From Tests Flashcards
What networking components will allow IPv6 data to communicate between a VPC and the internet? [Select 2]
- Direct Connect
- Internet Gateway
- NAT
- Egress-Only Internet Gateway
- Internet Gateway
- Egress only
Only two components allow VPC to internet communication using IPv6 addresses and those are “Internet Gateways” and “Egress-Only Internet Gateways”. “NAT Instances” and “NAT Gateways” explicitly do not support IPv6 traffic and a “Direct Connection” carries data between a Data Centre and an AWS VPC, but does not travel over the Internet.
Which two things can you define using the Transforms section of the CloudFormation template?
- To specify the use of the Serverless Application Model for Lambda deployments
- To transform API responses to a supported format
- To re-use code located in S3
- To convert between YAML and JSON format templates
- To specify the use of the Serverless Application Model for Lambda deployments
- To re-use code located in S3
In an IAM policy, what action does IAM:PassRole relate to?
- Passing a role to an AWS service to assign temporary permissions to the service
- Passing a role to an IAM user
- Passing a role to another AWS account
- Associating a role with an EC2 instance
- Passing a role to an AWS service to assign temporary permissions to the service
- Passing a role to another AWS account
The IAM:PassRole allows any affected entity to pass roles to AWS services or Accounts, granting them permission to assume the role. The list of roles able to be passed on by an entity to other services or accounts can be restricted with the Resources element of the IAM policy statement.
AWS Systems Manager Parameter Store provides secure, hierarchical storage for configuration data and secrets management. Which of the following AWS services natively support the Parameter Store?
EC2, Lambda, CloudFormation
If you are using Memcached as your caching engine, what parameter should be adjusted if you find that the overhead pool is less than 50MB?
Memcached_Connections_Overhead
You are trying to copy a custom AMI which has been shared by another account. The AMI has been encrypted. What steps will you need to take to successfully copy the AMI?
The sharing account must share the underlying EBS snapshot as well as the original encryption key used to encrypt it. Copy the EBS snapshot and re-encrypt it using your own key, then register it as an AMI
You are trying to copy a shared AMI which has an associated billingProducts code. What are the correct steps?
Launch an EC2 instance using the shared AMI and create a new AMI from the instance
You have been asked to enable encryption at rest on your existing EFS file system. What should you do?
Explain that it is not possible to encrypt an existing EFS file system.
The security team have asked you to provide them with details of all the IAM users in your account and the status of their credentials including passwords, access keys and registered MFA devices. What is the best way to approach this?
Generate a credential report either using the AWS CLI or from the AWS console
What networking components will allow IPv6 data to communicate between a VPC and the internet?
Only two components allow VPC to internet communication using IPv6 addresses and those are “Internet Gateways” and “Egress-Only Internet Gateways”. “NAT Instances” and “NAT Gateways” explicitly do not support IPv6 traffic and a “Direct Connection” carries data between a Data Centre and an AWS VPC, but does not travel over the Internet.
Which of the following S3 operations are examples of bucket level actions?
CreateBucket,DeleteBucket,ListBucket
During a security audit your team has been asked by the auditor whether the Cloud allows for packet capture in the same way as a fiber tap can work in your old data center. What should you tell them?
Yes, VPC Traffic Mirroring supports direct access to the network packets flowing through your VPC by allowing you to mirror and forward them to another network interface in the same or another VPC in the same or another account
Amazon VPC traffic mirroring makes it easy for customers to replicate network traffic to and from an Amazon EC2 instance and forward it to out-of-band security and monitoring appliances for use-cases such as content inspection, threat monitoring, and troubleshooting
You are a security administrator for your company’s AWS account. You have enabled CloudTrail for all regions in your master account, and all API calls are centrally logged into an S3 bucket. You have downloaded those logs with the GetObject API call to perform some advanced analytics to inform a security policy. When you look at the CloudTrail activity, you notice that the API calls GetObject are not logged in CloudTrail. How would you troubleshoot this issue?
Logging data events is turned off by default. Configure S3 data events in CloudTrail trails.
An insurance company has a monolithic application hosted in an EC2 instance and a serverless application hosted in AWS Lambda. After a few months of running the application, the customers have raised multiple delays and performance issues from the applications. The Operations Engineer responsible has mentioned that the latency issues might have been caused by code-level performance issues and the Head of Operations has instructed the team to add code-level monitoring support. How can the team accomplish this?
Use AWS X-Ray for both the monolithic application code and the serverless application code.
You are a SysOps Administrator setting up a VPN connection between your on-premises data center and with AWS. You currently have an Amazon VPC setup with a Virtual Private Gateway. You have installed a customer gateway to your on-prem data center and router for your on-premises network is showing status OK. When you try to connect the EC2 instance in your Amazon VPC to a virtual machine in your data center it does not work. How should you set up the route table in the Amazon VPC?
Configure a route to the virtual private gateway.
You would like to run a Lambda function at the same time every night. Which of the following tools could you use to configure this?
Schedule an event in CloudWatch to trigger the function.
You can create rules that self-trigger on an automated schedule in CloudWatch Events using cron or rate expressions.
Which of the following is part of the failover process for a Multi-Availability Zone RDS instance
The DNS record for the RDS endpoint is changed from primary to standby.
The engineering team of a FinTech company has migrated their on-premise application to AWS and has decided to use AWS DynamoDB to store the records and a combination of EC2 instances and Lambda functions for the data processing requirements. The Chief Security Officer of the company has mandated that the DynamoDB table is accessed without the use of access keys and secrets. How can the engineering team accomplish this?
- Create and associate IAM resource policies to the EC2 Instances. Create and associate IAM roles to the Lambda functions.
- Create and associate IAM roles to the EC2 Instances. Create and associate Cognito roles to the Lambda functions.
- Create and associate IAM roles to the EC2 Instances and Lambda functions.
- Create and associate IAM roles to the EC2 Instances. Create and associate IAM resource policies to the Lambda functions.
Create and associate IAM roles to the EC2 Instances and Lambda functions.
IAM roles allow EC2 instances and similar resources such as Lambda functions to perform operations on other resources without the need for access keys and secrets.
Your Dev team in Ireland needs an AMI that was created in us-east-1. The Irish Dev team have a copy of the AMI and are attempting to use it to launch instances in eu-west-1, however they are unable to make it work. Which of the following is the most likely cause of the problem?
- The Dev team does not have launch permissions to use the AMI to launch instances.
- You cannot use AMIs created by a different account
- The Dev team has failed to manually re-create the launch permissions.
- The US based account which created the AMI has not shared it with the Ireland based account.
The Dev team has failed to manually re-create the launch permissions.
Copying a source AMI results in an identical but distinct target AMI with its own unique identifier. AWS does not copy launch permissions, user-defined tags, or Amazon S3 bucket permissions from the source AMI to the new AMI. After the copy operation is complete, you must apply launch permissions manually.
You need to create a new trail in AWS CloudTrail service. You want the new trail to capture all management events through AWS API or console. The trail should also capture the data events that are performed within the resources. Which types of resources can be configured in the trail for the data events? (Select TWO.)
- S3 buckets.
- EC2 EBS volumes.
- Lambda Functions.
- RDS instances
- DynamoDB tables.
S3 buckets.
Lambda Functions
With CloudTrail, you can collect data events that happen within the resources of S3 or Lambda Function. Data events are disabled by default. You can explicitly add the supported resource types when configuring a trail.
You need to update the AMI in your EC2 Auto Scaling launch configuration. Which of the following statements are true? Select three.
- Changing the launch configuration of an Auto Scaling group doesn’t affect existing instances.
- Changing the launch configuration of an Auto Scaling group triggers existing instances to be relaunched using the new configuration.
- The existing launch configuration cannot be modified so a new one must be created.
- You can specify multiple launch configurations for an EC2 Auto Scaling group at a time.
- The launch configuration can be modified freely so there is no need to create a new one.
- You can only specify one launch configuration for an EC2 Auto Scaling group at a time.
Changing the launch configuration of an Auto Scaling group doesn’t affect existing instances.
The existing launch configuration cannot be modified so a new one must be created.
You can only specify one launch configuration for an EC2 Auto Scaling group at a time.
You are providing a storage solution for a customer. The customer requires a scalable, secure, and highly available network file system accessed by EC2 instances to support highly parallelized workloads and performance needs of big data and analytics. What AWS storage solution would you build for your customer?
- Create an EFS file accessible by EC2 via mount targets in each Region. Control traffic flow between Amazon EFS and EC2 instances using NACLs.
- Create an EFS file accessible by EC2 via mount targets in each Availability Zone. Control traffic flow between Amazon EFS and EC2 instances using NACLs.
- Create an EFS file accessible by EC2 via mount targets in each Region. Control traffic flow between Amazon EFS and EC2 instances using security groups.
- Create an EFS file accessible by EC2 via mount targets in each Availability Zone. Control traffic flow between Amazon EFS and EC2 instances using security groups.
Create an EFS file accessible by EC2 via mount targets in each Availability Zone. Control traffic flow between Amazon EFS and EC2 instances using security groups.
Which of the following distinguishes two CloudWatch metrics that are in the same namespace and have the same name? A. Timestamp B. Data point C. Dimension D. Region
CloudWatch uses dimensions to identify metrics that have the same name and are
within the same namespace. Me
You update a CloudWatch metric with a timestamp of 10:00:30 and a value of 98.
You then update the same metric with a timestamp of 10:00:59 and a timestamp of 97.
Assuming the metric is a regular-resolution metric, what will CloudWatch do?
A. Record the first value and ignore the second value.
B. Record the second value and overwrite the first value.
C. Record both values.
D. Store the average of the two values.
B. CloudWatch can store regular-resolution metrics at no less than 1-minute resolution.
Therefore, updating a metric at 10:00:30 and then again at 10:00:59 will result in
CloudWatch storing only the second value.
A week ago, you created a CloudWatch alarm to monitor the CPUUtilization metric on
an EC2 instance. Yesterday, the alarm briefly entered an INSUFFICIENT_DATA state and
then went back to an OK state. What is a possible reason for this?
A. The alarm was paused.
B. The instance was terminated.
C. The CPU utilization went above the alarm threshold.
D. The instance was stopped and restarted.
D. The instance being stopped and restarted would explain the momentary lack of CPU
utilization data
Which of the following can you use to proactively alert you to possible excess resource utilization in your AWS account? A. CloudTrail B. AWS Budgets C. CloudWatch Events D. Cost Explorer E. AWS Config
B. AWS Budgets can alert you via email if your bill exceeds a specified amount—a good
indicator of excessive resource utilization
You’re running a relational database on an EC2 instance backed by an EBS gp2 volume.
Recently, as the frequency of writes to the database has increased, database performance
has suffered. CPU and memory utilization remain at less than 50%, even during peak
usage. Which of the following should you look at to determine where the bottleneck is?
A. Volume queue length
B. Network utilization
C. The number of EBS snapshots being stored
D. Provisioned IOPS
A. The volume queue length metric measures the total number of read and write
operation requests waiting for completion. If this has increased and remains high, it’s
a good indication that the volume isn’t able to sustain enough IOPS. Because it’s a gp2
volume, the number of IOPS depends on the size allocated for the volume
Which of the following Relational Database Service (RDS) instance classes offers dedicated bandwidth for storage volumes? A. Burst-capable B. Memory-optimized C. Standard D. Network-optimized
. B. Memory-optimized instances have dedicated bandwidth for EBS storage. Standard
instances are not EBS optimized
If you enable automatic snapshots, how many days will RDS retain them by default?
7
. You’ve configured CloudTrail to log all management events in all regions. How long will
these logs be retained by default?
Indefinitely
CloudTrail logs can be stored in S3 buckets or CloudWatch Logs. By default, S3
and CloudWatch Logs don’t delete any files or logs automatically
You want to create an alarm to monitor the VolumeReadOps metric for an EBS volume.
The metric is stored with a 5-minute resolution. You need the alarm to trigger as soon as
the metric crosses a threshold. What period should you use?
B. The period should be greater than or equal to the resolution of the metric. In this case,
you want the alarm to trigger as soon as the metric crosses a threshold, so you should set
the period to 5 minutes
Four hours ago, you configured a CloudWatch alarm to monitor CPU utilization on an
EC2 instance, but today the alarm is in an INSUFFICIENT_DATA state. Which of the
following could explain this? (Choose two.)
A. The instance was restarted.
B. The instance is stopped.
C. The CPU utilization hasn’t crossed the alarm threshold.
D. The alarm period hasn’t elapsed yet
The instance is stopped.
The alarm period hasn’t elapsed yet.
You want to be alerted if the average CPU utilization of an instance exceeds 90% or if the
instance is stopped for more than 5 minutes. Which of will achieve this with
minimal effort?
Create a single alarm to monitor the CPUUtilization metric.
Configure the alarm to treat missing data as breaching.
You have an account limit of 10,000 customer master KMS keys. How many files can you
store using SSE-KMS encryption before having to request a limit increase?
There is no practical limit to the number of files you can store in S3. The KMS key
limit applies to the number of customer master keys, but you can use the same key to
encrypt each file in S3.
One DynamoDB read capacity unit (RCU) will allow you to read, per second, one item up
to what size? (Choose two.)
A. Anything between 1 and 8 KB using a strongly or eventually consistent read
B. 2 KB using a strongly consistent read
C. 4 KB using a strongly consistent read
D. 8 KB using an eventually consistent read
One RCU gets you a strongly consistent read per second of an item up to 4 KB in
size, or two weakly consistent reads per second of 4 KB each
Approximately how many in-flight messages can you have in a standard SQS queue?
120,000
Approximately how many in-flight messages can you have in a FIFO SQS queue?
20,000
Which of the following offers the lowest priced transfer up to 1 GB per month? A. They are all the same. B. S3 Standard C. S3 One Zone-Infrequent Access D. S3 Standard-Infrequent Access
S3 standard charges nothing for data transfer up to 1 GB per month. S3 One Zone-IA
and Standard-IA charge US$0.01 per GB.
Which is best for seeing how your AWS bill has changed over time? A. Cost and Usage Reports B. Cost Explorer C. Budgets D. Trusted Advisor
Cost Explorer lets you analyze your costs and usage for the preceding 13 months.
What’s the maximum number of AWS Budgets custom budgets you can create for free?
Two
You’re running a set of applications in a single AWS region. You want to expand these
applications to an additional region but need to determine how much it will cost. Which can help you?
. Simple Monthly Calculator
(Monitoring)
. Your supervisor has asked you if there is a way to create reports with billing data so that
they can view billing by usage, or the cost per individual log group. What should you tell
your boss?
A. Yes. AWS allows you to get this information with detailed billing.
B. Yes. AWS allows you to get this information with basic billing.
C. No. AWS does not allow you to get this information.
D. No. AWS does not give you the ability to create reports in this way
A. Yes. AWS allows you to get this information with detailed billing.
Detailed billing was made available to AWS customers back in December 2016.
Detailed billing gives customers the ability to create reports to review usage in the AWS
account, or the cost associated with individual log groups. There’s no such thing as basic
billing
(Monitoring)
You are the system administrator in charge of getting your organization’s AWS
environment set up. You want to enable billing alerts, but when you log in with your IAM
account, you are unable to do so. Why can’t you create the billing alert?
A. Your IAM account doesn’t have the necessary permissions; you need more access.
B. You can’t set up billing alerts in AWS; you have to arrange them with your technical
account manager.
C. You need to be signed in with the AWS account’s root user credentials to enable
billing alerts.
D. It is not possible to set up billing alerts in AWS
To enable billing alerts, you must be logged in as the root user for the AWS account.
(Monitoring) . What are the valid statuses you can get from the Amazon EC2 health checks? (Choose two.) A. Pass B. Fail C. OK D. Impaired E. Offline
When a health check is run on an Amazon EC2 instance, you can get types of
statuses. OK means that all of the health checks have passed. If any of the health checks
fail, then the status displayed is Impaired.
(Monitoring)
You don’t like the status checks and the alerting done from the status checks that exist on
Amazon EC2. You want to disable the status checks in favor of another solution. How can
you disable the Amazon EC2 status checks?
A. You can disable them by turning off the monitoring in the Amazon EC2 instance.
B. You can disable them by installing the Amazon CloudWatch Logs agent and then
disabling them through the agent.
C. You can’t disable them; they are part of Amazon EC2.
D. You can’t disable them; they are part of Amazon EC2. You can disable the alerts that
trigger off of the status checks.
As the status checks themselves are a part of the Amazon EC2 instances, you can’t
disable them. You can, however, disable the CloudWatch alarms that utilize the status
checks to trigger.
(Monitoring)
How long are statistics retained in Amazon CloudWatch?
A. 6 months
B. 12 months
C. 15 months
D. 30 months
15 months
(Monitoring)
Your security team has mandated that you need to avoid using service accounts unless
absolutely necessary because of the overhead in managing password rotation. You want to
deploy the Amazon CloudWatch Logs agent. What could you use to authenticate the agent
that is not a service account?
A. Access keys
B. AWS IAM
C. Active Directory
D. There isn’t any option other than a service account
You can use access keys to authenticate the Amazon CloudWatch Logs agent instead
of a username and password.
As the access key is still tied to a username, you may want
to check with your security team that it meets their criteria. While access keys are created
in AWS IAM, AWS IAM is not a granular enough response to satisfy this question. While
you can link your Active Directory environment to AWS, this is still not getting away
from the need for service accounts.
(Monitoring)
How would you set a custom metric to use high resolution?
A. Set MetricResolution to 1 using the PutMetricRequest API.
B. Set StorageRetention to 1 using the PutMetricRequest API.
C. Set StorageResolution to 1 using the PutMetricRequest API.
D. Set MetricRetention to 1 using the PutMetricRequest API.
Set StorageResolution to 1 using the PutMetricRequest API.
(Monitoring)
Your boss wants to use high-resolution metrics because they want to be able to get data
every 15 seconds. They are concerned about additional cost from using high-resolution
metrics. What should you tell your boss?
A. High-resolution metrics are more expensive.
B. High-resolution metrics are less expensive.
C. High-resolution metrics cost the same as standard.
D. You can’t do 15-second periods with high resolution.
High-resolution metrics don’t cost any more or any less than standard-resolution
metrics. You can do 1-, 5-, 10-, 15-, 30-, and 60-second intervals with high resolution.
(Monitoring)
You work for a financial institution and you need to parse your log data for account
numbers. You have a regex query built that has been used in other solutions. How can you
parse your log data for the regex that will find account numbers?
A. Amazon CloudWatch Metric Filters
B. AWS Management Console
C. Amazon CloudWatch
D. Amazon Kinesis
Amazon Kinesis allows you to connect your log stream and process the logs using the
regex that you wanted to search on. Amazon CloudWatch Metric Filters do not support
regex. Neither Amazon CloudWatch nor the AWS Management Console give you the
ability to search by regex
(Monitoring)
You want to ensure that AWS Config is enabled for all three regions that your
organization is using. How would you enable AWS Config for all three regions?
A. It is automatically enabled for all regions.
B. You need to enable it once for all regions.
C. You need to enable it once per region.
D. You can’t use AWS Config for that many regions.
C. AWS Config is not enabled by default. You need to enable it once per region for any
region you want to have monitored.
(Monitoring)
You currently have 145 individual AWS Config rules built for your organization’s
environment. You need to make 10 more rules for new criteria that your legal team wants
you to monitor for. Will you be able to create 10 more rules?
A. Yes, you can create unlimited rules.
B. Yes, but you will need to request an increase on the limit from AWS.
C. No, because you can’t have more than 150 rules.
D. No, because you can’t add more rules.
B. Yes, but you will need to request an increase on the limit from AWS.
With AWS Config, you are limited to 150 rules
(Monitoring)
Your boss wants you to set up a periodic rule in AWS Config, and they want it to run
every 6 hours. How should you respond to this request?
A. Set up the periodic rule for 3 hours because you can’t set it to 6.
B. Set up the periodic rule to run every 6 hours.
C. Set up the periodic rule to run every 12 hours because you can’t set it to 6.
D. Tell your boss that AWS Config can only do change-triggered rules.
You can set periodic rules to run every 1, 3, 6, 12, or 24 hours. So your response
should be to set up the rule to run every 6 hours.
(Monitoring)
You have AWS Config configured in your AWS account. You have added a security group
to an Amazon EC2 instance. Which resources will have changes recorded in AWS Config?
A. Amazon EC2 instance
B. The security group
C. Primary resource and related resources
D. All of these
D. When you add a security group to an Amazon EC2 instance, AWS Config records
changes for the Amazon EC2 instance, the security group, primary resources, and related
resources.
(Monitoring)
Your Operations Center team would like to know what kinds of things AWS Config can
record. What should you include in your response?
A. All of the following options
B. OS patches
C. Application installations
D. Network configuration
A. You can tell your Operations Center team that AWS Config can record OS patches,
application installations, network configurations, and really any change that is made to
the systems.
(Monitoring)
You have a new person in Accounting who is in charge of paying for your AWS account
charges. They have asked you if there is a way to see what the charges are so far. Where
should you tell them to go?
A. AWS Budgets
B. AWS Management Console
C. AWS Billing and Cost Management Dashboard
D. AWS Trusted Advisor
C. The AWS Billing and Cost Management Dashboard will allow them to monitor what
the current spend is now and even sort by service.
(Monitoring)
Your accounting department likes the view that the Billing and Cost Management
Dashboard gives them, but they don’t want to have to go to each individual AWS account
to view billing for the entire organization. What should you implement to allow them to
view billing for the entire organization?
A. AWS Trusted Advisor
B. AWS Organizations
C. AWS Management Console
D. AWS Budgets
B. AWS Organizations allows your accounting department to view billing and cost
information for all of the AWS accounts in your organization.
(Monitoring)
Your boss wants to view the current amount due on your AWS account. Where should you
tell your boss to look?
A. AWS Management Console
B. AWS Trusted Advisor
C. AWS Budgets
D. AWS Cost Explore
D. AWS Cost Explorer monitors the current amount due on your AWS account
(Monitoring)
Your security department wants to know which processes are running on open ports.
How can you give them this information? (Choose two.)
A. Run a scan from Amazon Inspector.
B. Run a scan with Amazon GuardDuty.
C. Use AWS WAF.
D. Install the Amazon Inspector agent
Install the Amazon Inspector agent.
Run a scan from Amazon Inspector.
(Monitoring)
You have been asked to create your own rules packages for Amazon Inspector assessment
templates to use. How do you create a rules package?
A. You can’t create rules packages.
B. Create the rules package inside of the Amazon Inspector Dashboard.
C. Create the rules package inside of the AWS Config Dashboard.
D. Create the rules package inside of the AWS Systems Manager Dashboard.
A. Only the rules provided by AWS are allowed to be used for assessment runs, so you
can’t create rules packages.
(Monitoring)
What is the benefit of the Run Command in AWS Systems Manager?
A. Provides console access to the system without the need for remote access ports to be
open
B. Provides console access to Linux hosts via SSH
C. Provides automation of tasks so long as remote access ports are open
D. Provides automation of tasks without the need for remote access
D. The Run Command provides a way to automate common administrative tasks without
the need for remote access provided by opening up SSH or RDP or by using bastion
hosts
(Monitoring)
What is the benefit of the Session Manager in AWS Systems Manager?
A. Allows remote console sessions via an interactive web browser with no need to open
inbound ports
B. Allows remote console sessions via an interactive web browser once the necessary
ports are open
C. Allows configuration management and tracking
D. Allows management of APIs
A. Session Manager within AWS Systems Manager allows remote console sessions via an
interactive web browser with no need to open inbound ports or use bastion hosts to access
your systems
(Monitoring)
What is the benefit of the Patch Manager in AWS Systems Manager?
A. Patch management and reporting for Windows systems only
B. Patch management and reporting for Linux systems only
C. Patch management and reporting for AWS systems only
D. Patch management and reporting for on-prem and AWS systems
D. AWS Systems Manager Patch Manager provides patch management and reporting for
both Linux and Windows systems on-prem and in the cloud.
(Monitoring)
What is the benefit of the State Manager in AWS Systems Manager?
A. Backs up system state for on-prem and AWS resources
B. Backs up system state for AWS resources only
C. Provides configuration management for on-prem and AWS resources
D. Provides configuration management for AWS resources only
C. Provides configuration management for on-prem and AWS resources
(Monitoring)
Your boss would like to have a single “source of truth” to run queries against the data
from the AWS services you use. Is there a way to accomplish this within AWS?
A. Yes, you can query data from the other AWS services with Amazon CloudWatch.
B. Yes, you can query data from the other AWS services with Amazon Athena.
C. Yes, you can query data from the other AWS services with AWS CloudTrail.
D. No, there is not a way to accomplish this in AWS.
B. With Amazon Athena, you can query data across a multitude of AWS services,
including AWS CloudTrail, Amazon CloudFront, Elastic Load Balancer, Amazon Virtual
Private Cloud, Amazon CloudFormation, AWS Glue Data Catalog, Amazon QuickSight,
and IAM
(Monitoring)
Which of these responses is a benefit of Amazon GuardDuty?
A. Automated responses to identified threats
B. Identification of stale user accounts
C. Identification of users/groups with excessive permissions
D. Automated security assessments
A. Amazon GuardDuty not only identifies threats on your network, it can automatically
respond to those threats as well
Identifying stale user accounts or users/groups with
excessive permissions is something that should be done by your IAM team, utilizing AWS
IAM.
Automated security assessments are performed by Amazon Inspector.
(Monitoring)
Which of these responses is a benefit of Amazon GuardDuty?
A. Maintain desired patch levels.
B. Manage encryption keys for your AWS environment.
C. Support a single AWS account.
D. Support multiple AWS accounts.
Amazon GuardDuty can support multiple AWS accounts, giving visibility across your
enterprise
(High Availability)
Your boss has heard that EC2 Auto Scaling groups can scale based on metrics monitored in Amazon CloudWatch. However, the traffic to your web servers follows very predictable patterns, so your boss would like to know if you can schedule a scaling event instead.
What should your response be?
A. Yes, scaling events can be triggered on a schedule.
B. No, scaling events can’t be triggered on a schedule.
C. Yes, you can schedule scaling events through Amazon CloudWatch.
D. No, scaling events can only be triggered based on Amazon CloudWatch metrics.
A. Scaling events can be triggered by schedule. The schedule is not created in Amazon
CloudWatch, and you don’t need an alarm from Amazon CloudWatch to scale.
(High Availability)
You have created your Auto Scaling group but you notice that you have no EC2 instances
within the group. What is the most likely cause?
A. You didn’t set a desired capacity.
B. Minimum capacity is set to 0, and there is no load.
C. Maximum capacity is set to 1.
D. Autoscaling is not available in your region
B. If minimum capacity is set to 0 and there is no load, then it is entirely possible for you
to have 0 instances.
If you leave desired capacity blank, then the minimum capacity is
used.
If maximum capacity is set to 1, then your Auto Scaling group can have up to one
EC2 instance.
If autoscaling wasn’t available in your region, you wouldn’t have been able
to set up your ASG in the first place
(High Availability)
You have assigned a new launch configuration to your Auto Scaling group. You need to
refresh all of your instances, but you can’t have downtime. What is the best option?
A. Set the desired capacity to 0, then once they are all terminated, set it back to its
previous setting.
B. Manually terminate the old instances so they are relaunched using the new
configuration.
C. Choose each instance and assign the new launch configuration.
D. Let the instances age out over time
B. Since you need to avoid downtime, your best option is to manually terminate the
old instances so they are relaunched using the new launch configuration. This allows
you to control how many instances are offline and avoid downtime.
If you set the desired
capacity to zero, you may cause an outage, so this would not be a great solution if the
most important factor is to avoid an outage.
You can’t set the launch configuration per
instance.
Since you need to refresh your instances now, waiting for them to age out is not
a good solution.
(High Availability)
You’ve been using launch configurations, but as part of a DevOps model, you want to
begin using versioning to track changes to your launch configurations. How can you
enable versioning for launch configurations?
A. Create a launch template from your launch configurations.
B. Enable versioning on your launch configurations.
C. Manually name your launch configurations with a version number.
D. There is no way to set up versioning for launch configurations.
A. Launch templates use versioning to track changes. You can’t enable versioning on
launch configurations directly. Manually numbering launch configurations is not easily
scalable and would be error prone
(High Availability)
Which of these can be used to subscribe to an SNS topic? A. Amazon Simple Storage Service (S3) B. AWS Lambda C. Amazon EC2 D. Amazon Simple Workflow Service (SWF)
B. There are five different ways to subscribe to an SNS topic. They are:
- AWS Lambda,
- Amazon Simple Queue Service (SQS)
- HTTP and HTTPS,
- email,
- SMS text.
(High Availability)
You have a Lambda function in the us-east-1 region and you want to also use the function
in the us-east-2 region. Can you use the same function or would you need to re-create it?
A. Yes, you can use the same function.
B. Yes, but you will need to share the function.
C. No, you will need to create the function in the other region.
D. No, you can’t use the same function.
C. You can’t use the same function because AWS Lambda is based on region.
You can,
however, copy the function to the other region
(High Availability)
You are using an application load balancer and you want to route traffic for multiple
domains. What type of routing should you set up that will allow the load balancer to do
what you need?
A. Content-based routing
B. Path-based routing
C. Host-based routing
D. There is no way to accomplish this type of routin
C. Host-based routing will allow you to route traffic based in the domain name in the
request. Content-based routing routes traffic based on the content of the request. Pathbased routing will route traffic based on the URL path that is in the HTTP header.
(High Availability)
You have multiple services running behind an application load balancer. You need the load
balancer to route to different servers based on the URL in the HTTP request. What type
of routing should you use?
A. Content-based routing
B. Path-based routing
C. Host-based routing
D. There is no way to accomplish this type of routing.
B. Path-based routing will route traffic based on the URL path that is in the HTTP
header. Host-based routing will allow you to route traffic based in the domain name in
the request. Content-based routing routes traffic based on the content of the request.
(Deployment and Provisioning)
You have been asked to automate the deployment of web servers in your organization
to meet demand when the load increases on your existing systems. You need to ensure
that each of the EC2 instances is configured the same way each time. How would you
accomplish this requirement?
A. AWS CloudFormation
B. Auto Scaling groups
C. User data field
D. Amazon CloudWatch
The user data field can be used in conjunction with Auto Scaling groups to configure
your EC2 instances.
(Deployment and Provisioning)
Why might you use a template parameter in a CloudFormation template?
A. Specify passwords at creation time.
B. Specify instance type and size at creation time.
C. Specify IAM roles needed at creation time.
D. You can’t use a parameter in a CloudFormation template.
B. One of the most common use cases for a template parameter in CloudFormation is to
specify the instance type and size at the time of creation
(Deployment and Provisioning)
To create a stack using the AWS CLI, what would you use? A. aws ec2 create-stack B. aws cloudformation update-stack C. aws cloudformation stack-create D. aws cloudformation create-stack
aws cloudformation create-stack.
(Deployment and Provisioning)
Which language is not supported in AWS Elastic Beanstalk?
A. Go
B. Python
C. PHP
D. These are all supported.
D. Elastic Beanstalk supports multiple languages, including Go Java, .NET, Node.js, PHP, Python, Ruby.
It also supports Docker web applications.
(Deployment and Provisioning)
You are using CloudFormation and your system administrators want to be able to update
your application while keeping it available. They tell you that it can run at 50% capacity
with only slight performance degradation later that evening. Your supervisor wants to
ensure that performance is not impacted at all but wants to keep costs down. What is the
best deployment policy to use?
A. All at once
B. Rolling
C. Rolling with additional batch
D. Immutable
C. By using rolling with additional batch, you ensure that you are operating at full
capacity, which will not impact performance as the supervisor requested. Rolling with
additional batch is a less expensive option than immutable as you are only spinning
up instances to cover the systems that are being taken offline as opposed to all of the
instances as you would do if immutable was being used.
(Deployment and Provisioning)
Your system administrators want to be able to update your application while keeping it
available. They tell you that it can run at 50% capacity with no performance degradation
later that evening. Your supervisor wants to keep costs down. What is the best deployment
policy to use?
A. All at once
B. Rolling
C. Rolling with additional batch
D. Immutable
B. Since the application will not suffer at 50% capacity later in the evening and your
supervisor wants to keep costs down, rolling is the best option. Since no new instances are
provisioned, this keeps the cost down, and you can specify that only 50% of the instances
are getting updated at any point in time.
(Deployment and Provisioning)
You are using CloudFormation and your system administrators want to update your
application to the latest version in the development environment for testing. It is okay for
the application to be unavailable for a brief period of time. Your supervisor wants to keep
costs down. What is the best deployment policy to use?
A. All at once
B. Rolling
C. Rolling with additional batch
D. Immutable
A. Since this is a development environment and it is considered acceptable to have
downtime, all at once is the best deployment policy. It is the fastest method, and the cost
is kept down since no new instances are spun up.
(Deployment and Provisioning)
When systems are deployed with CloudFormation, health checks are passing during the
deployment; however, it is found that the health checks are marking instances as healthy
prematurely before all of the services are running that the application relies on. Given a
little more time, the application starts with no issue. What is the most likely cause for this?
A. The health checks are incorrectly marking instances healthy.
B. A health check URL is not configured.
C. The instances are healthy, but the application has issues.
D. This is working by design.
B. If a health check URL is not configured, then instances are marked as healthy as soon
as they accept a TCP connection. The services the application relies on may not be up and
responding by then. It is unlikely that instances are being marked healthy incorrectly. If
the application has issues, it wouldn’t start working after a slightly longer time frame; this
appears to be an issue of dependencies not being met.
(Deployment and Provisioning)
You have the AWS CLI installed on your system and you manage your environment with
it. You have full administrative permissions. When you try to run the Elastic Beanstalk
command, eb platform logs, the command is not recognized. What is the most likely
reason the command is not being recognized?
A. You don’t have the EB CLI installed.
B. You have not typed the command properly.
C. You can’t configure Elastic Beanstalk with the AWS CLI.
D. It’s an invalid command.
A. The command that is being used requires the Elastic Beanstalk CLI to be installed.
(Deployment and Provisioning)
You currently have 38 RDS database instances on your AWS account. You need to add
10 more. What will you need to do to add the 10 database instances?
A. You can add them as you normally would.
B. You will need to contact AWS to raise the soft limit on your account as you can only
have 40 RDS database instances on your account.
C. You will need to contact AWS to raise the soft limit on your account as you can only
have 50 RDS database instances on your account.
D. You can’t add any more than 40 to your account; it is a hard limit.
B. Each AWS account can have a total of 40 database instances. To be able to go over the
40, which is a soft limit, you would need to contact AWS and request that the limit be
raised.
(Deployment and Provisioning)
You are using a MySQL database in Amazon RDS. You have five read replicas and would
like another, but you are unable to create another read replica. Why is that?
A. You don’t have permissions to create a read replica.
B. With MySQL in Amazon RDS, you can have only five read replicas.
C. You can have five read replicas, but that is a soft limit; you will need to request an
increase.
D. Use a multi-AZ configuration instead to get around this limitation.
B. If you are using MySQL in Amazon RDS, then you may only have five read replicas at
any time.
In this case, five read replicas is not a soft limit,
so you can’t request a limit increase.
(Deployment and Provisioning)
You had a failure in one of your databases recently and when you tried to restore from
backup, you found that the last backup available was from several weeks ago when there
was a large upload of data. What is the likely reason that this occurred?
A. The last backup was a manual backup and automated backups have never worked.
B. The data transfer overloaded the system and disabled the automated backups.
C. Automated backups were disabled while the large amount of data was loaded.
D. Automated backups were disabled due to a system error
C. In general, it is a bad idea to disable automatic backups. One of the few exceptions
is when you are loading a large amount of data.
(Deployment and Provisioning)
. You have multiple container images stored on Docker Hub and you would like to use them
once you migrate to using Amazon ECS. Will you still be able to use Docker Hub as your
container registry?
A. Yes, although Docker Hub is the only supported external registry.
B. Yes, you can use container registries outside of AWS.
C. No, you can only use Amazon Elastic Container Registry (ECR).
D. No, you can’t use external container registries.
B. When using Amazon ECS, you can use container registries inside of AWS and outside
of AWS. So you could use your existing container registry in Docker Hub, and in fact
Docker Hub is used by default
(Deployment and Provisioning)
What must you install on your compute resources to utilize them with AWS Batch?
A. AWS Batch Agent
B. Amazon Inspector Agent
C. Amazon ECS Agent
D. AWS Systems Manager Agent
C. AWS Batch uses containers to execute batch jobs. To take advantage of AWS Batch,
you must install the Amazon ECS (Elastic Container Service) Agent on your compute
resources.
(Deployment and Provisioning)
You have added the user accounts of your administrators to the docker group so that they
no longer have to use sudo in front of docker commands. However, when they try to use a
simple docker command, they get the error “Cannot connect to the Docker daemon. Is the
docker daemon running on this host?” What should you do?
A. Reboot the host.
B. Add them to the root group instead.
C. Restart the Docker service.
D. Reinstall Docker.
A. Occasionally a reboot is needed after granting permissions to the user accounts so that
they can access the Docker daemon without sudo
(Deployment and Provisioning)
You have created a server using Amazon Lightsail. You want to connect it to an RDS
instance in your default VPC. How should you configure communication to work between
Lightsail and the RDS instance?
A. Direct Connect
B. VPN gateway
C. VPC endpoint
D. VPC peering
D. You would need to enable VPC peering on the Lightsail account page, and from there
Lightsail will configure everything for you.
(Storage)
Which of these types of encryption can you use with your EBS volumes? (Choose two.)
A. Client level
B. Server level
C. Instance level
D. Volume level
A, D. With EBS volumes, you have a choice between either client-level encryption, which
is done by the operating system, or volume-level encryption, which is managed by AWS
(Storage)
Which of the following are valid access methods for Amazon S3 buckets? (Choose two.) A. Bucket-style B. Virtual-hosted-style C. URL-style D. Path-style
B, D. Amazon S3 buckets can be either virtual-hosted-style or path-style.
Virtual-hostedstyle includes the bucket name as part of the domain name in the URL.
Using path-style,
the bucket name is not part of the domain name in the URL. The other two options were
made up for this question.
(Storage)
You currently have snapshots of your EBS volumes going to S3. You need to access the snapshots. How would you access them? A. Amazon S3 API B. Amazon EC2 API C. Amazon EBS API D. The AWS Management Console
B. While the snapshots are stored in Amazon S3, they are not directly accessible. You
must use the Amazon EC2 API to work with the snapshots.
(Storage)
You need to move the data from your on-premises file servers to Amazon EFS. What is the
simplest method for copying data from your file servers to Amazon EFS?
A. Restore from a backup.
B. Robocopy.
C. AWS DataSync.
D. Manually upload the files
C. AWS DataSync is built for this use case. It allows you to sync your existing filesystems
with your Amazon EFS filesystem and can work over the Internet or via an AWS Direct
Connect/AWS VPN connection.
(Storage)
You are moving files to Amazon EFS from your on-prem file servers. You want to save the
company money, and you know that some of the data is stale, but you don’t know if it’s
safe to delete the data. What should you do?
A. Create an age-off policy to move stale data to EFS IA.
B. Create an expiration policy to move stale data to EFS IA.
C. Create an age-off policy to move stale data to Amazon S3 IA.
D. Create an expiration policy to move stale data to Amazon S3 IA.
In Amazon EFS, these are called age-off policies
Expiration policies are used in Amazon S3.
(Storage)
You have some small text files that are around 100 KB in size. You have enabled Amazon
EFS Lifecycle Management and have noticed that these files have not been moved to
Amazon EFS IA even though they have not been accessed for a long time. What is the
most likely reason these files have not been moved?
A. The files are smaller than 64 KB.
B. The files are smaller than 128 KB.
C. The files are smaller than 256 KB.
D. The files are smaller than 512 KB.
B. Files smaller than 128 KB in size will not be moved by Amazon EFS Lifecycle
Managemen
(Storage)
How can you secure your Amazon EFS deployment so that only authorized Amazon
EC2 instances can access the file share with the least amount of administrative effort?
(Choose two.)
A. Network access control lists
B. Security groups
C. IAM policies
D. IAM groups
B, C. VPC security groups can be used to specify which systems or IP ranges are allowed
to access your file shares. IAM policies can be applied to the filesystem.
(Storage)
You would like to create a shared directory in Amazon EFS and ensure through the
operating system that certain users will see the shared directory as their root directory.
How can this be accomplished with Amazon EFS?
A. Amazon EFS Peering
B. AWS IAM
C. Amazon EFS Access Point
D. Amazon EFS Endpoint
C. Amazon EFS Access Points allow you to use an operating system user or group to
access a particular shared directory as their root directory. You can further enforce this
by adding an IAM policy on to the access point.
(Storage)
. Your security team has required that data be encrypted while in Amazon S3 and that you
maintain control over the keys at all times. As a SysOps administrator, you don’t want to
implement a client-side encryption library; you want something that will not have a high
degree of administrative effort. What should you choose?
A. SSE-S3
B. SSE-C
C. SSE-KMS
D. Amazon S3 Encryption Client
B. SSE-C allows you to maintain control over your keys while still allowing Amazon S3
to handle the actual encryption process. This simplifies administration as you don’t need
to implement a client-side encryption library; you can instead leverage the tools provided
by AWS
(Storage)
Your security team has required that data be encrypted while in Amazon S3 and that you
maintain control of the keys. You want to reduce the overhead of encryption on the server
side, so you would like to use a client-side encryption library. What should you choose?
A. SSE-S3
B. SSE-C
C. SSE-KMS
D. Amazon S3 Encryption Client
D. The Amazon S3 Encryption client allows you to maintain control of your keys and
take advantage of client-side encryption libraries.
(Storage)
. Your security team has requested that you choose controls to provide a greater deal of
protection than you have currently through Amazon CloudFront. What protection do you
have by default in your AWS account?
A. AWS Shield Standard
B. AWS Shield Advanced
C. AWS WAF
D. Amazon GuardDuty
A. By default, you have access to AWS Shield Standard. You can pay to upgrade to AWS
Shield Advanced if desired. AWS Shield provides protection from DDoS attacks.
(Storage)
You want to ensure that people trying to access your website get access through Amazon
CloudFront, but you want to ensure that they can type the web address that you have
advertised. What is the best way to accommodate this need?
A. Set up an A record for the domain name.
B. Set up a PTR record for the IP address of CloudFront.
C. Set up a CNAME record for your domain name.
D. Set up an ALIAS record for your domain name.
C. You should set up an CNAME record with your domain name and point it to the
CloudFront distribution address
(Storage)
You have an S3 bucket that has sensitive information in it that should not change. You
want to be notified anytime there is a potential change to the data. Which of these is not a
method that will work for sending notifications when events like this occur?
A. Amazon SNS
B. Amazon SQS
C. AWS Lambda
D. Amazon CloudWatch
D. Amazon S3 notifications can be tied into Amazon SNS, Amazon SQS, or AWS
Lambda. Amazon CloudWatch does not have the same level of integration into S3 that the
other three do.
(Storage)
D. Amazon S3 notifications can be tied into Amazon SNS, Amazon SQS, or AWS
Lambda. Amazon CloudWatch does not have the same level of integration into S3 that the
other three do.
C. Amazon S3 doesn’t put a limit on file size, but Amazon CloudFront has a limit for
single files, which is 20 GB. That would explain why you can upload the file to Amazon
S3 with no issue and why it is not being delivered by Amazon CloudFront.
(Storage)
You are just starting to work with AWS Snowball. You have ordered the 80 TB unit and
you need to start transferring data to it. What do you need to do first to prepare the
source host for data transfer?
A. Install the file server role on the source host.
B. Install the AWS Snowball client.
C. Compress the directories that you want to move.
D. Deduplicate the files on the source host.
. B. To prepare your source host to transfer data to the AWS Snowball device, you will
need to install the AWS Snowball client. This handles the encryption and compression of
the data as well as the transfer to the AWS Snowball device
(Storage)
You have decided to use AWS Snowball to do the initial transfer of data to AWS from your
on-premises datacenter. Your security team wants assurances that the data on the AWS
Snowball device is secure. What should you tell them?
A. AWS Snowball data is not encrypted but is password protected.
B. AWS Snowball data is encrypted with a key stored on the AWS Snowball device.
C. AWS Snowball data is encrypted with a key stored in AWS KMS.
D. AWS Snowball data is encrypted with a key stored in AWS Certificate Manager
C. AWS Snowball data is encrypted with a key stored in AWS KMS.
The best answer to give them is that the data on the AWS Snowball device is encrypted
with an AES-256 bit key and that the private key is not stored on the AWS Snowball
device, it is managed by AWS KMS.
(Storage)
Which of these is not needed for AWS Snowball setup? A. AWS Snowball client unlock code B. Job manifest file C. AWS Snowball client D. Job manifest unlock code
A. To set up AWS Snowball, you need the AWS Snowball client as well as the job manifest
file and the job manifest unlock code. There is no unlock code for the AWS Snowball
client.