Practice Exam Questions Flashcards
A company needs to ensure that its AWS cloud environment is protected from DDoS attacks. What AWS service would be the most appropriate for this requirement?
AWS Shield provides DDoS protection and is specifically designed to safeguard AWS applications against DDoS attacks.
What service is primarily used for filtering traffic to applications?
AWS WAF is primarily used for filtering traffic to applications
What service is a threat detection service that continuously monitors for malicious activity?
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity
What service is used for security assessment and compliance of applications?
Amazon Inspector is used for security assessment and compliance of applications
An application requires a database solution that can automatically scale to meet sudden increases in demand while maintaining consistent performance. What 2 AWS services would best meet these requirements and why?
DynamoDB with on demand capacity can automatically adjust for varying loads and ElastiCache enhances database performance through caching, handling spikes efficiently.
What AWS service offers the most cost-effective solution for storing infrequently accessed data over a long period?
Amazon S3 Glacier is designed for long-term storage with infrequent access, making it the most cost-effective.
A Solutions Architect is designing a web application that experiences seasonal traffic. To optimize costs, what combination of AWS services should be used for compute resources and why?
Amazon EC2 Reserved Instances provide a significant discount for predictable usage, ideal for expected seasonal traffic. Amazon EC2 Spot Instances can offer cost savings for flexible, non-critical components of the workload.
An organization wants to secure it’s AWS infrastructure by ensuring that access keys are not embedded in code or left in accessible locations. What AWS service or feature should be used to achieve this best practice?
AWS Identity and Access Management (IAM) allows for the creation of roles and temporary credentials, reducing the need to store access keys within code.
What AWS service is used for managing encryption keys?
AWS Key Management Service (KMS)
What AWS service is used for tracking resource configurations and changes?
AWS Config
What AWS service is used for monitoring and logging?
Amazon CloudWatch
A Solutions Architect is designing a cost-optimized architecture for a workload that has predictable, consistent performance requirements. What EC2 purchasing option would be the most cost-effective?
Reserved instances offer significant savings for consistent, predictable workloads.
Spot Instances are best for what type of workloads?
flexible, interruptible workloads
Dedicated Hosts are typically used for what reason?
Compliance requirements
A Solutions Architect needs to design a system that can handle sudden, unpredictable spikes in web traffic. What AWS service combination is the best for this requirement?
ASG with ELB. Auto Scaling dynamically adjusts EC2 capacity, while Elastic Load Balancing distributes traffic, effectively managing sudden spikes.
A Solutions Architect needs to design a secure communication channel for transferring sensitive data between an Amazon EC2 instance and an S3 bucket. What combination of actions should be taken to ensure data security and why?
Implement server-side encryption with AWS KMS and restrict S3 bucket access with IAM roles. Server-side encryption with KMS encrypts the data at rest in S3, enhancing security. Using IAM roles to restrict bucket access ensures that only authorized EC2 instances can access the data.
A Solutions Architect needs to improve the data processing speed of a large-scale analytics application. The current setup uses multiple EC2 instances accessing data stored in Amazon S3. What service should be implemented to enhance the processing speed without significant changes to the existing infrastructure?
Amazon ElastiCache can significantly improve the data processing speed by caching frequently accessed data, reducing the need to fetch it repeatedly from the S3.
What AWS service is a fully managed NoSQL database service?
Amazon DynamoDB
What is the main purpose of AWS IAM?
AWS IAM manages users and their levels of access to the AWS console.
What does Amazon S3 stand for?
Amazon Simple Storage Service.
What is the use of Amazon EC2?
EC2 provides scalable computing capacity in the AWS cloud.
What does Auto Scaling do in AWS?
Auto Scaling helps you ensure that you have the correct number of EC2 instances available.
A social photo-sharing company uses Amazon Simple Storage Service (Amazon S3) to store the images uploaded by the users. These images are kept encrypted in Amazon S3 by using AWS Key Management Service (AWS KMS) and the company manages its own AWS KMS keys for encryption. A member of the DevOps team accidentally deleted the AWS KMS key a day ago, thereby rendering the user’s photo data unrecoverable. You have been contacted by the company to consult them on possible solutions to this crisis.
As a solutions architect, what steps would you recommend to solve this issue?
As the AWS KMS key was deleted a day ago, it must be in the ‘pending deletion’ status and hence you can just cancel the KMS key deletion and recover the key
AWS Key Management Service (KMS) makes it easy for you to create and manage cryptographic keys and control their use across a wide range of AWS services and in your applications. AWS KMS is a secure and resilient service that uses hardware security modules that have been validated under FIPS 140-2.
Deleting an AWS KMS key in AWS Key Management Service (AWS KMS) is destructive and potentially dangerous. Therefore, AWS KMS enforces a waiting period. To delete a KMS key in AWS KMS you schedule key deletion. You can set the waiting period from a minimum of 7 days up to a maximum of 30 days. The default waiting period is 30 days. During the waiting period, the KMS key status and key state is Pending deletion. To recover the KMS key, you can cancel key deletion before the waiting period ends. After the waiting period ends you cannot cancel key deletion, and AWS KMS deletes the KMS key.
A media agency stores its re-creatable assets on Amazon Simple Storage Service (Amazon S3) buckets. The assets are accessed by a large number of users for the first few days and the frequency of access falls down drastically after a week. Although the assets would be accessed occasionally after the first week, but they must continue to be immediately accessible when required. The cost of maintaining all the assets on Amazon S3 storage is turning out to be very expensive and the agency is looking at reducing costs as much as possible.
As an AWS Certified Solutions Architect – Associate, can you suggest a way to lower the storage costs while fulfilling the business requirements?
Configure a lifecycle policy to transition the objects to Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA) after 30 days.
Amazon S3 One Zone-IA is for data that is accessed less frequently, but requires rapid access when needed. Unlike other S3 Storage Classes which store data in a minimum of three Availability Zones (AZs), Amazon S3 One Zone-IA stores data in a single Availability Zone (AZ) and costs 20% less than Amazon S3 Standard-IA. Amazon S3 One Zone-IA is ideal for customers who want a lower-cost option for infrequently accessed and re-creatable data but do not require the availability and resilience of Amazon S3 Standard or Amazon S3 Standard-IA. The minimum storage duration is 30 days before you can transition objects from Amazon S3 Standard to Amazon S3 One Zone-IA.
Amazon S3 One Zone-IA offers the same high durability, high throughput, and low latency of Amazon S3 Standard, with a low per GB storage price and per GB retrieval fee. S3 Storage Classes can be configured at the object level, and a single bucket can contain objects stored across Amazon S3 Standard, Amazon S3 Intelligent-Tiering, Amazon S3 Standard-IA, and Amazon S3 One Zone-IA. You can also use S3 Lifecycle policies to automatically transition objects between storage classes without any application changes.