to quickly deploy your updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company has multiple AWS accounts that are consolidated using AWS Organizations. A Systems Engineer has been tasked to set up a cloud-based single sign-on (SSO) service to centrally manage SSO access to all of the company’s AWS accounts and cloud applications. The Engineer has already created a directory in the master account using the AWS Directory Service. Full access has also been configured by the Engineer in AWS Organizations.

Which of the following should the Engineer configure to complete the setup?

For each member account, set up IAM roles that will be used by AWS SSO. Associate the users with these IAM roles using AWS SSO.

Set up service control policies (SCPs) in AWS Organizations. Associate the SCPs with Directory Service users and groups using the AWS Management Console.

Set up permission sets in AWS SSO. Associate the permission sets with AWS Directory Service users and groups.

Set up permission sets in AWS Organizations. Associate the permission sets with AWS SSO users and groups.

A

Set up permission sets in AWS SSO. Associate the permission sets with AWS Directory Service users and groups.

AWS SSO manages access to all your AWS Organizations accounts, AWS SSO-integrated applications, and other business applications that support the Security Assertion Markup Language (SAML) 2.0 standard.

You can configure your identity source in AWS SSO to determine where your users and groups are stored. Once configured, you can then look up users or groups in your store to grant them single sign-on access to AWS accounts, cloud applications, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A SysOps Administrator is monitoring and handling groups of EC2 instances using AWS Systems Manager. Whenever there are batch operations such as maintenance and OS patching on these instances, the Administrator can rely on the Systems Manager to automatically perform these activities.

What other tasks can the Administrator perform with automation in Systems Manager? (Select TWO.)


Set synchronized EC2 instance restart times even without proper user access to some instances.

Receive notifications about automation tasks and workflows by using CloudWatch Events.

Allow unlimited concurrent automation executions without duration limits.

Create custom workflows or use pre-defined workflows maintained by AWS.

Design Automation documents that are securely tied to the user and cannot be shared to others.

A

Receive notifications about automation tasks and workflows by using CloudWatch Events.

Create custom workflows or use pre-defined workflows maintained by AWS.

These are the automation capabilities of Systems Manager that you can perform on EC2 instances:

  • Build automations to configure and manage instances and AWS resources.
  • Create custom runbooks or use pre-defined runbooks maintained by AWS.
  • Receive notifications about Automation tasks and runbooks by using Amazon EventBridge.
  • Monitor Automation progress and details by using the AWS Systems Manager console.

The option that says: Set synchronized EC2 instance restart times even without proper user access to some instances is incorrect because access to Systems Manager requires credentials. Those credentials must have permissions to access AWS resources for different tasks. You can have valid credentials to authenticate your requests but unless you have permissions, you cannot create or access Systems Manager resources.

The option that says: Allow unlimited concurrent automation executions without duration limits is incorrect because Systems Manager has service limits when it comes to concurrently executing automations (25) and maximum duration an automation execution can run (12 hrs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company is using several S3 buckets to store important inventory records of the online supply chain portal. They have an internal management application hosted on a private subnet of the VPC that needs to modify the contents of the S3 bucket and send a report to a partner company via the public Internet. The SysOps Administrator has created a gateway VPC endpoint for S3 as preparation for this requirement.

Which of the following actions should the Administrator do next?


Use a NAT gateway to directly send traffic to the VPC S3 endpoint.


Use a NAT gateway to enable the instance to send traffic to the Internet and VPC S3 endpoint.


Update the private subnet’s route table to directly connect to the S3 VPC endpoint and send the outbound Internet traffic to a NAT gateway.

Update the private subnet’s route table to directly send all traffic to the public VPC endpoint.

A

​Update the private subnet’s route table to directly connect to the S3 VPC endpoint and send the outbound Internet traffic to a NAT gateway.

Route Table Connection:
Source: PrivateLink-ID
Destination: Gateway Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A SysOps Administrator needs to create Linux EC2 clusters on AWS. As per company policy for security groups of any EC2 instance, the SSH port should not be open to the public and should be configured to listen to a custom port.

How can the Administrator implement a monitoring system that automatically sends a notification when an instance does not follow the configured rules?


Use a CloudWatch custom metric to check if a security group SSH port is open to the public, and then send a notification for non-compliance.


Run a third-party scanning tool on your EC2 instances and have it generate a report of non-compliant instances.


Use a combination of AWS Trusted Advisor and CloudWatch Alarm to flag a security group, which has an SSH port that is open to the public.

Use AWS Config and send a non-compliance notification when a security group SSH port is open to the public.

A

Use AWS Config and send a non-compliance notification when a security group SSH port is open to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A school is planning on recreating their own website by adding new features to it and making it more interactive for visitors. Because of this, they would like to create subdomains that redirects to the new webpages, while reusing their old parent domain registered in an external DNS service for the main page of the website.

What would be a cost-effective solution for creating subdomains without having to migrate the parent domain?


There is no way to do this in AWS.


Provision EC2 servers with elastic IPs attached to them, and use those to host the new webpages. Then use Route 53 A records to point to the elastic IPs, and create NS records to direct subdomain queries.


Create a Route 53 hosted zone for the subdomain. Add records for the new subdomain to your Route 53 hosted zone. Update the DNS service for the parent domain by adding name server records for the subdomain.


Create a new subdomain in Route 53 by registering a domain and transferring the server records to their current DNS service.

A

Create a Route 53 hosted zone for the subdomain. Add records for the new subdomain to your Route 53 hosted zone. Update the DNS service for the parent domain by adding name server records for the subdomain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A social media startup needs to allows users to send pictures, videos, and messages to their contacts. The users should have the ability to log in to their profile using any of their social media accounts and then the app should store the user details on a DynamoDB table.

Which of the following services can satisfy the given requirements? (Select TWO.)

​
AWS IAM Roles
​
AWS IAM users
​
Amazon Cognito
​
AWS Single Sign-On
​
AWS Federated Access
A

Amazon Cognito

AWS IAM Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company registered an account in AWS. After setting up their VPC and launching various AWS resources, you were instructed by the IT Security team to improve its overall security and performance. You must identify the most common security misconfigurations in your cloud resources for you to be able to address and resolve them immediately.

How will you check if you have followed the best practices in cloud security?


Use AWS X-Ray to analyze and debug applications to troubleshoot root causes of performance issues and errors.

Use AWS Config Security Checks to monitor and assess changes in the configurations of AWS resources.

Use AWS Inspector Checks to evaluate whether your assessment targets (your collection of AWS resources) have potential security issues that you need to address.

Use AWS Trusted Advisor Security Checks to inspect your AWS environment and make recommendations on different areas.

A

Use AWS Trusted Advisor Security Checks to inspect your AWS environment and make recommendations on different areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An organization has created block storage volumes using AWS Storage Gateway and mounted them as iSCSI devices to its application servers on-premises. After three months, the organization noticed a performance degradation of its iSCSI devices. The SysOps Administrator has been tasked to check the metrics of each resource. Upon investigation, the Administrator saw that the CacheHitPercent is below 50%, and the CachePercentUsed is above 80%.

Which of the following options should the Administrator do to fix this problem?


Use a larger block size to improve the performance of your tape drives.

Create a snapshot of your volumes and use it to create new volumes.

Launch a new disk with a larger capacity for the cached volume host. Use the AWS Management Console to edit the local disk and configure the new disk as the cached volume.

Implement a RAID 1 configuration in your on-premises environment.

A

Launch a new disk with a larger capacity for the cached volume host. Use the AWS Management Console to edit the local disk and configure the new disk as the cached volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company that still uses previous generation EC2 instances is currently building an online fashion website which has both development and UAT environments. You deployed the application to an On-Demand m1.small EC2 instance that exists on both environments. While testing the new website, the Operations team noticed performance degradation as they increase network load in the UAT environment.

In this scenario, how would you mitigate these performance issues in the UAT environment?


Use a Reserved m1.small EC2 instance instead of an On-Demand instance.

Change the m1.small EC2 instance to a larger instance type.

Enable Enhanced Networking.

Attach an additional ENI to the EC2 instance in the UAT environment.

A

Change the m1.small EC2 instance to a larger instance type.

The m1.small instance type has a low network performance due to its size. To fix this issue, you can use a larger EC2 instance type such as m1.medium, m1.large or m1.xlarge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company currently has an application which is hosted in an On-Demand EC2 instance in one Availability Zone. You are instructed to redesign the architecture to make it scalable and highly available. Which of the following should you do to accomplish this task?


Launch an Auto Scaling Group with subnets across 3 AWS regions. Set the minimum, desired, and maximum capacity to 2.

Launch an Auto Scaling Group with subnets across 2 AWS regions. Set a minimum, desired, and maximum capacity to 1.

Launch an Auto Scaling Group with subnets across 3 Availability Zones. Set the desired and maximum capacity to 5.

Launch an Auto Scaling Group with subnets across 2 Availability Zones. Set the minimum and maximum capacity to 1.

A

Launch an Auto Scaling Group with subnets across 3 Availability Zones. Set the desired and maximum capacity to 5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company plans to develop a solution to enforce the tagging of all EC2 instances that will be launched in the VPC including all of the EBS volumes that are attached in the instances. This is to allow administrators to easily manage tags on provisioned products with a consistent taxonomy. With this strategy, the company will be able to centrally manage commonly deployed IT services, helping them to achieve consistent governance and meet compliance requirements.

Which of the following is the most suitable solution that they should implement to meet this requirement?


Enable the Cost Allocation Tags feature which will automatically tag your resources.

Manually tag resources using the AWS Tag Editor.

Create a Lambda function that uses the GetResources and TagResources actions of the Resource Groups Tagging API to identify the untagged resources and afterwards, tag them automatically.

Use the AWS Service Catalog TagOption Library.

A

Use the AWS Service Catalog TagOption Library.

To allow administrators to easily manage tags on provisioned products, AWS Service Catalog provides a TagOption library. A TagOption is a key-value pair managed in AWS Service Catalog. It is not an AWS tag, but serves as a template for creating an AWS tag based on the TagOption.

The TagOption library makes it easier to enforce the following:

  • A consistent taxonomy
  • Proper tagging of AWS Service Catalog resources
  • Defined, user-selectable options for allowed tags

Administrators can associate TagOptions with portfolios and products. During a product launch (provisioning), AWS Service Catalog aggregates the associated portfolio and product TagOptions, and applies them to the provisioned product, as shown in the following diagram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A SysOps Administrator launched an EBS-backed On-Demand EC2 Instance to host a web application. However, the instance always terminates after going into the pending state.

Which of the following could be the cause of this issue? (Select TWO.)

The root EBS volume is encrypted and you do not have permissions to access the KMS key for decryption.

The limit for EC2 Instances in your region has already been reached.

AWS does not currently have enough available On-Demand capacity to service your request.

The AMI used is corrupted.

The EBS volume limit has been reached.

A

The following are a few reasons why your EC2 instance goes from the pending state to the terminated state immediately after restarting it:

  • You’ve reached your EBS volume limit.
  • An EBS snapshot is corrupt.
  • The root EBS volume is encrypted and you do not have permissions to access the KMS key for decryption.
  • The instance store-backed AMI that you used to launch the instance is missing a required part (an image.part.xx file).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A startup recently launched a web application that uses Amazon ElastiCache for Memcached to store session state. A SysOps Administrator has been tasked to monitor the ElastiCache performance in Amazon CloudWatch. After checking the cache metric data, the Administrator noticed that the number of evictions in the cluster is increasing.

Which of the following options should the Administrator do to improve the performance of the cluster? (Select TWO.)


Increase the number of nodes in your cluster.

Change the node size of your cluster.

Change the value of your TTL to milliseconds.

Increase the number of shards in your cluster.

Use Amazon SNS to send a notification if the evictions count exceeds your chosen threshold.

A

Increase the number of nodes in your cluster.

Change the node size of your cluster.

Evictions occur when memory is overfilled or greater than the max memory setting in the cache. The node type and the number of nodes will define the cache memory limit.

The option that says: Increase the number of shards in your cluster is incorrect because this is only applicable to Amazon ElastiCache for Redis, and not for Memcached. By increasing the number of shards, you can increase the number of replicas in a Redis cluster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company is heavily using AWS CloudFormation templates to automate the deployment of their cloud resources. The SysOps Administrator needs to write a template that will automatically copy objects from an existing S3 bucket into the new one.

Which of the following is the most suitable configuration for this scenario?

Configure the CloudFormation template to modify the existing S3 bucket to allow cross-origin requests.

Set up the CloudFormation template to use the AWS Data Pipeline CopyActivity object to copy the files from the existing S3 bucket to the new S3 bucket.

Configure the CloudFormation template to enable cross-region replication on the existing S3 bucket and select the new S3 bucket as the destination.

Set up an AWS Lambda function and configure it to perform the copy operation. Integrate the Lambda function to the CloudFormation template as a custom resource.

A

Set up an AWS Lambda function and configure it to perform the copy operation. Integrate the Lambda function to the CloudFormation template as a custom resource.

In an AWS CloudFormation template, you can specify a Lambda function as the target of a custom resource. Use custom resources to process parameters, retrieve configuration values, or call other AWS services during stack lifecycle events. When you associate a Lambda function with a custom resource, the function is invoked whenever the custom resource is created, updated, or deleted. AWS CloudFormation calls a Lambda API to invoke the function and to pass all the request data (such as the request type and resource properties) to the function. The power and customizability of Lambda functions in combination with AWS CloudFormation enable a wide range of scenarios, such as dynamically looking up AMI IDs during stack creation, or implementing and using utility functions, such as string reversal functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A tech startup launched an application using Amazon API Gateway and AWS Lambda. You were required by your manager to trace and analyze user requests as they go through the Amazon API Gateway API’s and eventually to the underlying services.

Which of these options is the most appropriate tool that will meet the requirement?

​
CloudWatch
​
AWS X-Ray
​
VPC Flow Logs
​
CloudTrail
A

AWS X-Ray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A leading insurance firm has a VPC in the US East (N. Virginia) region for their head office in New York and another VPC in the US West (N. California) for their regional office in California. There is a requirement to establish a low latency, high-bandwidth connection between their on-premises data center in Chicago and both of their VPCs in AWS.

As the SysOps Administrator of the firm, how could you implement this in a cost-effective manner?


Set up an AWS VPN managed connection between the VPC in US East (N. Virginia) region and the on-premises data center in Chicago.

Set up two separate VPC peering connections for the two VPCs and for the on-premises data center.

Establish a Direct Connect connection between the VPC in US East (N. Virginia) region to the on-premises data center in Chicago and then establish another Direct Connect connection between the VPC in US West (N. California) region to the on-premises data center.

Set up an AWS Direct Connect connection to the on-premises data center. Launch a new AWS Direct Connect Gateway with a virtual private gateway and connect the VPCs from US East and US West regions. Integrate the Direct Connect connection to the Direct Connect Gateway.

A


Set up an AWS Direct Connect connection to the on-premises data center. Launch a new AWS Direct Connect Gateway with a virtual private gateway and connect the VPCs from US East and US West regions. Integrate the Direct Connect connection to the Direct Connect Gateway.

You can use an AWS Direct Connect gateway to connect your AWS Direct Connect connection over a private virtual interface to one or more VPCs in your account that are located in the same or different regions. You associate a Direct Connect gateway with the virtual private gateway for the VPC, and then create a private virtual interface for your AWS Direct Connect connection to the Direct Connect gateway. You can attach multiple private virtual interfaces to your Direct Connect gateway. A Direct Connect gateway is a globally available resource. You can create the Direct Connect gateway in any public region and access it from all other public regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A company is using Amazon S3 to serve static content and Amazon CloudFront to speed up content delivery to its users across the globe. For the next business cycle, they plan on improving these services to attract more customers and provide them a better user experience. To plan the next step, the SysOps Administrator will be needing more information regarding the activities that are occurring in their AWS resources. Amazon CloudFront includes a variety of reports that the Administrator can use to see usage and activity that is occurring in the CloudFront distributions.

How will the Administrator utilize these reports for this matter? (Select TWO.)


Use Popular Objects Report to determine what objects are frequently being accessed, and get statistics on those objects.

Use Top Referrers Reports to get statistics on viewer requests grouped by HTTP status code.

Use Cache Statistics Reports to display a list of the 25 website domains that originated the most HTTP and HTTPS requests for objects that CloudFront is distributing for a specified distribution.

Use Usage Reports to know the number of HTTP and HTTPS requests that CloudFront responds to from edge locations in selected regions.

Use Usage Reports to learn about the different types of browsers that your users frequently use to access your content.

A

Use Usage Reports to know the number of HTTP and HTTPS requests that CloudFront responds to from edge locations in selected regions.

Use Popular Objects Report to determine what objects are frequently being accessed, and get statistics on those objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A company has an online stock exchange application with a daily batch job that aggregates all intraday data and stores the result to an existing Amazon EFS. Currently, the batch processing is handled by several On-Demand EC2 instances and takes less than 3 hours to complete to generate a report that will only be used internally in the company. The batch job can be easily and safely re-run in the event that there is a problem in the processing since the data being processed are not mission-critical. To further reduce its operating costs, the company is looking for ways to optimize their current architecture.

As the SysOps Administrator, which is the MOST cost-effective and secure solution that you should implement?

Use Dedicated EC2 Instances to process the batch execution. Create a new EFS file system with encryption at rest enabled then copy all data from the current file system. Use the new EFS file system when storing the results processed by the On-Demand instances.

Request for several Spot EC2 instances and enable termination protection on each instance to process the batch execution. Enable encryption at rest in the existing EFS file system.

Use Scheduled Reserved EC2 Instances to process the batch execution. Enable encryption at rest in the existing EFS file system.

Request for a Spot Block to process the batch execution. Create a new EFS file system with encryption at rest enabled then copy all data from the current file system. After the data is copied over, delete the unencrypted file system. Use the new EFS file system when storing the results processed by the Spot instances.

A

Request for a Spot Block to process the batch execution. Create a new EFS file system with encryption at rest enabled then copy all data from the current file system. After the data is copied over, delete the unencrypted file system. Use the new EFS file system when storing the results processed by the Spot instances.

Another strategy is to launch Spot Instances with a specified duration (also known as Spot blocks), which are designed not to be interrupted and will run continuously for the duration you select. You can use a duration of 1, 2, 3, 4, 5, or 6 hours. The price that you pay depends on the specified duration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An IT Consulting firm has a set of DynamoDB tables which are used by their web applications hosted on Amazon ECS Clusters. As the SysOps Administrator, they have requested for you to ensure that backups are available for the tables to meet the compliance requirements. How will you enable this in the easiest possible way?


Set up a cron job to copy the data from one DynamoDB table to a backup table on your on-premises corporate network.

Create EBS snapshots for the DynamoDB storage volumes.

Enable Amazon DynamoDB Accelerator (DAX).

Enable On-Demand backups for the DynamoDB tables.

A

Enable On-Demand backups for the DynamoDB tables.

Amazon DynamoDB provides on-demand backup capability. It allows you to create full backups of your tables for long-term retention and archival for regulatory compliance needs. You can back up and restore your DynamoDB table data anytime with a single click in the AWS Management Console or with a single API call. Backup and restore actions execute with zero impact on table performance or availability.

22
Q

A web application is hosted on an Auto Scaling group of Spot EC2 instances deployed across multiple Availability Zones which are load-balanced by an ELB. You set up a monitoring system to check the health of all of your resources. However, you noticed that whenever the scale-out policy of the Auto Scaling group is triggered, the newly launched instances are not included in the aggregated metrics.

Which of the following could be a possible root cause for this issue?


The specified warm-up time period has not yet expired.

The EC2 instances fail to start up, causing it to be excluded from the aggregated metrics.

The launch configuration is not properly configured.

The EC2 instances have not completed their boot sequence.

A

The specified warm-up time period has not yet expired.

Until its specified warm-up time has expired, an instance is not counted toward the aggregated metrics of the Auto Scaling group. While scaling out, AWS also does not consider instances that are warming up as part of the current capacity of the group.

23
Q

A pharmaceutical company has a read-intensive MySQL database that needs to be migrated to AWS. You are required to ensure the high availability and scalability of the database in the VPC.

Which of the following should you do to meet this requirement? (Select TWO.)


Use Auto Scaling to automatically provision Aurora Read Replicas

Enable the Amazon Aurora Backtrack feature

Set up database caching using CloudFront

Enable Aurora Machine Learning to automatically achieve high availability and scalability of the database

Create AWS Aurora Clusters of MySQL database

A


Use Auto Scaling to automatically provision Aurora Read Replicas​

Create AWS Aurora Clusters of MySQL database

To meet your connectivity and workload requirements, Aurora Auto Scaling dynamically adjusts the number of Aurora Replicas provisioned for an Aurora DB cluster. Aurora Auto Scaling enables your Aurora DB cluster to handle sudden increases in connectivity or workload. When the connectivity or workload decreases, Aurora Auto Scaling removes unnecessary Aurora Replicas so that you don’t pay for unused provisioned DB instances.

24
Q

A financial startup needs to launch a new VPC with a CIDR block of 10.0.0.0/16. You created public and VPN-only subnets along with a hardware VPN access that needs to be connected to the client’s on-premises data center. Your manager realized that the /16 netmask provides 65,536 IP addresses which far exceeds their needs, hence, he asked you to delete the newly created VPC and create a smaller one. The VPC only contains the default route table as well as the default security group, with no gateways or any EC2 instances.

What will happen if you tried to delete the existing VPC using the AWS CLI?


The new VPC will not be deleted until the default security group is removed.

Upon triggering the delete-vpc CLI command, the new VPC will be added in the deletion queue and will permanently be deleted after a week once it is processed by AWS.

The new VPC will be deleted immediately.

The new VPC will not be deleted until the default route table is removed.

A

The new VPC will be deleted immediately.

You must detach or delete all gateways and resources that are associated with the VPC before you can delete it.

For example, you must terminate all instances running in the VPC,
delete all security groups associated with the VPC (except the default one),
delete all route tables associated with the VPC (except the default one)

25
Q

In the recently concluded IT audit in your company, it was discovered that the disaster recovery plan in place for your cloud infrastructure does not meet the strict compliance requirements. You have been requested to ensure that when the snapshots of EBS volumes are completed, these will be automatically copied to another region to improve data durability.

How can you achieve this requirement? (Select TWO.)


Integrate CloudWatch Events with EBS.


Use S3 bucket events to automatically copy the snapshots to another region.


Set up Lambda functions to copy the snapshots to another region.


Launch a workflow in SWF that automatically copies the snapshot to another region.

A

Integrate CloudWatch Events with EBS.

Set up Lambda functions to copy the snapshots to another region.

Amazon EBS emits notifications based on Amazon CloudWatch Events for a variety of snapshot and encryption status changes. With CloudWatch Events, you can establish rules that trigger programmatic actions in response to a change in snapshot or encryption key state. For example, when a snapshot is created, you can trigger an AWS Lambda function to share the completed snapshot with another account or copy it to another region for disaster-recovery purposes.

26
Q

A company plans to migrate an Oracle Real Application Clusters (RAC) database from an on-premises data center to VPC in AWS. Since RDS does not support Oracle RAC, you decided to launch the database on a large EC2 instance with multiple EBS Volumes attached. The database will be used to process high-throughput workloads. You are required to set up a monitoring system that provides metrics about the instance as well as the EBS Volumes. The database is heavily used and the monitoring system should be updated every 2 minutes.

Which of the following is the most suitable option that you should implement? (Select TWO.)


Enable Detailed Monitoring for the EBS Volumes and EC2 instance.


Use a Provisioned IOPS EBS volume type.


Use a General Purpose EBS volume type.


Enable Basic Monitoring for the EBS Volumes and EC2 instance.


Enable Enhanced Networking in the EC2 instance.

A

Enable Detailed Monitoring for the EBS Volumes and EC2 instance.


Use a Provisioned IOPS EBS volume type.

27
Q

A medical technology startup has a set of sensitive documents stored in their S3 bucket which contains personal health information of their customers. To secure the data, only the privileged IAM users should have access to the contents of the bucket using their MFA devices.

How can you ensure that this specific access is provided for the bucket? (Select TWO.)

​
Enable versioning on the bucket.
​
Ensure MFA is enabled for the privileged IAM users.
​
Ensure a bucket policy is in place to only allow access if users are MFA authenticated.
​
Enable MFA delete on the bucket.
A

Ensure MFA is enabled for the privileged IAM users.


Ensure a bucket policy is in place to only allow access if users are MFA authenticated.

Versioning is required for MFA Delete, but the user can be authenticated from login to AWS e.g.

28
Q

A SysOps Administrator needs to track the usage of cloud resources against the AWS service limit. For easier tracking, the SysOps Administrator team should be notified in the existing Slack channel whenever it is approaching a given limit which will allow them to proactively request a service limit increase or shut down resources before it exceeds the limit.

Which of the following is the most suitable solution that can be implemented to meet this requirement?


Use a combination of AWS Inspector to track the service limits and SNS to send messages to your Slack channel.


Set up a scheduled Lambda function that queries the AWS Trusted Advisor - Service Limits to track the usage and limits of your AWS account. Integrate the function with SES to automatically send an email to your Slack channel.


Set up AWS Limit Monitor by using AWS Lambda, AWS Trusted Advisor, and CloudWatch Events rules to track and monitor your AWS service limits which would be sent to your Slack Channel.


Use CloudWatch and SNS then enable Enhanced Monitoring which will automatically send messages to your Slack channel when you are about to hit your AWS service limit.

A


Set up AWS Limit Monitor by using AWS Lambda, AWS Trusted Advisor, and CloudWatch Events rules to track and monitor your AWS service limits which would be sent to your Slack Channel.

29
Q

47
A company has hundreds of Customer Master Keys (CMKs) which they are using with the Amazon Key Management Service to secure their S3 buckets, RDS instances, and other AWS resources. You were instructed to delete some CMKs to avoid management overhead and costs associated with maintaining unused keys.

In this scenario, which of the following is true regarding the deletion of customer master keys? (Select TWO.)


A CMK that is pending deletion cannot be used in any cryptographic operation.


A CMK that is pending deletion can still be used in any cryptographic operation.


AWS KMS still rotates the backing keys of CMKs that are pending deletion.


You can schedule the CMK for deletion with a default waiting period of 7 days.


You can directly delete a CMK immediately.


AWS KMS does not rotate the backing keys of CMKs that are pending deletion.

A

A CMK that is pending deletion cannot be used in any cryptographic operation

AWS KMS does not rotate the backing keys of CMKs that are pending deletion.

30
Q

A commercial bank has recently adopted a hybrid cloud architecture which prompted them to migrate most of their applications to AWS. You are creating multiple CloudFormation stacks for all of the applications that will be used by different departments. You are tasked to ensure that all RDS database instances that you deploy should be kept even if the stack is deleted.

How can you satisfy this requirement?


Set the DeletionPolicy attribute for the stack resource to Retain


Set the DeletionPolicy attribute for the stack resource to false


Set the DeletionPolicy attribute for the stack resource to Snapshot


Enable termination protection of the stack

A

Set the DeletionPolicy attribute for the stack resource to Retain

31
Q

A legacy application is using a Classic Load Balancer in AWS which routes each request independently to the registered EC2 instance with the smallest load. You enabled the sticky session feature to allow the load balancer to bind a user’s session to a specific EC2 instance.

What is the name of the cookie that the load balancer creates, which is used to map the user’s session?

​
AWSELB
​
sticky-session-id
​
SESSION-ELB
​
aws-sticky-session-id
A

AWSELB

32
Q

A leading telecommunications company has decided to host their e-commerce website in an Auto Scaling group of EC2 instances and a RDS database instance for their mobile phone plans. To secure the online transactions, you were instructed to configure the database to encrypt the data in transit.

Which of the following should you do to meet the requirements?


Use a VPC endpoint, which is powered by AWS PrivateLink, that enables you to connect to the RDS database instance.


Use the CloudHSM service to encrypt the incoming and outgoing traffic to RDS.


Do nothing. By default, RDS already provides data encryption for data at rest.


Based on its respective DB engine, configure the database to use SSL and use the certificates which are readily available from AWS.

A

Do nothing. By default, RDS already provides data encryption for data at rest.

33
Q

A company has multiple AWS accounts which are consolidated with AWS Organizations. You are instructed to ensure that the tags are consistently applied when your resources are created in AWS across all accounts.

Which of the following options should you do to satisfy this requirement? (Select TWO.)


Use AWS Config to add the corresponding tags to your resources after they are created.

Use AWS Systems Manager Automation to automatically add tags to your provisioned resources.

Use AWS generated tags by activating it in the Billing and Cost Management console of the member account.

Use the CloudFormation Resource Tags property to apply tags to certain resource types upon creation.

Use AWS Service Catalog to tag the provisioned resources with corresponding unique identifiers for portfolio, product, and users.

A

Use the CloudFormation Resource Tags property to apply tags to certain resource types upon creation.

Use AWS Service Catalog to tag the provisioned resources with corresponding unique identifiers for portfolio, product, and users.

34
Q

A mobile game development company has recently launched an app that gamifies personal finance which allows the users to earn points for every dollar they save or earn. They are using Kinesis Data Streams to continuously collect data about player-game interactions and feed the data into their mobile gaming platform. Due to the sensitive financial data that the application collects, you were instructed to configure your AWS resources to be secured at rest.

Which of the following should you do to meet the requirement with minimal effort?


Configure Amazon Kinesis Data Streams to use client-side encryption.

Configure Amazon Kinesis Data Streams to use server-side encryption.

Configure Amazon Kinesis Data Streams to use SSL.

Data encryption is not supported in Amazon Kinesis Data Streams hence, you should develop a custom encryption service to secure your data at rest.

A

Configure Amazon Kinesis Data Streams to use server-side encryption.

Server-side encryption is a feature in Amazon Kinesis Data Streams that automatically encrypts data before it’s at rest by using an AWS KMS customer master key (CMK) you specify. Data is encrypted before it’s written to the Kinesis stream storage layer, and decrypted after it’s retrieved from storage. As a result, your data is encrypted at rest within the Kinesis Data Streams service

35
Q

A company has a fleet of On-Demand EC2 instances on their new VPC created using the AWS CLI. You noticed that all recently launched EC2 instances do not have public DNS hostnames. This prevents you from accessing the instances over the Internet.

Which of the following could be a possible reason for this issue?


By default, the enableDnsSupport is set to false and enableDnsHostNames is set to true for VPCs created using the AWS CLI

By default, the enableDnsHostNames is set to false for VPCs created using the AWS CLI

By default, the enableDnsSupport is set to false for VPCs created using the AWS CLI

By default, both the enableDnsSupport and enableDnsHostNames are set to false for VPCs created using the AWS CLI

A

By default, the enableDnsHostNames is set to false for VPCs created using the AWS CLI

enableDnsHostnames - Indicates whether the instances launched in the VPC get public DNS hostnames. If this attribute is true, instances in the VPC get public DNS hostnames, but only if the enableDnsSupport attribute is also set to true.

enableDnsSupport - Indicates whether the DNS resolution is supported for the VPC. If this attribute is false, the Amazon-provided DNS server in the VPC that resolves public DNS hostnames to IP addresses is not enabled. If this attribute is true, queries to the Amazon provided DNS server at the 169.254.169.253 IP address, or the reserved IP address at the base of the VPC IPv4 network range plus two will succeed.

36
Q

A Lead Systems Engineer is creating CloudFormation stacks for all new applications that need to be deployed in the VPC. There is one particular CloudFormation stack that is going to use a template to create a brand new VPC, EC2 Instances for the public web servers, an RDS database instance, and an Internet gateway.

Which of the following should the Engineer do to prevent any errors when deploying this stack?


Verify that the DeletionPolicy attribute is added to the resources.

Verify that the UpdatePolicy attribute is added to the resources.

Verify that the DependsOn attribute is added to the resources.

Verify that the CreationPolicy attribute is added to the resources.

A

Verify that the DependsOn attribute is added to the resources.

Take note that in this scenario, you are deploying a CloudFormation stack that creates a new VPC and an Internet Gateway. The DependsOn attribute is required if you have any VPC-gateway attachment in your stack.

Some resources in a VPC require a gateway (either an Internet or VPN gateway). If your AWS CloudFormation template defines a VPC, a gateway, and a gateway attachment, any resources that require the gateway are dependent on the gateway attachment. For example, an Amazon EC2 instance with a public IP address is dependent on the VPC-gateway attachment if the VPC and Internet Gateway resources are also declared in the same template.

37
Q

A company has a newly launched e-commerce website with a Memcached cluster hosted in Amazon ElastiCache. Due to the growth of the site’s userbase, the SysOps Administrator needs to vertically scale the ElastiCache cluster by using a larger instance type.

Which combination of steps should the Administrator implement in this scenario? (Select TWO.)


Use the CreateCacheCluster API action to create a new ElastiCache cluster.

Use the ModifyCacheParameterGroup API action to create a new ElastiCache cluster.

Use the ModifyCacheCluster API action to modify the instance type of the cluster.

Specify the new EC2 instance type in the CacheNodeType parameter.

Specify the new EC2 instance type in the InstanceType parameter.

A

Use the CreateCacheCluster API action to create a new ElastiCache cluster.
=> Vertical Scaling

Specify the new EC2 instance type in the CacheNodeType parameter.
=> Adding nodes to horizontally scale

38
Q

A leading telecommunications company has decided to host their e-commerce website in an Auto Scaling group of EC2 instances and a RDS database instance for their mobile phone plans. To secure the online transactions, you were instructed to configure the database to encrypt the data in transit.

Which of the following should you do to meet the requirements?


Use a VPC endpoint, which is powered by AWS PrivateLink, that enables you to connect to the RDS database instance.

Use the CloudHSM service to encrypt the incoming and outgoing traffic to RDS.

Do nothing. By default, RDS already provides data encryption for data at rest.

Based on its respective DB engine, configure the database to use SSL and use the certificates which are readily available from AWS.

A

Based on its respective DB engine, configure the database to use SSL and use the certificates which are readily available from AWS.

39
Q

A SysOps Administrator needs to create a CloudFormation template that should automatically rollback in the event that the entire stack failed to launch. The application stack requires the pre-requisite packages to be installed first in order for it to run properly, which could take about an hour or so to complete.

What should the Administrator add in the template to accomplish this requirement?


In the ResourceSignal parameter of the Conditions resource attribute, add a Timeout property with a value of 2 hours.

In the ResourceSignal parameter of the UpdatePolicy resource attribute, add a Timeout property with a value of 2 hours.

In the ResourceSignal parameter of the CreationPolicy resource attribute, add a Timeout property with a value of 2 hours.

In the ResourceSignal parameter of the DependsOn resource attribute, add a Timeout property with a value of 2 hours.

A

In the ResourceSignal parameter of the CreationPolicy resource attribute, add a Timeout property with a value of 2 hours.

Associate the CreationPolicy attribute with a resource to prevent its status from reaching create complete until AWS CloudFormation receives a specified number of success signals or the timeout period is exceeded.

40
Q

An application uploads periodic logs to an Amazon S3 bucket. The logs must be immediately available but are not frequently accessed. Which lifecycle rule should be created for cost-efficiency?


Transition the objects to S3 Intelligent-Tiering after 30 days.

Transition the objects to S3 Glacier after immediately.

Transition the objects to S3 Standard-IA after 30 days.

Transition the objects to S3 Standard-IA immediately.

A

Transition the objects to S3 Standard-IA after 30 days.

41
Q

A security team has identified an attack on web applications running on Amazon EC2. The attack uses malformed HTTP headers. Which AWS service or feature can be used to prevent this type of attack from reaching the EC2 instances?


Application Load Balancer (ALB)


Network Access Control List (NACL)


AWS Web Application Firewall (WAF)


Amazon Security Group rules

A

Application Load Balancer (ALB)

42
Q

A company plans to use Amazon Route 53 to enable high availability for a website running on-premises. The website consists of an active and passive server. Route 53 must be configured to route traffic to the primary active server if the associated health returns a 2xx status code. All other traffic should be directed to the secondary passive server.

A SysOps Administrator needs to configure the record type and health check. Which options should the Administrator choose?


An A record for each server with an Amazon Route 53 TCP health check.


An alias record with evaluate health set to yes and associated with a Route 53 TCP health check.


An A record for each server with an Amazon Route 53 HTTP health check.


An alias record with evaluate health set to yes and associated with a Route 53 HTTP health check.

A

An alias record with evaluate health set to yes and associated with a Route 53 HTTP health check.

43
Q

An EBS-backed Amazon EC2 instance has a data volume with a status of impaired. I/O has also been disabled due to data consistency issues. Which first step should a SysOps Administrator take to recover the volume?


Attach an Elastic Fabric Adapter (EFA) to the instance and restart I/O.


Recreate the volume by restoring an Amazon EBS snapshot.


Perform a consistency check on the volume attached to the instance.


Change the volume to a general purpose SSD volume type.

A

Perform a consistency check on the volume attached to the instance.

44
Q

A company manage an application that is deployed on Amazon EC2 instances within a private subnet. The EC2 instances must be restricted from the internet for security and compliance reasons. The SysOps team must be able to manage the instances from the corporate office using the SSH protocol.

Which combination of actions should be taken to permit SSH access to the EC2 instances while meeting the security and compliance requirements? (Select TWO.)

Configure a Network Load Balancer in front of the EC2 instances.

Attach a NAT gateway to the VPC and configure routing.

Attach a virtual private gateway to the VPC and configure routing.

Configure a VPN connection back to the corporate office.

Attach an internet gateway to the VPC and configure routing.

A

Attach a virtual private gateway to the VPC and configure routing.

Configure a VPN connection back to the corporate office.

45
Q

An AWS Lambda function has been connected to an Amazon VPC and is no longer able to connect to an external service on the internet. How can this issue be resolved?


Add an entry to the subnet route table pointing to a NAT gateway.

Update the function code to avoid the VPC and connect directly.

Create a virtual private gateway (VGW) to the subnet.

Enable enhanced VPC routing for the AWS Lambda function.

A

Add an entry to the subnet route table pointing to a NAT gateway.

46
Q

A company plans to use Amazon Route 53 to enable high availability for a website running on-premises. The website consists of an active and passive server. Route 53 must be configured to route traffic to the primary active server if the associated health returns a 2xx status code. All other traffic should be directed to the secondary passive server.

A SysOps Administrator needs to configure the record type and health check. Which options should the Administrator choose?

An A record for each server with an Amazon Route 53 TCP health check.

An alias record with evaluate health set to yes and associated with a Route 53 TCP health check.

An A record for each server with an Amazon Route 53 HTTP health check.

An alias record with evaluate health set to yes and associated with a Route 53 HTTP health check.

A

An A record for each server with an Amazon Route 53 HTTP health check.

The website runs on-premises and therefore an Alias record cannot be used as this would only be used for AWS resources. Therefore, an A record should be used for each server. The health check must return HTTP status codes and therefore the only option is to use a HTTP health check.

47
Q

A SysOps Administrator has an AWS CloudFormation template created from an infrastructure stack deployed in us-east-1. The Administrator attempts to use the template to launch a stack in us-west-1. The stack partially deploys but then errors and rolls back.

What are the most likely reasons for the failure of the stack deployment? (Select TWO.)


The template did not have the proper level of permissions to deploy the resources in us-west-1.

The template referenced an Amazon Machine Image (AMI) that is not available in us-west-1.

CloudFormation templates can be used only to deploy stacks in a single Region.

The template referenced an IAM user that is not available in us-west-1.

The template referenced services that do not exist in us-west-1.

A

The template referenced services that do not exist in us-west-1.
The template referenced an Amazon Machine Image (AMI) that is not available in us-west-1.

… the template references resources such as VPC IDs that are not relevant in the Region

48
Q

A company wishes to restrict the ability to launch specific instance types to specific teams. The company has separate AWS accounts for its development and production teams and uses federated login with single sign-on (SSO). The AWS accounts are both under one organization in AWS Organizations.

How can a SysOps Administrator restrict users in the development team’s account so they can only launch T2 instances in the us-east-1 Region? (Select TWO.)

Create a service control policy (SCP) to deny instance launches unless the instance type is T2 and apply it to the developer organizational unit (OU).

Create a developer IAM group inside the development team account with an IAM policy to allow EC2 T2 instances.

Create a developer IAM group inside the production team account and attach an IAM policy to allow EC2 T2 instances.

Create a service control policy (SCP) to deny instance launches unless the instance type is T2 and apply it to the root.

Create a developer IAM role inside the development team account with an IAM policy to allow EC2 T2 instances.

A

Create a developer IAM role inside the development team account with an IAM policy to allow EC2 T2 instances.

Create a service control policy (SCP) to deny instance launches unless the instance type is T2 and apply it to the developer organizational unit (OU).

AWS SSO seamlessly leverages IAM permissions and policies for federated users and roles to help you manage federated access centrally across all AWS accounts in your AWS Organization.

There are two elements to implementing this restriction. Firstly, you can restrict the ability to launch only T2 instances using a service control policy (SCP) in AWS Organizations. The SCP is applied to an OU.

The next step is to provide the permissions required. The company is using federated login with AWS SSO. In this setup, the process results in using the AssumeRole* API actions to assume an IAM role that has a permissions policy attached granting the necessary permissions.

49
Q

A company runs an Amazon RDS MySQL DB instance in a production account. Each week a backup of the database must be copied to a separate development account for testing.

What is the MOST cost-effective way to meet this requirement?


Create a multi-AZ standby of the RDS database in the development account and take a manual snapshot using the create-db-snapshot AWS CLI command.

Create a manual RDS snapshot with the create-db-snapshot CLI command and share it with the development account, create a copy in the development account.

Copy an automated RDS snapshot to the development account using the copy-db-snapshot command with the AWS CLI.

Use the Amazon S3 cross-region replication (CRR) to copy the automated backup to the development account.

A

Create a manual RDS snapshot with the create-db-snapshot CLI command and share it with the development account, create a copy in the development account.

Copy an automated RDS snapshot to the development account using the copy-db-snapshot command with the AWS CLI” is incorrect. You cannot copy an automated DB snapshot!!!

50
Q

An Amazon EBS volume has a status of error. What can a SysOps Administrator do to bring the volume back online?


Perform a consistency check using the fsck command.

Take a snapshot and then create a new volume from the snapshot.

Create a new volume from a recent snapshot.

Enable I/O using the enable-volume-io API.

A

Create a new volume from a recent snapshot.

INCORRECT: “Perform a consistency check using the fsck command” is incorrect. You cannot bring the volume online so you cannot run a consistency check on it.

51
Q

A company has several departments and needs to ensure that each department operates within their own isolated environment. They should also only be able to use AWS services that have been pre-approved.

How can these requirements be met?


Create separate Amazon VPCs for each department and restrict access to approved services using IAM roles.

Create IAM policies for each department that grant access to specific services and attach them to the user accounts.

Create a catalog of services that are approved for use by each department in AWS Service Catalog.

Use an AWS Organization to create accounts for each department and apply service control policies (SCPs) to control access to pre-approved services.

A

Use an AWS Organization to create accounts for each department and apply service control policies (SCPs) to control access to pre-approved services.

INCORRECT: “Create a catalog of services that are approved for use by each department in AWS Service Catalog” is incorrect. This option does not provide an isolated environment for each department to run in.

52
Q

A company plans to use AWS CloudFormation to deploy their infrastructure using templates. The deployments will include several environments across multiple AWS Regions. A SysOps Administrator plans to write a single template that can be reused for each environment deployment.

What is the recommended way to use AWS CloudFormation to meet this requirement?

Use cross-stack references to provision the resources.

Use change sets to provision additional environments.

Use parameters to provision the resources.

Use nested stacks to provision the resources.

A

Use parameters to provision the resources

You can use the optional Parameters section to customize your templates. Parameters enable you to input custom values to your template each time you create or update a stack. You use the Ref intrinsic function to reference a parameter, and AWS CloudFormation uses the parameter’s value to provision the stack. You can reference parameters from the Resources and Outputs sections of the same template.