Pass the Amazon Web Services AWS Certified Associate SOA-C01 Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

A company has an application that is running on an EC2 instance in one Availability Zone. A sysops administrator has been tasked with making the application highly available The administrator created a launch configuration from the running EC2 instance The administrator also properly configured a load balancer.

What step should the administrator complete next to make the application highly available?

Options:

A.

Create an Auto Scaling group by using the launch configuration across at least 2 Availability Zones with a minimum size of 1 desired capacity of 1, and a maximum size of 1.


B.

Create an Auto Scaling group by using the launch configuration across at least 3 Availability Zones with a minimum size of 2 desired capacity of 2, and a maximum of 2


C.

Create an Auto Scaling group by using the launch configuration across at least 2 regions with a minimum size of 1 desired capacity of 1, and a maximum size of 1


D.

Create an Auto Scaling group by using the launch configuration across at least 3 regions with a minimum size of 2 desired capacity of 2 and a maximum size of 2


Expert Solution
Questions # 32:

An application running on Amazon EC2 allows users to launch batch jobs for data analysis. The jobs are run asynchronously, and the user is notified when they are complete. While multiple jobs can run concurrently, a user’s request need not be fulfilled for up to 24 hours. To run a job, the application launches an additional EC2 instance that performs all the analytics calculations. A job takes between 75 and 110 minutes to complete and cannot be interrupted.

What is the MOST cost-effective way to run this workload?

Options:

A.

Run the application on On-Demand EC2 instances. Run the jobs on Spot Instances with a specified duration.


B.

Run the application on Reserved Instance EC2 instances. Run the jobs on AWS Lambda.


C.

Run the application on On-Demand EC2 instances. Run the jobs on On-Demand EC2 instances.


D.

Run the application on Reserved instance EC2 instances. Run the jobs on Spot Instances with a specified duration.


Expert Solution
Questions # 33:

After launching a new Amazon EC2 instance from a Microsoft Windows 2012 Amazon Machine Image (AMI), the SysOps Administrator is unable to connect to the instance using Remote Desktop Protocol (RDP). The instance is also unreachable. As part of troubleshooting, the Administrator deploys a second instance from a different AMI using the same configuration and is able to connect to the instance.

What should be the next logical step in troubleshooting the first instance?

Options:

A.

Use AWS Trusted Advisor to gather operating system log files for analysis.


B.

Use VPC Flow Logs to gather operating system log files for analysis.


C.

Use EC2Rescue to gather operating system log files for analysis.


D.

Use Amazon metrics using Amazon CloudWatch Logs.


Expert Solution
Questions # 34:

A SysOps Administrator needs to confirm that security best practices are being followed with the AWS account root user.

How should the Administrator ensure that this is done?

Options:

A.

Change the root user password by using the AWS CLI routinely.


B.

Periodically use the AWS CLI to rotate access keys and secret keys for the root user.


C.

Use AWS Trusted Advisor security checks to review the configuration of the root user.


D.

Periodically distribute the AWS compliance document from AWS Artifact that governs the root user configuration.


Expert Solution
Questions # 35:

A company hosts a multi-tier ecommerce web application on AWS, and has recently been alerted to suspicious application traffic The architecture consists of Amazon EC2 instances deployed across multiple Availability Zones behind an Application Load Balancer (ALB) After examining the server logs, a sysops administrator determines that the suspicious traffic is an attempted SQL injection attack.

What should the sysops administrator do to prevent similar attacks?

Options:

A.

Install Amazon Inspector on the EC2 instances and configure a rules package Use the findings reports to identify and block SQL injection attacks.


B.

Modify the security group of the ALB Use the IP addresses from the logs to block the IP addresses where SQL injection originated.


C.

Create an AWS WAF web ACL in front of the ALB. Add an SQL injection rule to the web ACL Associate the web ACL to the ALB


D.

Enable Amazon GuardDuty in the AWS Region Use Amazon CloudWatch Events to trigger an AWS Lambda function response every time an SQL injection finding is discovered


Expert Solution
Questions # 36:

A company is planning to expand into an additional AWS region for disaster recovery purposes. the company uses AWS CloudFormation, and its infrastructure is well-defined as code. The company would like to reuse as much of its existing code as possible when deploying resources to additional Regions.

A SysOps Administrator is reviewing how Amazon Machine Images (AMIs) are selected in AWS CloudFormation, but is having trouble making the same stack work in the new Region.

Which action would make it easier to manage multiple Regions?

Options:

A.

Name each AMI in the new Region exactly the same as the equivalent AMI in the first Region.


B.

Duplicate the stack so unique AMI names can be coded into the appropriate stack.


C.

Create an alias for each AMI so that an AMI can be referenced by a common name across Regions.


D.

Create a Mappings section in the stack, and define the Region to AMI associations.


Expert Solution
Questions # 37:

A company must ensure that any objects uploaded to an S3 bucket are encrypted. Which of the following actions will meet this requirement? (Select TWO.)

Options:

A.

implement AWS Shield to protect against unencrypted objects stored in S3 buckets.


B.

Implement Object access control list (ACL) to deny unencrypted objects from being uploaded to the S3 bucket.


C.

Implement Amazon S3 default encryption to make sure that any object being uploaded is encrypted before it is stored.


D.

Implement Amazon Inspector to inspect objects uploaded to the S3 bucket to make sure that they are encrypted.


E.

Implement S3 bucket policies to deny unencrypted objects from being uploaded to the buckets.


Expert Solution
Questions # 38:

An application is running on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances are configured in an Amazon EC2 Auto Scaling group. A SysOps Administrator must configure the application to scale based on the number of incoming requests.

Which solution accomplishes this with the LEAST amount of effort?

Options:

A.

Use a simple scaling policy based on a custom metric that measures the average active requests of all EC2 instances


B.

Use a simple scaling policy based on the Auto Scaling group GroupDesiredCapacity metric


C.

Use a target tracking scaling policy based on the ALB’s ActiveConnectionCount metric


D.

Use a target tracking scaling policy based on the ALB’s RequestCountPerTarget metric


Expert Solution
Questions # 39:

A SysOps Administrator is troubleshooting an AWS CloudFormation template whereby multiple Amazon EC2 instances are being created. The template is working in us-east-1, but it is failing in us-west-2 with the error code:

AMI [ami-12345678] does not exist.

How should the Administrator ensure that the AWS CloudFormation template is working in every region?

Options:

A.

Copy the source region’s Amazon Machine Image (AMI) to the destination region and assign it the same ID.


B.

Edit the AWS CloudFormation template to specify the region code as part of the fully qualified AMI ID.


C.

Edit the AWS CloudFormation template to offer a drop-down list of all AMIs to the user by using the AWS: :EC2: :AMI: :ImageID control.


D.

Modify the AWS CloudFormation template by including the AMI IDs in the “Mappings” section. Refer to the proper mapping within the template for the proper AMI ID.


Expert Solution
Questions # 40:

A company with dozens of AWS accounts wants to ensure that governance rules are being applied across all accounts. The CIO has recommended that AWS Config rules be deployed using an AWS Cloud Formation template.

How should this be accomplished?

Options:

A.

Create a Cloud Form at ion stack in the master account of AWS Organizations and execute the Cloud Formation template to create AWS Config rules in all accounts.


B.

Create a CloudFormation stack set. then select the Cloud Formation template and use It to configure the AWS accounts.


C.

Use AWS Organizations to execute the CloudFormation template in all accounts.


D.

Write a script that iterates over the company's AWS accounts and executes the Cloud Formation template in each account.


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions