CSA Flashcards
Which is the best definition of cloud architecture?
A. Applying cloud characteristics to a solution that uses cloud services and features to meet technical and business requirements
B. Combining frontend and backend software and components to create highly available and scalable web services that meet the needs of an organization
C. Relocating traditional on-premises data centers to internet-accessible data centers that a vendor manages
D. Designing applications in cloud-based, shared IT infrastructure by using virtual machines and fault-tolerant data stores in the cloud
A. Applying cloud characteristics to a solution that uses cloud services and features to meet technical and business requirements
The AWS Well-Architected Framework has six pillars. Three of the pillars are security, operational excellence, and sustainability. What are two of the other pillars of the Well-Architected Framework? (Select TWO.)
A. Privacy
B. Reliability
C. Governance
D. Cost Optimization
E. Risk Management
B. Reliability
D. Cost Optimization
Which actions are consistent with the operational excellence pillar of the AWS Well-Architected Framework? (Select TWO.)
A. Apply software engineering principles and methodology to infrastructure as code.
B. Ensure operations personnel document changes to the infrastructure.
C. Plan and manage the full lifecycle of hardware assets.
D. Evaluate organizational structures and roles to identify skill gaps.
E. Review and improve processes and procedures on a continuous cycle.
A. Apply software engineering principles and methodology to infrastructure as code.
E. Review and improve processes and procedures on a continuous cycle.
A specific application requires a frontend web tier of multiple servers that communicate with a backend application tier of multiple servers. Which design most closely follows AWS best practices?
A. Design the web tier to communicate with the application tier through the Elastic Load Balancing (ELB) service.
B. Create multiple instances that each combine a web frontend and application backend in the same instance.
C. Assign a dedicated application server and a dedicated connection to each web server.
D. Create a full mesh network between the web and application tiers, so that each web server can communicate directly with every application server.
A. Design the web tier to communicate with the application tier through the Elastic Load Balancing (ELB) service.
A solutions architect is developing a process for handling server failures. Which process most closely follows AWS best practices?
A. Amazon CloudWatch detects a system failure. It initiates automation to provision a new server.
B. Amazon CloudWatch detects a system failure. It notifies the systems administrator, who provisions a new server by using the AWS Management Console.
C. The operations staff detects a system failure. They initiate automation to provision a new server.
D. The operations staff detects a system failure. They notify the systems administrator, who provisions a new server by using the AWS Management Console.
A. Amazon CloudWatch detects a system failure. It initiates automation to provision a new server.
A company is considering moving their on-premises data center to the cloud. Their primary motivation is to increase their cost efficiency. Which approach most closely follows AWS best practices?
A. Replicate their on-premises data center in the cloud.
B. Maintain the on-premises data center as long as possible.
C. Provision some of the servers in the cloud and ensure the servers run 24/7.
D. Provision the servers that are needed and stop services when they are not being used.
D. Provision the servers that are needed and stop services when they are not being used.
A company stores read-only data in Amazon S3. Most users are in the same country as the company headquarters. Some users are located around the world. Which design decision most closely follows AWS best practices?
A. Replicate objects across buckets in AWS Regions around the world. Users access the bucket in the Region closest that is to them.
B. Use a bucket in the Region closest to the company headquarters.
C. Use a bucket in the AWS Region that is closest to the company headquarters. All users access the data through Amazon CloudFront.
D. Use a bucket in the Region that has the lowest average latency for all users.
C. Use a bucket in the AWS Region that is closest to the company headquarters. All users access the data through Amazon CloudFront.
A consultant must access a large object in an S3 bucket. They need one day to access the file. Which method for granting access most closely follows AWS best practices?
A. Enable public access on the S3 bucket. Give the object URL to the consultant.
B. Create a presigned URL to the object that expires in 24 hours, and give it to the consultant.
C. Create a user account for the consultant. Grant the user account permissions to access the S3 bucket through the AWS Management Console.
D. Copy the object to a new S3 bucket. Enable public access on the new bucket. From the new bucket, get the object URL, and give it to the consultant.
B. Create a presigned URL to the object that expires in 24 hours, and give it to the consultant.
Which are main considerations that influence which AWS Regions to use? (Select TWO.)
A. Security and access control
B. Protection against localized natural disasters
C. Compliance with laws and regulations
D. Application resiliency during system failures
E. Latency reduction for end users
C. Compliance with laws and regulations
E. Latency reduction for end users
Which statement reflects a design principle of the security pillar of the Well-Architected Framework?
A. Ensure that staff are actively monitoring potential risks manually.
B. Decentralize privilege management.
C. Apply security at all layers of an architecture.
D. Do not deploy a solution to production until you’re certain that no security risks exist.
C. Apply security at all layers of an architecture.
Which statements about responsibility are accurate based on the AWS shared responsibility model? (Select TWO.)
A. AWS is responsible for the configuration of security groups.
B. Customers are responsible for managing their user data.
C. AWS is responsible for the physical security of data centers.
D. Customers are responsible for the installation, maintenance, and decommissioning of the hardware that they use in the AWS data center.
E. AWS is responsible for host-based firewall configurations.
B. Customers are responsible for managing their user data.
C. AWS is responsible for the physical security of data centers.
Which options are characteristics of the principle of least privilege? (Select TWO.)
A. Use encryption.
B. Always use groups.
C. Craft security policies that limit access to specific tasks.
D. Monitor actions and changes.
E. Grant access only as needed.
C. Craft security policies that limit access to specific tasks.
E. Grant access only as needed.
Which statement about AWS Identity and Access Management (IAM) is true?
A. With IAM, you can manage encryption for items that require encryption at rest.
B. IAM provides an audit trail of who performed an action, what action they performed, and when they performed it.
C. IAM provides an extra layer of security by offering anomaly detection on resources.
D. With IAM, you can grant principals granular access to resources.
D. With IAM, you can grant principals granular access to resources.
Which statements describe AWS Identity and Access Management (IAM) roles? (Select TWO.)
A. They provide temporary security credentials.
B. They are uniquely associated to an individual.
C. Individuals, applications, and services can assume roles.
D. They provide permanent security credentials.
E. They can only be used by accounts that are associated to the person who creates the role.
A. They provide temporary security credentials.
C. Individuals, applications, and services can assume roles.
Which statement reflects a best practice for the root user on an AWS account?
A. Create an admin user and perform most admin tasks with this user instead of the root user.
B. Remove unneeded permissions from the root user account.
C. To avoid getting locked out of the account, do not enable multi-factor authentication (MFA) on the root account.
D. Create two root users with separate credentials and distribute them to two different individuals.
A. Create an admin user and perform most admin tasks with this user instead of the root user.
How does AWS Identity and Access Management (IAM) evaluate a policy?
A. It checks for explicit allow statements before it checks for explicit deny statements.
B. It checks for explicit deny statements before it checks for explicit allow statements.
C. An explicit deny statement does not override an explicit allow statement.
D. If the policy doesn’t have any explicit deny statements or explicit allow statements, users have access by default.
B. It checks for explicit deny statements before it checks for explicit allow statements.
Which statement about AWS Identity and Access Management (IAM) policies is accurate?
A. Identity-based policies can only be attached to a single entity.
B. Resource-based policies are attached to a user, group, or role.
C. Identity-based policies are attached to a user, group, or role.
D. Resource-based policies allow access by default.
C. Identity-based policies are attached to a user, group, or role.
Which AWS Identity and Access Management (IAM) policy element includes information about whether to allow or deny a request?
A. Action
B. Effect
C. Principal
D. Condition
B. Effect
Which option accurately describes the statement element in an AWS Identity and Access Management (IAM) policy?
A. The statement element contains other elements that together define what is allowed or denied.
B. The statement element is an optional part of an IAM policy.
C. A policy can only have one statement element.
D. The statement element does not apply to identity-based policies.
A. The statement element contains other elements that together define what is allowed or denied.
Which are main considerations that influence which Availability Zones to use? (Select TWO.)
A. Protection against localized natural disasters
B. Application resiliency during system failures
C. Compliance with laws and regulations
D. Latency reduction for end users
E. Security and access control
A. Protection against localized natural disasters
B. Application resiliency during system failures
Due to a company merger, a data engineer needs to increase their object storage capacity. They are not sure how much storage they will need. They want a highly scalable service that can store unstructured, semistructured, and structured data. Which service would be the most cost-effective to accomplish this task?
A. Amazon S3
B. Amazon Elastic Block Store (Amazon EBS)
C. AWS Storage Gateway
D. Amazon RDS
A. Amazon S3
Amazon S3 provides a good solution for which use case?
A. A data warehouse for business intelligence
B. An internet-accessible storage location for video files that an external website can access
C. Hourly storage of frequently accessed temporary files
D. Ledger data that is updated and accessed frequently
B. An internet-accessible storage location for video files that an external website can access
A company is interested in using Amazon S3 to host their website instead of a traditional web server. Which types of content does Amazon S3 support for static web hosting? (Select THREE.)
A. HTML files and image files
B. Database engine
C. Server-side scripts
D. Video and sound files
E. Dynamic HTML files
F. Client-side scripts
A. HTML files and image files
D. Video and sound files
F. Client-side scripts
A company wants to use an S3 bucket to store sensitive data. Which actions can they take to protect their data? (Select TWO.)
A. Uploading unencrypted files to Amazon S3 because Amazon S3 encrypts the files by default
B. Enabling server-side encryption on the S3 bucket before uploading sensitive data
C. Using Secure File Transfer Protocol (SFTP) to connect directly to Amazon S3
D. Using client-side encryption to protect data in transit before it is sent to Amazon S3
E. Enabling server-side encryption on the S3 bucket after uploading sensitive data
B. Enabling server-side encryption on the S3 bucket before uploading sensitive data
D. Using client-side encryption to protect data in transit before it is sent to Amazon S3
A company must create a common place to store shared files. Which requirements does Amazon S3 support? (Select TWO.)
A. Lock a file so that only one person at a time can edit it.
B. Recover deleted files.
C. Compare file contents between files.
D. Maintain different versions of files.
E. Attach comments to files.
B. Recover deleted files.
D. Maintain different versions of files.
A customer service team accesses case data daily for up to 30 days. Cases can be reopened and require immediate access for 1 year after they are closed. Reopened cases require 2 days to process. Which solution meets the requirements and is the most cost-efficient?
A. Store case data in S3 Standard. Use a lifecycle policy to move the data into S3 Standard-Infrequent Access (S3 Standard-IA) after 30 days.
B. Store case data in S3 Standard. Use a lifecycle policy to move the data into Amazon S3 Glacier Flexible Retrieval after 30 days.
C. Store case data in S3 Intelligent-Tiering to automatically move data between tiers based on access frequency.
D. Store all case data in S3 Standard so that it is available whenever it is needed.
A. Store case data in S3 Standard. Use a lifecycle policy to move the data into S3 Standard-Infrequent Access (S3 Standard-IA) after 30 days.
Which option takes advantage of edge locations in Amazon CloudFront to transfer files over long distances to an S3 bucket?
A. AWS SDKs
B. AWS Transfer Family
C. Amazon S3 Transfer Acceleration
D. Amazon S3 REST API
C. Amazon S3 Transfer Acceleration
A video producer must regularly transfer several video files to Amazon S3. The files range from 100–700 MB. The internet connection has been unreliable, causing some uploads to fail. Which solution provides the fastest, most reliable, and most cost-effective way to transfer these files to Amazon S3?
A. AWS Transfer Family
B. Amazon S3 multipart uploads
C. AWS Management Console
D. Amazon S3 Transfer Acceleration
B. Amazon S3 multipart uploads
Which Amazon S3 storage class is designed for backup copies of on-premises data or easily re-creatable data?
a. S3 One Zone-Infrequent Access (S3 One Zone-IA)
b. S3 Intelligent-Tiering
c. S3 Glacier Instant Retrieval
d. S3 Standard-Infrequent Access (S3 Standard-IA)
a. S3 One Zone-Infrequent Access (S3 One Zone-IA)
A company needs to retain records for regulatory purposes for a 7-year period. These records are rarely accessed (once or twice a year). What is the lowest-cost storage class for Amazon S3?
a. S3 One Zone-Infrequent Access (S3 One Zone-IA)
b. S3 Standard-Infrequent Access (S3 Standard-IA)
c. S3 Glacier Deep Archive
d. S3 Intelligent-Tiering
c. S3 Glacier Deep Archive
Which attributes are reasons to choose Amazon EC2? (Select TWO.)
a. Ability to run serverless applications
b. AWS management of operating system (OS) patches
c. Complete control of computing resources
d. Ability to run any type of workload
e. AWS management of operating system (OS) security
c. Complete control of computing resources
d. Ability to run any type of workload
What are the benefits of using an Amazon Machine Image (AMI)? (Select THREE.)
a. Selling or sharing software solutions packaged as an AMI
b. Launching instances with the same configuration
c. Updating systems by patching their AMI
d. Automating security group settings for instances
e. Using an AMI as a server backup for Amazon EC2 instances
f. Migrating data from on premises to Amazon EC2 instances
a. Selling or sharing software solutions packaged as an AMI
b. Launching instances with the same configuration
e. Using an AMI as a server backup for Amazon EC2 instances
A system administrator must change the instance types of multiple running Amazon EC2 instances. The instances were launched with a mix of Amazon Elastic Block Store (Amazon EBS) backed Amazon Machine Images (AMIs) and instance-store-backed AMIs. Which method is a valid way to change the instance type?
a. Change the instance type of an instance-store-backed instance without stopping it.
b. Stop an instance-store-backed instance, change its instance type, and start the instance.
c. Stop an Amazon EBS backed instance, change its instance type, and start the instance.
d. Change the instance type of an Amazon EBS backed instance without stopping it.
c. Stop an Amazon EBS backed instance, change its instance type, and start the instance.
A workload requires high read/write access to large local datasets. Which instance types would perform best for this workload? (Select TWO.)
A. Compute optimized
B. Accelerated computing
C. Storage optimized
D. Memory optimized
E. General purpose
C. Storage optimized
D. Memory optimized
An application requires the media access control (MAC) address of the host Amazon EC2 instance. The architecture uses an AWS Auto Scaling group to dynamically launch and terminate instances. What is the best way for the application to obtain the MAC address?
A. Include the MAC address in a custom AMI for each instance in the AWS Auto Scaling group.
B. Use the user data of each instance to access the MAC address through the instance metadata.
C. Write the MAC address in the application configuration file of each instance.
D. Include the MAC address in the Amazon Machine Image (AMI) that is used to launch all of the instances in the AWS Auto Scaling group.
B. Use the user data of each instance to access the MAC address through the instance metadata.
Which statements about user data are correct? (Select two.)
A. User data cannot be run while the instance is stopped.
B. The cloud architect must remove the config_user_scripts file to rerun the user data scripts.
C. By default, user data runs only once, when an instance is launched.
D. By default, user data runs after every instance restart.
E. The cloud architect must run the /var/lib/cloud/instance/scripts/part-001 command for the user data script to run again.
C. By default, user data runs only once, when an instance is launched.
E. The cloud architect must run the /var/lib/cloud/instance/scripts/part-001 command for the user data script to run again.
A transactional workload on an Amazon EC2 instance performs high amounts of frequent read and write operations. Which Amazon Elastic Block Store (Amazon EBS) volume type is BEST for this workload?
A. Provisioned IOPS solid state drive (SSD)
B. Throughput Optimized hard disk drive (HDD)
C. General Purpose solid state drive (SSD)
D. Cold hard disk drive (HDD)
A. Provisioned IOPS solid state drive (SSD)
It is possible to create an NFS share on an Amazon Elastic Block Store (Amazon EBS) backed Linux instance by installing and configuring an NFS server on the instance. In this way, multiple Linux systems can share the file system of that instance. Which advantages does Amazon Elastic File System (Amazon EFS) provide compared to this solution? (Select TWO.)
A. File locking
B. Automatic scaling
C. High availability
D. Strong consistency
E. No need for backups
B. Automatic scaling and C. High availability
Which feature does Amazon FSx for Windows File Server provide?
A. Backup solution for on-premises Windows file servers
B. Fully managed Windows file servers
C. Amazon management agent for Windows file servers
D. Microsoft Active Directory server for Windows file servers
B. Fully managed Windows file servers
Which descriptions of Amazon EC2 pricing options are correct? (Select TWO.)
A. Dedicated Hosts are servers that are dedicated to one purpose, such as a firewall.
B. With On-Demand Instances, customers can pay for compute capacity by usage time with no long-term commitments.
C. Savings Plans are budgeting tools that help customers manage Amazon EC2 costs.
D. Reserved Instances are physical servers that are reserved exclusively for customer use.
E. Spot Instances offer spare compute capacity at discounted prices and can be interrupted.
B. With On-Demand Instances, customers can pay for compute capacity by usage time with no long-term commitments.
E. Spot Instances offer spare compute capacity at discounted prices and can be interrupted.